System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1955
- **State**: PUBLISHED
- **Published Date**: April 25, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 08:41 UTC
- **Reserved Date**: April 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in rep.php in Martin BOUCHER MyBoard 1.0.12 allows remote attackers to inject arbitrary web script or HTML via the id parameter. information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.z0rlu.ownspace.org/index.php?/archives/52-MyBoard-1.0.12-XSS.html)
2. [28823](http://www.securityfocus.com/bid/28823)
3. [myboard-rep-xss(42024)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32638
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:33 UTC
- **Reserved Date**: April 09, 2025 at 11:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weptile ShopApper allows Stored XSS. This issue affects ShopApper: from n/a through 0.4.39.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**weptile - ShopApper**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mobile-app-for-woocommerce/vulnerability/wordpress-shopapper-plugin-0-4-37-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2049
- **State**: PUBLISHED
- **Published Date**: May 08, 2019 at 16:27 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In SendMediaUpdate and SendFolderUpdate of avrcp_service.cc, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9 Android ID: A-120445479
### Affected Products
**n/a - Android**
Affected versions:
- Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3177
- **State**: PUBLISHED
- **Published Date**: June 23, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in Admin/rtf_parser.php in The Bible Portal Project 2.12 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the destination parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [bpp-rtfparser-file-include(27088)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27088)
2. [20680](http://secunia.com/advisories/20680)
3. [1912](https://www.exploit-db.com/exploits/1912)
4. [ADV-2006-2404](http://www.vupen.com/english/advisories/2006/2404)
5. [26598](http://www.osvdb.org/26598)
6. [18494](http://www.securityfocus.com/bid/18494) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7458
- **State**: PUBLISHED
- **Published Date**: August 04, 2024 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: August 04, 2024 at 06:10 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. This issue affects some unknown processing of the file /api/deploy/upload /api/database/upload of the component Database Management/Deployment Management. The manipulation of the argument file leads to path traversal: 'dir/../../filename'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273551.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-27: Security Weakness
### Affected Products
**elunez - eladmin**
Affected versions:
- 2.0 (Status: affected)
- 2.1 (Status: affected)
- 2.2 (Status: affected)
- 2.3 (Status: affected)
- 2.4 (Status: affected)
- 2.5 (Status: affected)
- 2.6 (Status: affected)
- 2.7 (Status: affected)
### References
1. [VDB-273551 | elunez eladmin Database Management/Deployment Management upload path traversal](https://vuldb.com/?id.273551)
2. [VDB-273551 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.273551)
3. [Submit #380498 | elunez eladmin <=v2.7 Path Traversal: 'dir/../../filename'](https://vuldb.com/?submit.380498)
4. [](https://github.com/elunez/eladmin/issues/851)
### Credits
- nerowander (VulDB User)
- nerowander (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7129
- **State**: REJECTED
- **Published Date**: August 17, 2020 at 14:10 UTC
- **Last Updated**: August 17, 2020 at 14:10 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6017
- **State**: PUBLISHED
- **Published Date**: February 29, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 19, 2007 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
The PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, exposes the unsafe Save method, which allows remote attackers to cause a denial of service (browser crash), or create or overwrite arbitrary files, via string values of the (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, and (19) _MonthText11 properties. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.veritas.com/docs/300471)
2. [1019525](http://securitytracker.com/id?1019525)
3. [](http://www.symantec.com/avcenter/security/Content/2008.02.29.html)
4. [](http://seer.entsupport.symantec.com/docs/300471.htm)
5. [](http://seer.support.veritas.com/docs/308669.htm)
6. [](http://www.symantec.com/avcenter/security/Content/2008.02.28.html)
7. [ADV-2008-0718](http://www.vupen.com/english/advisories/2008/0718)
8. [27885](http://secunia.com/advisories/27885)
9. [](http://secunia.com/secunia_research/2007-101/)
10. [28008](http://www.securityfocus.com/bid/28008)
11. [ADV-2008-2672](http://www.vupen.com/english/advisories/2008/2672) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2538
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 20:50 UTC
- **Last Updated**: April 01, 2025 at 13:48 UTC
- **Reserved Date**: March 19, 2025 at 20:49 UTC
- **Assigned By**: Esri
### Vulnerability Description
A hardcoded credential vulnerability exists in a specific deployment pattern for Esri Portal for ArcGIS versions 11.4 and below that may allow a remote authenticated attacker to gain administrative access to the system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Esri - Portal for ArcGIS**
Affected versions:
- 10.9.1 (Status: affected)
- 11.1 (Status: affected)
- 11.2 (Status: affected)
- 11.3 (Status: affected)
- 11.4 (Status: affected)
### References
1. [](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-1-patch/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14358
- **State**: PUBLISHED
- **Published Date**: November 02, 2019 at 16:26 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 28, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On Archos Safe-T devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.inhq.net/posts/oled-side-channel-status-summary/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6282
- **State**: PUBLISHED
- **Published Date**: November 19, 2013 at 15:00 UTC
- **Last Updated**: May 01, 2025 at 03:55 UTC
- **Reserved Date**: October 25, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5)
2. [40975](https://www.exploit-db.com/exploits/40975/)
3. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8404663f81d212918ff85f493649a7991209fa04)
4. [](http://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282)
5. [63734](http://www.securityfocus.com/bid/63734)
6. [[oss-security] 20131114 CVE-2013-6282 - linux kernel: missing access checks in get_user/put_user on ARM](http://www.openwall.com/lists/oss-security/2013/11/14/11)
7. [](https://github.com/torvalds/linux/commit/8404663f81d212918ff85f493649a7991209fa04)
8. [USN-2067-1](http://www.ubuntu.com/usn/USN-2067-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23113
- **State**: REJECTED
- **Last Updated**: December 30, 2022 at 00:00 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31674
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 20:19 UTC
- **Last Updated**: August 03, 2024 at 07:26 UTC
- **Reserved Date**: May 25, 2022 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware vRealize Operations contains an information disclosure vulnerability. A low-privileged malicious actor with network access can access log files that lead to information disclosure.
### Affected Products
**n/a - VMware vRealize Operations**
Affected versions:
- VMware vRealize Operations (8.x prior to 8.6.4) (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2022-0022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33981
- **State**: PUBLISHED
- **Published Date**: August 06, 2024 at 11:06 UTC
- **Last Updated**: August 07, 2024 at 18:47 UTC
- **Reserved Date**: April 29, 2024 at 12:38 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Cross-Site Scripting (XSS) vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'start' parameter in '/admin/mod_reports/index.php'.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Janobe - Janobe PayPal**
Affected versions:
- 1.0 (Status: affected)
**Janobe - Credit Card**
Affected versions:
- 1.0 (Status: affected)
**Janobe - Debit Card Payment**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54445
- **State**: PUBLISHED
- **Published Date**: March 14, 2025 at 17:49 UTC
- **Last Updated**: March 14, 2025 at 18:15 UTC
- **Reserved Date**: December 02, 2024 at 14:24 UTC
- **Assigned By**: BlackDuck
### Vulnerability Description
Login functionality contains a blind SQL injection that can be exploited by unauthenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof entries in certain database tables.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**LogicalDOC - LogicalDOC Community**
Affected versions:
- 0 (Status: affected)
**LogicalDOC - LogicalDOC Enterprise**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html)
### Credits
- Matthew Hogg |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33649
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 19:50 UTC
- **Last Updated**: January 02, 2025 at 19:33 UTC
- **Reserved Date**: June 14, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Edge (Chromium-based)**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33649) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27952
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 17:39 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. Processing a maliciously crafted font file may lead to arbitrary code execution.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT211931)
2. [](https://support.apple.com/en-us/HT212011) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29175
- **State**: PUBLISHED
- **Published Date**: June 26, 2024 at 03:03 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 18, 2024 at 08:44 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**Dell - PowerProtect DD**
Affected versions:
- 7.0 (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- 7.8 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3814
- **State**: PUBLISHED
- **Published Date**: March 25, 2022 at 18:02 UTC
- **Last Updated**: August 03, 2024 at 17:09 UTC
- **Reserved Date**: September 17, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found that 3scale's APIdocs does not validate the access token, in the case of invalid token, it uses session auth instead. This conceivably bypasses access controls and permits unauthorized information disclosure.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**n/a - 3scale**
Affected versions:
- 3scale 2.11 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2004322) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7936
- **State**: PUBLISHED
- **Published Date**: January 28, 2017 at 01:33 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1037755](http://www.securitytracker.com/id/1037755)
2. [DSA-3775](http://www.debian.org/security/2017/dsa-3775)
3. [RHSA-2017:1871](https://access.redhat.com/errata/RHSA-2017:1871)
4. [](https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html)
5. [95852](http://www.securityfocus.com/bid/95852)
6. [GLSA-201702-30](https://security.gentoo.org/glsa/201702-30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3968
- **State**: PUBLISHED
- **Published Date**: September 10, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in userlist.php in PunBB before 1.2.20 allows remote attackers to inject arbitrary web script or HTML via the p parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [punbb-userlist-xss(45046)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45046)
2. [[oss-security] 20080909 Re: cve request: punbb < 1.2.20 xss](http://www.openwall.com/lists/oss-security/2008/09/09/10)
3. [](http://punbb.informer.com/download/changelogs/1.2.19_to_1.2.20.txt)
4. [31082](http://www.securityfocus.com/bid/31082)
5. [](http://punbb.informer.com/forums/topic/19682/punbb-1220-and-13rc-hotfix-released/)
6. [[oss-security] 20080909 cve request: punbb < 1.2.20 xss](http://www.openwall.com/lists/oss-security/2008/09/09/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6974
- **State**: PUBLISHED
- **Published Date**: April 07, 2020 at 17:06 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 14, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**n/a - Honeywell Notifier Web Server (NWS)**
Affected versions:
- Version 3.50 and earlier (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-20-051-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30605
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 13:47 UTC
- **Last Updated**: March 24, 2025 at 15:40 UTC
- **Reserved Date**: March 24, 2025 at 13:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in ldwin79 sourceplay-navermap allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects sourceplay-navermap: from n/a through 0.0.2.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ldwin79 - sourceplay-navermap**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sourceplay-navermap/vulnerability/wordpress-sourceplay-navermap-plugin-0-0-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2856
- **State**: PUBLISHED
- **Published Date**: September 17, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 17:54 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
### Affected Products
**Foscam - Foscam Indoor IP Camera C1 Series**
Affected versions:
- System Firmware Version: 1.9.3.18,Application Firmware Version: 2.52.2.43,Plug-In Version: 3.3.0.26 (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0359) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1547
- **State**: PUBLISHED
- **Published Date**: April 17, 2013 at 12:10 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: January 30, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 2.8.0 through 12.0.1 allows remote authenticated users to affect integrity via vectors related to BASE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html)
2. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0074
- **State**: PUBLISHED
- **Published Date**: October 09, 2019 at 19:26 UTC
- **Last Updated**: September 17, 2024 at 03:38 UTC
- **Reserved Date**: October 11, 2018 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series with Next-Generation Routing Engine (NG-RE) which uses vmhost. This issue affects Juniper Networks Junos OS on NFX150 Series and QFX10K, EX9200 Series, MX Series and PTX Series with NG-RE and vmhost: 15.1F versions prior to 15.1F6-S12 16.1 versions starting from 16.1R6 and later releases, including the Service Releases, prior to 16.1R6-S6, 16.1R7-S3; 17.1 versions prior to 17.1R3; 17.2 versions starting from 17.2R1-S3, 17.2R3 and later releases, including the Service Releases, prior to 17.2R3-S1; 17.3 versions starting from 17.3R1-S1, 17.3R2 and later releases, including the Service Releases, prior to 17.3R3-S3; 17.4 versions starting from 17.4R1 and later releases, including the Service Releases, prior to 17.4R1-S6, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2, 18.3R2; 18.4 versions prior to 18.4R1-S1, 18.4R2. This issue does not affect: Juniper Networks Junos OS 15.1 and 16.2.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
- CWE-23: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 15.1 (Status: unaffected)
- 16.2 16.2 (Status: unaffected)
- 15.1F (Status: affected)
- 16.1R6 (Status: affected)
- 17.1 (Status: affected)
- 17.2R1-S3, 17.2R3 (Status: affected)
- 17.3R1-S1, 17.3R2 (Status: affected)
- 17.4R1 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.2X75 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA10975) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5465
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 07:30 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 29, 2024 at 07:57 UTC
- **Assigned By**: huawei
### Vulnerability Description
Function vulnerabilities in the Calendar module
Impact: Successful exploitation of this vulnerability will affect availability.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.2.0 (Status: affected)
- 4.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 14.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/6/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4427
- **State**: PUBLISHED
- **Published Date**: October 01, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The gnome-shell plugin 3.4.1 in GNOME allows remote attackers to force the download and installation of arbitrary extensions from extensions.gnome.org via a crafted web page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.novell.com/show_bug.cgi?id=779473)
2. [](https://bugzilla.gnome.org/show_bug.cgi?id=684215)
3. [[oss-security] 20120913 Re: note on gnome shell extensions](http://www.openwall.com/lists/oss-security/2012/09/13/19)
4. [[oss-security] 20120909 note on gnome shell extensions](http://www.openwall.com/lists/oss-security/2012/09/08/1)
5. [[oss-security] 20120918 Re: Re: note on gnome shell extensions](http://www.openwall.com/lists/oss-security/2012/09/18/3)
6. [[oss-security] 20120913 Re: Re: note on gnome shell extensions](http://www.openwall.com/lists/oss-security/2012/09/13/26)
7. [55556](http://www.securityfocus.com/bid/55556) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5114
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
If an existing cookie is changed to be "HttpOnly" while a document is open, the original value remains accessible through script until that document is closed. Network requests correctly use the changed HttpOnly cookie. This vulnerability affects Firefox < 58.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [1040270](http://www.securitytracker.com/id/1040270)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1421324)
3. [USN-3544-1](https://usn.ubuntu.com/3544-1/)
4. [102786](http://www.securityfocus.com/bid/102786)
5. [](https://www.mozilla.org/security/advisories/mfsa2018-02/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0505
- **State**: PUBLISHED
- **Published Date**: May 08, 2025 at 18:37 UTC
- **Last Updated**: May 08, 2025 at 18:56 UTC
- **Reserved Date**: January 15, 2025 at 19:34 UTC
- **Assigned By**: Arista
### Vulnerability Description
On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state for devices under management. Note that CloudVision as-a-Service is not affected.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Arista Networks - CloudVision Portal**
Affected versions:
- 2024.2.0 (Status: affected)
- 2024.3.0 (Status: affected)
### References
1. [](https://www.arista.com/en/support/advisories-notices/security-advisory/21315-security-advisory-0115) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46749
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: December 07, 2022 at 00:00 UTC
- **Assigned By**: Baidu
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21545
- **State**: PUBLISHED
- **Published Date**: September 24, 2024 at 07:25 UTC
- **Last Updated**: September 24, 2024 at 14:57 UTC
- **Reserved Date**: December 22, 2023 at 12:33 UTC
- **Assigned By**: snyk
### Vulnerability Description
Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with 'Sys.Audit' or 'VM.Monitor' privileges to download arbitrary host files via the API.
When handling the result from a request handler before returning it to the user, the handle_api2_request function will check for the ‘download’ or ‘data’->’download’ objects inside the request handler call response object. If present, handle_api2_request will read a local file defined by this object and return it to the user.
Two endpoints were identified which can control the object returned by a request handler sufficiently that the ’download’ object is defined and user controlled. This results in arbitrary file read.
The privileges of this file read can result in full compromise of the system by various impacts such as disclosing sensitive files allowing for privileged session forgery.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N`
### Affected Products
**Proxmox - pve-manager**
Affected versions:
- 0 (Status: affected)
- 8.0.0 (Status: affected)
**Proxmox - libpve-storage-perl**
Affected versions:
- 0 (Status: affected)
- 8.0.0 (Status: affected)
**Proxmox - libpve-http-server-perl**
Affected versions:
- 3.2-1 (Status: affected)
- 5.0.0 (Status: affected)
**Proxmox - pmg-api**
Affected versions:
- 0 (Status: affected)
- 8.0.0 (Status: affected)
**Proxmox - libpve-common-perl (Promox VE 8)**
Affected versions:
- 0 (Status: affected)
**Proxmox - libpve-common-perl (Promox Mail Gateway 8)**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://git.proxmox.com/?p=pve-http-server.git;a=blob;f=src/PVE/APIServer/AnyEvent.pm;h=a8d60c18102d2eea9235720852fb60d90f405d0a;hb=HEAD#l988)
2. [](https://forum.proxmox.com/threads/proxmox-virtual-environment-security-advisories.149331/post-705345)
### Credits
- Rory McNamara (Snyk Security Research) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3122
- **State**: REJECTED
- **Published Date**: October 30, 2005 at 20:00 UTC
- **Last Updated**: November 04, 2005 at 10:00 UTC
- **Reserved Date**: October 03, 2005 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46881
- **State**: PUBLISHED
- **Published Date**: January 26, 2025 at 00:00 UTC
- **Last Updated**: January 27, 2025 at 16:56 UTC
- **Reserved Date**: September 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Develocity (formerly Gradle Enterprise) before 2024.1.8 has Incorrect Access Control. Project-level access control configuration was introduced in Enterprise Config schema version 8. Migration functionality from schema version 8 to versions 9 and 10 (in affected vulnerable versions) does not include the projects section of the configuration. This leads to all of the project settings being reset to their defaults when the old schema is loaded. In the case of projects.enabled, the default is false. Thus, using an enterprise config v8 results in Project level access control being disabled, even if it was previously enabled, and previously restricted project information disclosed. Most commonly, this occurs when a Develocity instance is upgraded from an earlier version. Specifically, this occurs if: Develocity 2023.3.X is upgraded to 2023.4.X; Develocity 2023.3.X is upgraded to 2024.1.X up to and including 2024.1.7; or Develocity 2023.4.X is upgraded to 2024.1.X up to and including 2024.1.7. The flaw does not occur when upgrading to a fixed version. An upgrade can only be triggered via administrator access, and cannot be forced by an external attacker.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**Gradle - Enterprise**
Affected versions:
- 2023.4 (Status: affected)
### References
1. [](https://security.gradle.com/advisory/2024-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8444
- **State**: PUBLISHED
- **Published Date**: August 23, 2019 at 13:49 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The wikirenderer component in Jira before version 7.13.6, and from version 8.0.0 before version 8.3.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in image attribute specification.
### Affected Products
**Atlassian - Jira**
Affected versions:
- unspecified (Status: affected)
- 8.0.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-69779)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26280
- **State**: PUBLISHED
- **Published Date**: March 01, 2024 at 11:05 UTC
- **Last Updated**: February 13, 2025 at 17:41 UTC
- **Reserved Date**: February 15, 2024 at 15:12 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops and Viewers users to view all information on audit logs, including dag names and usernames they were not permitted to view. With 2.8.2 and newer, Ops and Viewer users do not have audit log permission by default, they need to be explicitly granted permissions to see the logs. Only admin users have audit log permission by default.
Users of Apache Airflow are recommended to upgrade to version 2.8.2 or newer to mitigate the risk associated with this vulnerability
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Airflow**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/37501)
2. [](https://lists.apache.org/thread/knskxxxml95091rsnpxkpo1jjp8rj0fh)
3. [](http://www.openwall.com/lists/oss-security/2024/03/01/1)
### Credits
- Yusuf AYDIN (@h1_yusuf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1787
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:00 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in PostCalendar 4.0.0 allows remote attackers to execute arbitrary SQL commands via search queries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [postcalendar-search-sql-injection(14111)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14111)
2. [9372](http://www.securityfocus.com/bid/9372)
3. [10554](http://secunia.com/advisories/10554)
4. [](http://news.postnuke.com/modules.php?op=modload&name=News&file=article&sid=2537)
5. [1008621](http://securitytracker.com/id?1008621)
6. [3336](http://www.osvdb.org/3336) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19090
- **State**: PUBLISHED
- **Published Date**: April 02, 2020 at 19:46 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 18, 2019 at 00:00 UTC
- **Assigned By**: ABB
### Vulnerability Description
For ABB eSOMS versions 4.0 to 6.0.2, the Secure Flag is not set in the HTTP response header. Unencrypted connections might access the cookie information, thus making it susceptible to eavesdropping.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-16: Security Weakness
### Affected Products
**ABB - eSOMS**
Affected versions:
- 4.0 to 6.0.2 (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6921
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 11:34 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 18, 2023 at 15:08 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
Blind SQL Injection vulnerability in PrestaShow Google Integrator (PrestaShop addon) allows for data extraction and modification. This attack is possible via command insertion in one of the cookies.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**PrestaShow - PrestaShop Google Integrator**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://prestashow.pl/pl/moduly-prestashop/28-prestashop-google-integrator-ga4-gtm-ads-remarketing.html)
2. [](https://cert.pl/en/posts/2024/01/CVE-2023-6921/)
3. [](https://cert.pl/posts/2024/01/CVE-2023-6921/)
### Credits
- Piotr Zdunek |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2803
- **State**: PUBLISHED
- **Published Date**: July 08, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68385](http://www.securityfocus.com/bid/68385)
2. [MS14-037](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037)
3. [59775](http://secunia.com/advisories/59775)
4. [1030532](http://www.securitytracker.com/id/1030532) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3841
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 20:38 UTC
- **Last Updated**: April 09, 2025 at 13:39 UTC
- **Reserved Date**: November 02, 2022 at 16:25 UTC
- **Assigned By**: redhat
### Vulnerability Description
RHACM: unauthenticated SSRF in console API endpoint. A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauthenticated users making requests.
### Affected Products
**redhat.com - RHACM**
Affected versions:
- n/a (Status: unknown)
### References
1. [](https://access.redhat.com/security/cve/CVE-2022-3841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7963
- **State**: PUBLISHED
- **Published Date**: March 02, 2018 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 23, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SafeNet Authentication Service for AD FS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://safenet.gemalto.com/technical-support/security-updates/)
2. [](https://labs.nettitude.com/blog/cve-2015-7596-through-cve-2015-7598-cve-2015-7961-through-cve-2015-7967-safenet-authentication-service-agent-vulnerabilities/)
3. [](https://labs.nettitude.com/wp-content/uploads/2016/03/160125-1-Gemalto-IDSS-Security-Bulletin-SAS-Agents-Privilege-Escalation.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1512
- **State**: PUBLISHED
- **Published Date**: May 17, 2010 at 20:42 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 26, 2010 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Directory traversal vulnerability in aria2 before 1.9.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100513 Secunia Research: aria2 metalink "name" Directory Traversal Vulnerability](http://www.securityfocus.com/archive/1/511280/100/0/threaded)
2. [40142](http://www.securityfocus.com/bid/40142)
3. [FEDORA-2010-8915](http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041758.html)
4. [39872](http://secunia.com/advisories/39872)
5. [ADV-2011-0116](http://www.vupen.com/english/advisories/2011/0116)
6. [](http://downloads.sourceforge.net/project/aria2/stable/aria2-1.9.3/NEWS)
7. [FEDORA-2010-8908](http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041754.html)
8. [FEDORA-2010-8905](http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041753.html)
9. [64592](http://www.osvdb.org/64592)
10. [SUSE-SR:2010:017](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html)
11. [ADV-2010-1229](http://www.vupen.com/english/advisories/2010/1229)
12. [42906](http://secunia.com/advisories/42906)
13. [SUSE-SR:2010:014](http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html)
14. [39529](http://secunia.com/advisories/39529)
15. [MDVSA-2010:106](http://www.mandriva.com/security/advisories?name=MDVSA-2010:106)
16. [DSA-2047](http://www.debian.org/security/2010/dsa-2047)
17. [ADV-2010-1228](http://www.vupen.com/english/advisories/2010/1228)
18. [GLSA-201101-04](http://security.gentoo.org/glsa/glsa-201101-04.xml)
19. [](http://secunia.com/secunia_research/2010-71/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39244
- **State**: PUBLISHED
- **Published Date**: October 06, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 16:52 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**pjsip - pjproject**
Affected versions:
- < 2.13 (Status: affected)
### References
1. [](https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj)
2. [](https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae)
3. [GLSA-202210-37](https://security.gentoo.org/glsa/202210-37)
4. [[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update](https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html)
5. [DSA-5358](https://www.debian.org/security/2023/dsa-5358)
6. [[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update](https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3189
- **State**: PUBLISHED
- **Published Date**: May 25, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.
### Affected Products
**Pivotal - Cloud Foundry**
Affected versions:
- Runtime cf-release versions v208 or earlier (Status: affected)
- UAA Standalone versions 2.2.5 or earlier (Status: affected)
- Runtime 1.4.5 or earlier (Status: affected)
### References
1. [](https://pivotal.io/security/cve-2015-3189) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9349
- **State**: PUBLISHED
- **Published Date**: June 02, 2017 at 05:04 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: June 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9)
2. [](https://www.wireshark.org/security/wnpa-sec-2017-27.html)
3. [98803](http://www.securityfocus.com/bid/98803)
4. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329)
5. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685)
6. [1038612](http://www.securitytracker.com/id/1038612)
7. [[debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00031.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45866
- **State**: PUBLISHED
- **Published Date**: November 23, 2022 at 00:00 UTC
- **Last Updated**: April 25, 2025 at 18:35 UTC
- **Reserved Date**: November 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
qpress before PierreLvx/qpress 20220819 and before version 11.3, as used in Percona XtraBackup and other products, allows directory traversal via ../ in a .qp file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pkgs.org/download/qpress)
2. [](https://github.com/PierreLvx/qpress/pull/6)
3. [](https://github.com/EvgeniyPatlan/qpress/commit/ddb312090ebd5794e81bc6fb1dfb4e79eda48761)
4. [](https://github.com/PierreLvx/qpress/compare/20170415...20220819)
5. [](https://github.com/percona/percona-xtrabackup/pull/1366)
6. [FEDORA-2022-dacf699829](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQWF7635AJSDKEIGLB73XAH643POGTFY/)
7. [FEDORA-2022-e19ca639ef](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4RXO3VYIFRTNIFHWIAZWND6ZXQ5OYOB/)
8. [FEDORA-2022-0ff8149aad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUZ73XT2FXLHC7I4ODLOVB4O4QN7Q7JB/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6671
- **State**: PUBLISHED
- **Published Date**: March 13, 2017 at 07:12 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 25, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open edX edx-platform before 2015-08-25 requires use of the database for storage of SAML SSO secrets, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging access to a database backup.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/edx/edx-platform/pull/9471)
2. [](https://open.edx.org/CVE-2015-6671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2753
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 14:01 UTC
- **Last Updated**: August 03, 2024 at 00:46 UTC
- **Reserved Date**: August 10, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not sanitise and escape some of the reservation user inputs, allowing unauthenticated attackers to perform Cross-Site Scripting attacks logged in admin viewing the malicious reservation made
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Ketchup Restaurant Reservations**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182)
### Credits
- Bastijn Ouwendijk |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3711
- **State**: PUBLISHED
- **Published Date**: October 27, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
namei in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (memory exhaustion) via vectors that trigger a sandboxed process to look up a large number of nonexistent path names.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3070](http://www.debian.org/security/2014/dsa-3070)
2. [62218](http://secunia.com/advisories/62218)
3. [FreeBSD-SA-14:22](https://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc)
4. [1031100](http://www.securitytracker.com/id/1031100) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16219
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 18:07 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
yttivy is a static file server. yttivy is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - yttivy node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/441)
2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24216
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 03, 2025 at 20:16 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.
### Affected Products
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122377)
2. [](https://support.apple.com/en-us/122371)
3. [](https://support.apple.com/en-us/122372)
4. [](https://support.apple.com/en-us/122373)
5. [](https://support.apple.com/en-us/122378)
6. [](https://support.apple.com/en-us/122379) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41027
- **State**: PUBLISHED
- **Published Date**: September 22, 2023 at 16:06 UTC
- **Last Updated**: September 24, 2024 at 18:06 UTC
- **Reserved Date**: August 22, 2023 at 14:09 UTC
- **Assigned By**: XI
### Vulnerability Description
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-210: Security Weakness
### Affected Products
**Juplink - RX4-1500**
Affected versions:
- V1.0.5 (Status: affected)
- V1.0.4 (Status: affected)
### References
1. [](https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-credential-disclosure-vulnerability/)
### Credits
- Exodus Intelligence |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47793
- **State**: PUBLISHED
- **Published Date**: October 18, 2024 at 06:05 UTC
- **Last Updated**: October 18, 2024 at 16:32 UTC
- **Reserved Date**: October 03, 2024 at 07:09 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Stored cross-site scripting vulnerability exists in Exment v6.1.4 and earlier and Exment v5.0.11 and earlier. When accessing the edit screen containing custom columns (column type: images or files), an arbitrary script may be executed on the web browser of the user.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Kajitori Co.,Ltd - Exment**
Affected versions:
- v6.1.4 and earlier (Status: affected)
**Kajitori Co.,Ltd - Exment**
Affected versions:
- v5.0.11 and earlier (Status: affected)
### References
1. [](https://exment.net/vulnerability-correspondence-version-6-1-5-and-5-0-12-released/)
2. [](https://exment.net/docs/#/weakness/20241010)
3. [](https://jvn.jp/en/jp/JVN74538317/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14224
- **State**: PUBLISHED
- **Published Date**: September 09, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 08, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4040](https://www.debian.org/security/2017/dsa-4040)
2. [USN-3681-1](https://usn.ubuntu.com/3681-1/)
3. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07)
4. [DSA-4032](https://www.debian.org/security/2017/dsa-4032)
5. [100702](http://www.securityfocus.com/bid/100702)
6. [](https://github.com/ImageMagick/ImageMagick/issues/733) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1321
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Oracle Internet Directory Server 2.1.1.x and 3.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via invalid encodings of BER OBJECT-IDENTIFIER values, as demonstrated by the PROTOS LDAPv3 test suite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CA-2001-18](http://www.cert.org/advisories/CA-2001-18.html)
2. [](http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/)
3. [L-116](http://ciac.llnl.gov/ciac/bulletins/l-116.shtml)
4. [VU#869184](http://www.kb.cert.org/vuls/id/869184)
5. [](http://www.kb.cert.org/vuls/id/JPLA-4WESNV) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25267
- **State**: PUBLISHED
- **Published Date**: March 23, 2022 at 22:06 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Passwork On-Premise Edition before 4.6.13 allows migration/uploadExportFile Directory Traversal (to upload files).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://passwork.me)
2. [](https://gist.github.com/garakh/e0e2fe6d6e234f0595dea6a8141568f2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37500, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37500
- **State**: PUBLISHED
- **Published Date**: January 20, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 16:02 UTC
- **Reserved Date**: July 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Reprise License Manager (RLM) web interface before 14.2BL4 in the diagnostics function that allows RLM users with sufficient privileges to overwrite any file the on the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://reprise.com)
2. [](http://reprisesoftware.com)
3. [](https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0585
- **State**: PUBLISHED
- **Published Date**: August 16, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 14:33 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in IBM InfoSphere Information Server through 8.5 FP3, 8.7 through FP2, and 9.1 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to the (1) web console and (2) repository management user interfaces.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21646136)
2. [infosphere-cve20130585-xss(83356)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0188
- **State**: PUBLISHED
- **Published Date**: February 24, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDKSA-2006:049](http://www.mandriva.com/security/advisories?name=MDKSA-2006:049)
2. [RHSA-2006:0283](http://www.redhat.com/support/errata/RHSA-2006-0283.html)
3. [19176](http://secunia.com/advisories/19176)
4. [squirrelmail-webmail-xss(24847)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24847)
5. [FEDORA-2006-133](http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00004.html)
6. [SUSE-SR:2006:005](http://www.novell.com/linux/security/advisories/2006_05_sr.html)
7. [20210](http://secunia.com/advisories/20210)
8. [oval:org.mitre.oval:def:10419](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10419)
9. [ADV-2006-0689](http://www.vupen.com/english/advisories/2006/0689)
10. [18985](http://secunia.com/advisories/18985)
11. [19205](http://secunia.com/advisories/19205)
12. [](http://www.squirrelmail.org/security/issue/2006-02-01)
13. [19960](http://secunia.com/advisories/19960)
14. [16756](http://www.securityfocus.com/bid/16756)
15. [19130](http://secunia.com/advisories/19130)
16. [20060501-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc)
17. [DSA-988](http://www.debian.org/security/2006/dsa-988)
18. [19131](http://secunia.com/advisories/19131)
19. [GLSA-200603-09](http://www.gentoo.org/security/en/glsa/glsa-200603-09.xml)
20. [1015662](http://securitytracker.com/id?1015662) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37173
- **State**: PUBLISHED
- **Published Date**: August 30, 2022 at 20:05 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the installer of gvim 9.0.0000 allows authenticated attackers to execute arbitrary code via a binary hijacking attack on C:\Program.exe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ycdxsb/Vuln/tree/main/Gvim-Installer-Vuln) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3894
- **State**: PUBLISHED
- **Published Date**: May 10, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 14:39 UTC
- **Reserved Date**: December 21, 2016 at 00:00 UTC
- **Assigned By**: blackberry
### Vulnerability Description
A stored cross site scripting vulnerability in the Management Console of BlackBerry Unified Endpoint Manager version 12.6.1 and earlier, and all versions of BES12, allows attackers to execute actions in the context of a Management Console administrator by uploading a malicious script and then persuading a target administrator to view the specific location of the malicious script within the Management Console.
### Affected Products
**BlackBerry - Unified Endpoint Manager**
Affected versions:
- before 12.6.2 (Status: affected)
**BlackBerry - BES12**
Affected versions:
- all versions (Status: affected)
### References
1. [98552](http://www.securityfocus.com/bid/98552)
2. [](http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000044565)
3. [1038465](http://www.securitytracker.com/id/1038465) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26990
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 20:18 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 12, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897)
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V13.1.0.1 (Status: affected)
**Siemens - Teamcenter Visualization**
Affected versions:
- All versions < V13.1.0.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-055/)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5670
- **State**: PUBLISHED
- **Published Date**: November 03, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:55 UTC
- **Reserved Date**: November 02, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in forgot_pass.php in Free Image Hosting 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22597](http://secunia.com/advisories/22597)
2. [freeimage-forgot-file-include(29873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29873)
3. [ADV-2006-4229](http://www.vupen.com/english/advisories/2006/4229)
4. [2669](https://www.exploit-db.com/exploits/2669)
5. [20782](http://www.securityfocus.com/bid/20782)
6. [30127](http://www.osvdb.org/30127) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0710
- **State**: PUBLISHED
- **Published Date**: February 16, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: February 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (persistent application crash) via unspecified vectors, possibly related to CVE-2007-0614.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2007-02-15](http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html)
2. [24198](http://secunia.com/advisories/24198)
3. [VU#836024](http://www.kb.cert.org/vuls/id/836024)
4. [1017661](http://www.securitytracker.com/id?1017661)
5. [32713](http://www.osvdb.org/32713)
6. [](http://docs.info.apple.com/article.html?artnum=305102)
7. [22304](http://www.securityfocus.com/bid/22304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32943
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 22:12 UTC
- **Last Updated**: August 02, 2024 at 02:27 UTC
- **Reserved Date**: June 13, 2024 at 14:52 UTC
- **Assigned By**: icscert
### Vulnerability Description
An attacker may be able to cause a denial-of-service condition by sending many SSH packets repeatedly.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-799: Cross-site Scripting (XSS)
### Affected Products
**Westermo - L210-F2G Lynx**
Affected versions:
- 4.21.0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03)
### Credits
- Aviv Malka and Joseph Baum of OTORIO reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15209
- **State**: PUBLISHED
- **Published Date**: September 25, 2020 at 18:45 UTC
- **Last Updated**: August 04, 2024 at 13:08 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 1.15.4 (Status: affected)
- >= 2.0.0, < 2.0.3 (Status: affected)
- >= 2.1.0, < 2.1.2 (Status: affected)
- >= 2.2.0, < 2.2.1 (Status: affected)
- >= 2.3.0, < 2.3.1 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1)
2. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm)
3. [](https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8)
4. [openSUSE-SU-2020:1766](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38925
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 17:10 UTC
- **Last Updated**: September 16, 2024 at 21:08 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.
### Affected Products
**IBM - Sterling B2B Integrator**
Affected versions:
- 5.2.0.0 (Status: affected)
- 6.1.0.0 (Status: affected)
- 6.0.3.4 (Status: affected)
- 6.1.0.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6495905)
2. [ibm-sterling-cve202138925-info-disc (210171)](https://exchange.xforce.ibmcloud.com/vulnerabilities/210171) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7240
- **State**: PUBLISHED
- **Published Date**: January 02, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: December 30, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wordpress.org/support/topic/security-vulnerability-cve-2013-7240-directory-traversal)
2. [[oss-security] 20131230 Re: CVE-request: Dewplayer issues](http://seclists.org/oss-sec/2013/q4/570)
3. [64587](http://www.securityfocus.com/bid/64587)
4. [[oss-security] 20131230 CVE-request: Dewplayer issues](http://seclists.org/oss-sec/2013/q4/566) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6773
- **State**: PUBLISHED
- **Published Date**: June 03, 2019 at 18:15 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 24, 2019 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Reader**
Affected versions:
- 9.4.1.16828 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-447/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3362
- **State**: PUBLISHED
- **Published Date**: April 06, 2024 at 06:31 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 05, 2024 at 06:02 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Online Library System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/books/controller.php. The manipulation of the argument IBSN leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259466 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Online Library System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-259466 | SourceCodester Online Library System controller.php sql injection](https://vuldb.com/?id.259466)
2. [VDB-259466 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259466)
3. [Submit #310426 | https://www.sourcecodester.com/ Online Library System 1.0 SQL Injection](https://vuldb.com/?submit.310426)
4. [](https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-04)
### Credits
- liuann (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2320
- **State**: PUBLISHED
- **Published Date**: May 18, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [connman-netlink-security-bypass(75465)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75465)
2. [](http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618)
3. [81704](http://www.osvdb.org/81704)
4. [[oss-security] 20120507 Re: connman heads up / CVE requests](http://www.openwall.com/lists/oss-security/2012/05/07/6)
5. [GLSA-201205-02](http://security.gentoo.org/glsa/glsa-201205-02.xml)
6. [](http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9)
7. [[oss-security] 20120507 connman heads up / CVE requests](http://www.openwall.com/lists/oss-security/2012/05/07/2)
8. [53406](http://www.securityfocus.com/bid/53406)
9. [[oss-security] 20120507 Re: connman heads up / CVE requests](http://www.openwall.com/lists/oss-security/2012/05/07/10)
10. [49033](http://secunia.com/advisories/49033)
11. [](https://bugzilla.novell.com/show_bug.cgi?id=715172)
12. [49186](http://secunia.com/advisories/49186) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3613
- **State**: PUBLISHED
- **Published Date**: March 27, 2019 at 19:16 UTC
- **Last Updated**: August 05, 2024 at 04:50 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
### Affected Products
**Extensible Firmware Interface Development Kit (EDK II) - Extensible Firmware Interface Development Kit (EDK II)**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://edk2-docs.gitbooks.io/security-advisory/content/authvariable-timestamp-zeroing-on-append_write.html)
2. [FEDORA-2019-bff1cbaba3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/)
3. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us)
4. [RHSA-2019:2125](https://access.redhat.com/errata/RHSA-2019:2125) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10462
- **State**: PUBLISHED
- **Published Date**: October 23, 2019 at 12:45 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.
### Affected Products
**Jenkins project - Jenkins Dynatrace Application Monitoring Plugin**
Affected versions:
- 2.1.3 and earlier (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20%281%29)
2. [[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/10/23/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52342
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 22:01 UTC
- **Last Updated**: November 19, 2024 at 14:01 UTC
- **Reserved Date**: November 08, 2024 at 17:48 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Offshorent Solutions Pvt Ltd. | Jinesh.P.V OS BXSlider allows Stored XSS.This issue affects OS BXSlider: from n/a through 2.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Offshorent Solutions Pvt Ltd. | Jinesh.P.V - OS BXSlider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/os-bxslider/wordpress-os-bxslider-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27629
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 21:26 UTC
- **Reserved Date**: February 23, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EncPSetUnsupported() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**SAP SE - SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server)**
Affected versions:
- < KRNL32NUC - 7.22 (Status: affected)
- < 7.22EXT (Status: affected)
- < KRNL64NUC - 7.22 (Status: affected)
- < 7.49 (Status: affected)
- < KRNL64UC - 8.04 (Status: affected)
- < 7.22 (Status: affected)
- < 7.53 (Status: affected)
- < 7.73 (Status: affected)
- < KERNEL - 7.22 (Status: affected)
- < 8.04 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999)
2. [](https://launchpad.support.sap.com/#/notes/3020104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0997
- **State**: PUBLISHED
- **Published Date**: March 18, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: February 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in AppKit in Apple Mac OS X 10.4.11 allows user-assisted remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted PostScript Printer Description (PPD) file that is not properly handled when querying a network printer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28364](http://www.securityfocus.com/bid/28364)
2. [28304](http://www.securityfocus.com/bid/28304)
3. [TA08-079A](http://www.us-cert.gov/cas/techalerts/TA08-079A.html)
4. [ADV-2008-0924](http://www.vupen.com/english/advisories/2008/0924/references)
5. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html)
6. [macos-appkit-ppd-bo(41282)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41282)
7. [1019648](http://www.securitytracker.com/id?1019648)
8. [](http://docs.info.apple.com/article.html?artnum=307562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2901
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: October 02, 2024 at 20:20 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via DHCP to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
### Affected Products
**Oracle Corporation - Solaris Operating System**
Affected versions:
- 10 (Status: affected)
- 11.2 (Status: affected)
### References
1. [104810](http://www.securityfocus.com/bid/104810)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
3. [1041303](http://www.securitytracker.com/id/1041303) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7861
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 21:13 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Insufficient server-side validation of user input could allow an attacker to bypass file upload restrictions in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
### Affected Products
**n/a - Magento 2**
Affected versions:
- Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 (Status: affected)
### References
1. [](https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5043
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 14:47 UTC
- **Reserved Date**: January 02, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.
### Affected Products
**n/a - Google Chrome prior to 57.0.2987.98 for Linux, Windows and Mac**
Affected versions:
- Google Chrome prior to 57.0.2987.98 for Linux, Windows and Mac (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html)
2. [GLSA-201704-02](https://security.gentoo.org/glsa/201704-02)
3. [DSA-3810](http://www.debian.org/security/2017/dsa-3810)
4. [96767](http://www.securityfocus.com/bid/96767)
5. [RHSA-2017:0499](http://rhn.redhat.com/errata/RHSA-2017-0499.html)
6. [](https://crbug.com/683523) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39637
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:06 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In CreateDeviceInfo of trusty_remote_provisioning_context.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193579873References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1161
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 22:53 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
### Affected Products
**Microsoft - Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Visual Studio 2019**
Affected versions:
- 16.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.5**
Affected versions:
- unspecified (Status: affected)
**Microsoft - ASP.NET Core**
Affected versions:
- 3.1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0123
- **State**: PUBLISHED
- **Published Date**: March 09, 2016 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0116, CVE-2016-0124, CVE-2016-0129, and CVE-2016-0130.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035204](http://www.securitytracker.com/id/1035204)
2. [84114](http://www.securityfocus.com/bid/84114)
3. [MS16-024](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-024)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-16-178) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4001
- **State**: PUBLISHED
- **Published Date**: January 21, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: November 22, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.16 rc2 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2025645)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4699
- **State**: PUBLISHED
- **Published Date**: October 12, 2020 at 13:05 UTC
- **Last Updated**: September 16, 2024 at 20:16 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an attacker to obtain sensitive using timing side channel attacks which could aid in further attacks against the system. IBM X-Force ID: 186947.
### Affected Products
**IBM - Security Access Manager**
Affected versions:
- 9.0.7 (Status: affected)
**IBM - Security Verify Access**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6346619)
2. [ibm-sam-cve20204699-info-disc (186947)](https://exchange.xforce.ibmcloud.com/vulnerabilities/186947) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1685
- **State**: PUBLISHED
- **Published Date**: April 06, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [gcc-weak-security(41686)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41686)
2. [](http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763)
3. [VU#162289](http://www.kb.cert.org/vuls/id/162289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32620
- **State**: PUBLISHED
- **Published Date**: June 30, 2023 at 04:02 UTC
- **Last Updated**: December 04, 2024 at 16:06 UTC
- **Reserved Date**: May 11, 2023 at 04:09 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Improper authentication vulnerability in WL-WN531AX2 firmware versions prior to 2023526 allows a network-adjacent attacker to obtain a password for the wireless network.
### Affected Products
**WAVLINK TECHNOLOGY Ltd. - WL-WN531AX2**
Affected versions:
- firmware versions prior to 2023526 (Status: affected)
### References
1. [](https://www.wavlink.com/en_us/firmware/details/932108ffc5.html)
2. [](https://jvn.jp/en/jp/JVN78634340/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2786
- **State**: PUBLISHED
- **Published Date**: March 10, 2017 at 10:29 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A denial of service vulnerability exists in the psnotifyd application of the Pharos PopUp printer client version 9.0. A specially crafted packet can be sent to the victim's computer and can lead to an out of bounds read causing a crash and a denial of service.
### Affected Products
**Pharos - PopUp Printer Client**
Affected versions:
- 9.0 (Status: affected)
### References
1. [96736](http://www.securityfocus.com/bid/96736)
2. [](http://www.talosintelligence.com/reports/TALOS-2017-0281/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15331
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: August 14, 2018 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP AAM 13.0.0 or 12.1.0-12.1.3.7, the dcdb_convert utility used by BIG-IP AAM fails to drop group permissions when executing helper scripts, which could be used to leverage attacks against the BIG-IP system.
### Affected Products
**F5 Networks, Inc. - BIG-IP (AAM)**
Affected versions:
- 13.0.0, 12.1.0-12.1.3.7 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K54843525) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24906
- **State**: PUBLISHED
- **Published Date**: January 24, 2022 at 08:00 UTC
- **Last Updated**: August 03, 2024 at 19:49 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Protect WP Admin WordPress plugin before 3.6.2 does not check for authorisation in the lib/pwa-deactivate.php file, which could allow unauthenticated users to disable the plugin (and therefore the protection offered) via a crafted request
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Unknown - Protect WP Admin**
Affected versions:
- 3.6.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/4204682b-f657-42e1-941c-bee7a245e9fd)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8546
- **State**: PUBLISHED
- **Published Date**: April 10, 2020 at 18:43 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 12, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with software through 2015-11-12, affecting the Galaxy S6/S6 Edge, Galaxy S6 Edge+, and Galaxy Note5 with the Shannon333 chipset. There is a stack-based buffer overflow in the baseband process that is exploitable for remote code execution via a fake base station. The Samsung ID is SVE-2015-5123 (December 2015).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33651
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 07:09 UTC
- **Last Updated**: August 02, 2024 at 02:36 UTC
- **Reserved Date**: April 25, 2024 at 09:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Matthew Fries MF Gig Calendar.This issue affects MF Gig Calendar : from n/a through 1.2.1.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Matthew Fries - MF Gig Calendar **
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Khalid (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1802
- **State**: PUBLISHED
- **Published Date**: April 02, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: April 02, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in MailDwarf 3.01 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-1166](http://www.vupen.com/english/advisories/2007/1166)
2. [24681](http://secunia.com/advisories/24681)
3. [23207](http://www.securityfocus.com/bid/23207)
4. [maildwarf-unspecified-xss(33322)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33322)
5. [JVN#40511721](http://jvn.jp/jp/JVN%2340511721/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4962
- **State**: PUBLISHED
- **Published Date**: September 23, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in pbd_engine.php in Php Blue Dragon 2.9.1 and earlier allows remote attackers to read and execute arbitrary local files via a .. (dot dot) sequence via the phpExt parameter, as demonstrated by executing PHP code in a log file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22031](http://secunia.com/advisories/22031)
2. [4277](https://www.exploit-db.com/exploits/4277)
3. [ADV-2006-3736](http://www.vupen.com/english/advisories/2006/3736)
4. [phpbluedragon-pbdengine-file-include(29067)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29067)
5. [2402](https://www.exploit-db.com/exploits/2402)
6. [25264](http://www.securityfocus.com/bid/25264)
7. [20123](http://www.securityfocus.com/bid/20123) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6140
- **State**: PUBLISHED
- **Published Date**: February 14, 2009 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 13, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Avaya one-X Desktop Edition 2.1.0.78 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31636](http://www.securityfocus.com/bid/31636)
2. [avaya-onex-sip-dos(45748)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45748)
3. [](http://support.avaya.com/elmodocs2/security/ASA-2008-370.htm)
4. [](http://www.voipshield.com/research-details.php?id=124)
5. [32205](http://secunia.com/advisories/32205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3020
- **State**: PUBLISHED
- **Published Date**: August 31, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: August 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
win32k.sys in Microsoft Windows Server 2003 SP2 allows remote attackers to cause a denial of service (system crash) by referencing a crafted .eot file in the src descriptor of an @font-face Cascading Style Sheets (CSS) rule in an HTML document, possibly related to the Embedded OpenType (EOT) Font Engine, a different vulnerability than CVE-2006-0010, CVE-2009-0231, and CVE-2009-0232. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36250](http://secunia.com/advisories/36250)
2. [](http://milw0rm.com/sploits/2009-wwbsod.zip)
3. [57016](http://www.osvdb.org/57016)
4. [36029](http://www.securityfocus.com/bid/36029)
5. [9417](http://www.exploit-db.com/exploits/9417)
6. [ms-win-opentype-dos(52403)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52403) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0176
- **State**: PUBLISHED
- **Published Date**: April 27, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:03 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in MQ XR WebSockets Listener in WMQ Telemetry in IBM WebSphere MQ 8.0 before 8.0.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URI that is included in an error response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21699549)
2. [1032200](http://www.securitytracker.com/id/1032200) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4054
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 15:15 UTC
- **Reserved Date**: November 17, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to leak a webhook secret token by changing the webhook URL to an endpoint that allows them to capture request headers.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=9.3, <15.4.6 (Status: affected)
- >=15.5, <15.5.5 (Status: affected)
- >=15.6, <15.6.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/382260)
2. [](https://hackerone.com/reports/1758126)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4054.json)
### Credits
- Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5016
- **State**: PUBLISHED
- **Published Date**: July 21, 2014 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: July 21, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to application/views/admin/globalSettings_view.php, or (3) a crafted CSV file to the "Import CSV" functionality.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LimeSurvey/LimeSurvey/commit/d23fbbd6c8434169967cf8bd2c5a4a0b569c352a)
2. [](http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1134
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 14:47 UTC
- **Last Updated**: January 16, 2025 at 21:39 UTC
- **Reserved Date**: March 01, 2023 at 23:21 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Delta Electronics - InfraSuite Device Master**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22511
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 14:57 UTC
- **Last Updated**: January 07, 2025 at 16:22 UTC
- **Reserved Date**: January 07, 2025 at 10:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ella van Durpe Slides & Presentations allows Stored XSS.This issue affects Slides & Presentations: from n/a through 0.0.39.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ella van Durpe - Slides & Presentations**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/slide/vulnerability/wordpress-slides-presentations-plugin-0-0-39-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Caesar Evan Santoso (Patchstack Alliance) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.