System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32842 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 17:38 UTC - **Last Updated**: April 17, 2025 at 14:18 UTC - **Reserved Date**: April 11, 2025 at 13:04 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetUsers' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Siemens - TeleControl Server Basic** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-443402.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0611 - **State**: PUBLISHED - **Published Date**: May 12, 2017 at 15:00 UTC - **Last Updated**: August 05, 2024 at 13:11 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-35393841. References: QC-CR#1084210. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.10 (Status: affected) - Kernel-3.18 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-05-01) 2. [98177](http://www.securityfocus.com/bid/98177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0484 - **State**: PUBLISHED - **Published Date**: June 28, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:58 UTC - **Reserved Date**: June 27, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in viewtopic.php for phpBB allows remote attackers to insert arbitrary web script via the topic_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030621 XSS Exploit In phpBB viewtopic.php](http://marc.info/?l=bugtraq&m=105639883722514&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25715 - **State**: PUBLISHED - **Published Date**: May 28, 2021 at 10:20 UTC - **Last Updated**: August 04, 2024 at 15:40 UTC - **Reserved Date**: September 16, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - pki-core** Affected versions: - pki-core 10.9.0 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1891016)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0089, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0089 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0089 - **State**: PUBLISHED - **Published Date**: April 12, 2016 at 23:00 UTC - **Last Updated**: August 05, 2024 at 22:08 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS16-045](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-045) 2. [1035538](http://www.securitytracker.com/id/1035538)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10563, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10563 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10563 - **State**: PUBLISHED - **Published Date**: May 02, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 07:39 UTC - **Reserved Date**: April 30, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An XSS in Flexense SyncBreeze affects all versions (tested from SyncBreeze Enterprise from v10.1 to v10.7). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20180501 XSS in Flexense SyncBreeze, affects all versions](http://seclists.org/fulldisclosure/2018/May/4) 2. [](http://blog.n0ipr0cs.io/post/2018/04/29/XSS-Flexense-DiskBoss-Enterprise-all-versions)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27728 - **State**: PUBLISHED - **Published Date**: December 24, 2020 at 15:33 UTC - **Last Updated**: August 04, 2024 at 16:18 UTC - **Reserved Date**: October 26, 2020 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description On BIG-IP ASM & Advanced WAF versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.3, under certain conditions, Analytics, Visibility, and Reporting daemon (AVRD) may generate a core file and restart on the BIG-IP system when processing requests sent from mobile devices. ### Affected Products **n/a - BIG-IP ASM & Advanced WAF** Affected versions: - 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3 (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K45143221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0896 - **State**: PUBLISHED - **Published Date**: March 14, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 17:58 UTC - **Reserved Date**: December 01, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926. ### Affected Products **Microsoft Corporation - Windows kernel** Affected versions: - Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 (Status: affected) ### References 1. [103240](http://www.securityfocus.com/bid/103240) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0896) 3. [1040517](http://www.securitytracker.com/id/1040517)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18084 - **State**: PUBLISHED - **Published Date**: February 02, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 20:28 UTC - **Reserved Date**: February 01, 2018 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description The usermacros resource in Atlassian Confluence Server before version 6.3.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the description of a macro. ### Affected Products **Atlassian - Confluence** Affected versions: - prior to 6.3.4 (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/CONFSERVER-54904) 2. [103064](http://www.securityfocus.com/bid/103064)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43568 - **State**: PUBLISHED - **Published Date**: November 09, 2021 at 21:06 UTC - **Last Updated**: August 04, 2024 at 04:03 UTC - **Reserved Date**: November 09, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The verify function in the Stark Bank Elixir ECDSA library (ecdsa-elixir) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/) 2. [](https://github.com/starkbank/ecdsa-elixir/releases/tag/v1.0.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36003 - **State**: PUBLISHED - **Published Date**: May 20, 2024 at 09:48 UTC - **Last Updated**: May 04, 2025 at 09:10 UTC - **Reserved Date**: May 17, 2024 at 13:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ice: fix LAG and VF lock dependency in ice_reset_vf() 9f74a3dfcf83 ("ice: Fix VF Reset paths when interface in a failed over aggregate"), the ice driver has acquired the LAG mutex in ice_reset_vf(). The commit placed this lock acquisition just prior to the acquisition of the VF configuration lock. If ice_reset_vf() acquires the configuration lock via the ICE_VF_RESET_LOCK flag, this could deadlock with ice_vc_cfg_qs_msg() because it always acquires the locks in the order of the VF configuration lock and then the LAG mutex. Lockdep reports this violation almost immediately on creating and then removing 2 VF: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-rc6 #54 Tainted: G W O ------------------------------------------------------ kworker/60:3/6771 is trying to acquire lock: ff40d43e099380a0 (&vf->cfg_lock){+.+.}-{3:3}, at: ice_reset_vf+0x22f/0x4d0 [ice] but task is already holding lock: ff40d43ea1961210 (&pf->lag_mutex){+.+.}-{3:3}, at: ice_reset_vf+0xb7/0x4d0 [ice] which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&pf->lag_mutex){+.+.}-{3:3}: __lock_acquire+0x4f8/0xb40 lock_acquire+0xd4/0x2d0 __mutex_lock+0x9b/0xbf0 ice_vc_cfg_qs_msg+0x45/0x690 [ice] ice_vc_process_vf_msg+0x4f5/0x870 [ice] __ice_clean_ctrlq+0x2b5/0x600 [ice] ice_service_task+0x2c9/0x480 [ice] process_one_work+0x1e9/0x4d0 worker_thread+0x1e1/0x3d0 kthread+0x104/0x140 ret_from_fork+0x31/0x50 ret_from_fork_asm+0x1b/0x30 -> #0 (&vf->cfg_lock){+.+.}-{3:3}: check_prev_add+0xe2/0xc50 validate_chain+0x558/0x800 __lock_acquire+0x4f8/0xb40 lock_acquire+0xd4/0x2d0 __mutex_lock+0x9b/0xbf0 ice_reset_vf+0x22f/0x4d0 [ice] ice_process_vflr_event+0x98/0xd0 [ice] ice_service_task+0x1cc/0x480 [ice] process_one_work+0x1e9/0x4d0 worker_thread+0x1e1/0x3d0 kthread+0x104/0x140 ret_from_fork+0x31/0x50 ret_from_fork_asm+0x1b/0x30 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&pf->lag_mutex); lock(&vf->cfg_lock); lock(&pf->lag_mutex); lock(&vf->cfg_lock); *** DEADLOCK *** 4 locks held by kworker/60:3/6771: #0: ff40d43e05428b38 ((wq_completion)ice){+.+.}-{0:0}, at: process_one_work+0x176/0x4d0 #1: ff50d06e05197e58 ((work_completion)(&pf->serv_task)){+.+.}-{0:0}, at: process_one_work+0x176/0x4d0 #2: ff40d43ea1960e50 (&pf->vfs.table_lock){+.+.}-{3:3}, at: ice_process_vflr_event+0x48/0xd0 [ice] #3: ff40d43ea1961210 (&pf->lag_mutex){+.+.}-{3:3}, at: ice_reset_vf+0xb7/0x4d0 [ice] stack backtrace: CPU: 60 PID: 6771 Comm: kworker/60:3 Tainted: G W O 6.8.0-rc6 #54 Hardware name: Workqueue: ice ice_service_task [ice] Call Trace: <TASK> dump_stack_lvl+0x4a/0x80 check_noncircular+0x12d/0x150 check_prev_add+0xe2/0xc50 ? save_trace+0x59/0x230 ? add_chain_cache+0x109/0x450 validate_chain+0x558/0x800 __lock_acquire+0x4f8/0xb40 ? lockdep_hardirqs_on+0x7d/0x100 lock_acquire+0xd4/0x2d0 ? ice_reset_vf+0x22f/0x4d0 [ice] ? lock_is_held_type+0xc7/0x120 __mutex_lock+0x9b/0xbf0 ? ice_reset_vf+0x22f/0x4d0 [ice] ? ice_reset_vf+0x22f/0x4d0 [ice] ? rcu_is_watching+0x11/0x50 ? ice_reset_vf+0x22f/0x4d0 [ice] ice_reset_vf+0x22f/0x4d0 [ice] ? process_one_work+0x176/0x4d0 ice_process_vflr_event+0x98/0xd0 [ice] ice_service_task+0x1cc/0x480 [ice] process_one_work+0x1e9/0x4d0 worker_thread+0x1e1/0x3d0 ? __pfx_worker_thread+0x10/0x10 kthread+0x104/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x31/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 </TASK> To avoid deadlock, we must acquire the LAG ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - fd7f7a8ad3363fd94fc3868616cc70a1d8dfc01b (Status: affected) - 9f74a3dfcf83e11aedcb98250b8040dbc6d9659a (Status: affected) - 9f74a3dfcf83e11aedcb98250b8040dbc6d9659a (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 6.6.30 (Status: unaffected) - 6.8.9 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/740717774dc37338404d10726967d582414f638c) 2. [](https://git.kernel.org/stable/c/de8631d8c9df08440268630200e64b623a5f69e6) 3. [](https://git.kernel.org/stable/c/96fdd1f6b4ed72a741fb0eb705c0e13049b8721f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2221, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2221 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2221 - **State**: PUBLISHED - **Published Date**: December 21, 2006 at 19:00 UTC - **Last Updated**: September 16, 2024 at 17:39 UTC - **Reserved Date**: December 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in Pedro Lineu Orso chetcpasswd 2.4.1 and earlier allows local users to gain privileges via a modified PATH that references a malicious cp binary. NOTE: this issue might overlap CVE-2006-6639. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23024](http://secunia.com/advisories/23024) 2. [21644](http://www.securityfocus.com/bid/21644) 3. [1005847](http://securitytracker.com/id?1005847)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3712, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3712 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3712 - **State**: PUBLISHED - **Published Date**: August 19, 2008 at 19:10 UTC - **Last Updated**: August 07, 2024 at 09:53 UTC - **Reserved Date**: August 19, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Mambo 4.6.2 and 4.6.5, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) query string to mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php and the (2) mosConfig_sitename parameter to administrator/popups/index3pop.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31528](http://secunia.com/advisories/31528) 2. [mambo-connectorphp-xss(44502)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44502) 3. [mambo-index3pop-xss(44503)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44503) 4. [20080815 Mambo 4.6.2 Full Version - Multiple Cross Site Scripting - By Khashayar Fereidani](http://www.securityfocus.com/archive/1/495507/100/0/threaded) 5. [30708](http://www.securityfocus.com/bid/30708) 6. [4164](http://securityreason.com/securityalert/4164)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3531 - **State**: PUBLISHED - **Published Date**: September 05, 2012 at 23:00 UTC - **Last Updated**: August 06, 2024 at 20:05 UTC - **Reserved Date**: June 14, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Install Tool in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/) 2. [DSA-2537](http://www.debian.org/security/2012/dsa-2537) 3. [[oss-security] 20120822 Re: CVE request: Typo3](http://www.openwall.com/lists/oss-security/2012/08/22/8) 4. [typo3-installtool-unspecified-xss(78888)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78888)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2573 - **State**: PUBLISHED - **Published Date**: March 18, 2024 at 01:00 UTC - **Last Updated**: August 01, 2024 at 19:18 UTC - **Reserved Date**: March 17, 2024 at 08:25 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file /task-info.php. The manipulation leads to execution after redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257076. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-698: Security Weakness ### Affected Products **SourceCodester - Employee Task Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-257076 | SourceCodester Employee Task Management System task-info.php redirect](https://vuldb.com/?id.257076) 2. [VDB-257076 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.257076) 3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md) ### Credits - Joshua Lictan - nochizplz (VulDB User) - nochizplz (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6451 - **State**: PUBLISHED - **Published Date**: January 28, 2020 at 14:56 UTC - **Last Updated**: August 06, 2024 at 17:39 UTC - **Reserved Date**: November 04, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in MediaWiki 1.19.9 before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via unspecified CSS values. ### Affected Products **Wikimedia Foundation - MediaWiki** Affected versions: - 1.19.9 before 1.19.10 (Status: affected) - 1.2x before 1.21.4 (Status: affected) - 1.22.x before 1.22.1 (Status: affected) ### References 1. [](http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7162 - **State**: PUBLISHED - **Published Date**: December 31, 2019 at 14:10 UTC - **Last Updated**: May 30, 2025 at 16:01 UTC - **Reserved Date**: January 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Zoho ManageEngine ADSelfService Plus 5.6 Build 5607. An exposed service allows an unauthenticated person to retrieve internal information from the system and modify the product installation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.excellium-services.com/cert-xlm-advisory/cve-2019-7162/) 2. [](https://www.excellium-services.com/cert-xlm-advisory) 3. [](https://cds.thalesgroup.com/en/tcs-cert/CVE-2019-7162)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5940 - **State**: PUBLISHED - **Published Date**: February 09, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 15:18 UTC - **Reserved Date**: February 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863) 2. [GLSA-201702-03](https://security.gentoo.org/glsa/201702-03) 3. [](https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f) 4. [](https://firejail.wordpress.com/download-2/release-notes/) 5. [](http://www.openwall.com/lists/oss-security/2017/01/31/16) 6. [](https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef) 7. [96221](http://www.securityfocus.com/bid/96221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14418, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14418 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14418 - **State**: PUBLISHED - **Published Date**: January 30, 2021 at 05:26 UTC - **Last Updated**: August 04, 2024 at 12:46 UTC - **Reserved Date**: June 18, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/nettitude/metasploit-modules) 2. [](https://labs.nettitude.com/blog/cve-2020-14418-madcodehook-library-local-privilege-escalation/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1862, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1862 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1862 - **State**: PUBLISHED - **Published Date**: March 20, 2020 at 14:45 UTC - **Last Updated**: August 04, 2024 at 06:53 UTC - **Reserved Date**: November 29, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a double free vulnerability in some Huawei products. A local attacker with low privilege may perform some operations to exploit the vulnerability. Due to doubly freeing memory, successful exploit may cause some service abnormal. Affected product versions include:CampusInsight versions V100R019C00;ManageOne versions 6.5.RC2.B050. ### Affected Products **n/a - CampusInsight;ManageOne** Affected versions: - V100R019C00 (Status: affected) - 6.5.RC2.B050 (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-free-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0820 - **State**: PUBLISHED - **Published Date**: March 12, 2016 at 21:00 UTC - **Last Updated**: August 05, 2024 at 22:30 UTC - **Reserved Date**: December 16, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The MediaTek Wi-Fi kernel driver in Android 6.0.1 before 2016-03-01 allows attackers to gain privileges via a crafted application, aka internal bug 26267358. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [84257](http://www.securityfocus.com/bid/84257) 2. [](http://source.android.com/security/bulletin/2016-03-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53553 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 00:00 UTC - **Last Updated**: February 03, 2025 at 20:33 UTC - **Reserved Date**: November 20, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 allows attackers to bypass authentication via crafted web requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://infosecwriteups.com/exploiting-execute-after-redirect-ear-vulnerability-in-htb-previse-92ea3f1dbf3d) 2. [](https://github.com/Turbul3nce/Vulnerability.Research/tree/main/CVE-2024-53553)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26038 - **State**: PUBLISHED - **Published Date**: July 07, 2021 at 10:12 UTC - **Last Updated**: September 17, 2024 at 03:38 UTC - **Reserved Date**: January 25, 2021 at 00:00 UTC - **Assigned By**: Joomla ### Vulnerability Description An issue was discovered in Joomla! 2.5.0 through 3.9.27. Install action in com_installer lack the required hardcoded ACL checks for superusers. A default system is not affected cause the default ACL for com_installer is limited to super users already. ### Affected Products **Joomla! Project - Joomla! CMS** Affected versions: - 2.5.0-3.9.27 (Status: affected) ### References 1. [](https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34897 - **State**: PUBLISHED - **Published Date**: February 03, 2025 at 00:00 UTC - **Last Updated**: March 18, 2025 at 20:29 UTC - **Reserved Date**: May 09, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Nedis SmartLife android app v1.4.0 was discovered to contain an API key disclosure vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://nedis.com) 2. [](https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-359419)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11273 - **State**: PUBLISHED - **Published Date**: July 23, 2019 at 22:34 UTC - **Last Updated**: September 16, 2024 at 18:04 UTC - **Reserved Date**: April 18, 2019 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description Pivotal Container Services (PKS) versions 1.3.x prior to 1.3.7, and versions 1.4.x prior to 1.4.1, contains a vulnerable component which logs the username and password to the billing database. A remote authenticated user with access to those logs may be able to retrieve non-sensitive information. ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Pivotal - Pivotal Container Service (PKS)** Affected versions: - 1.3.x prior to 1.3.7 (Status: affected) - 1.4.x prior to 1.4.1 (Status: affected) ### References 1. [](https://pivotal.io/security/CVE-2019-11273)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1799 - **State**: PUBLISHED - **Published Date**: April 18, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:27 UTC - **Reserved Date**: April 17, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description censtore.cgi in Censtore 7.3.002 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the page parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1669](https://www.exploit-db.com/exploits/1669) 2. [19666](http://secunia.com/advisories/19666) 3. [censtore-page-command-execution(25905)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25905) 4. [17515](http://www.securityfocus.com/bid/17515) 5. [ADV-2006-1352](http://www.vupen.com/english/advisories/2006/1352)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24005, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24005 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24005 - **State**: PUBLISHED - **Published Date**: July 06, 2021 at 10:56 UTC - **Last Updated**: October 25, 2024 at 13:57 UTC - **Reserved Date**: January 13, 2021 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Fortinet - FortiAuthenticator** Affected versions: - FortiAuthenticator versions before 6.3.0. (Status: affected) ### References 1. [](https://fortiguard.com/psirt/FG-IR-20-049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1101 - **State**: PUBLISHED - **Published Date**: February 26, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 12:43 UTC - **Reserved Date**: February 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Photostand 1.2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) message ("comment") or (2) name field, or the (3) q parameter in a search action in index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [22706](http://www.securityfocus.com/bid/22706) 2. [2296](http://securityreason.com/securityalert/2296) 3. [22707](http://www.securityfocus.com/bid/22707) 4. [photostand-index-xss(32701)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32701) 5. [33773](http://osvdb.org/33773) 6. [ADV-2007-0752](http://www.vupen.com/english/advisories/2007/0752) 7. [20070224 Photostand_1.2.0 Multiple Cross Site Scripting](http://www.securityfocus.com/archive/1/461150/100/0/threaded) 8. [24310](http://secunia.com/advisories/24310)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4061 - **State**: PUBLISHED - **Published Date**: August 10, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 18:57 UTC - **Reserved Date**: August 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in Thomas Pequet phpPrintAnalyzer 1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the rep_par_rapport_racine parameter. NOTE: this issue has been disputed by third party researchers, stating that the rep_par_rapport_racine variable is initialized before use ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016652](http://securitytracker.com/id?1016652) 2. [20060814 Re: phpPrintAnalyzer <= 1.1 (rep_par_rapport_racine) Remote File Inclusion Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2006-08/0305.html) 3. [19397](http://www.securityfocus.com/bid/19397) 4. [29133](http://www.osvdb.org/29133) 5. [20060807 phpPrintAnalyzer <= 1.1 (rep_par_rapport_racine) Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/442492/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54296 - **State**: PUBLISHED - **Published Date**: December 13, 2024 at 14:25 UTC - **Last Updated**: December 13, 2024 at 15:30 UTC - **Reserved Date**: December 02, 2024 at 12:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Authentication Bypass Using an Alternate Path or Channel vulnerability in Codexpert, Inc CoSchool LMS allows Authentication Bypass.This issue affects CoSchool LMS: from n/a through 1.2. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **Codexpert, Inc - CoSchool LMS** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/coschool/vulnerability/wordpress-coschool-lms-plugin-1-2-account-takeover-vulnerability?_s_id=cve) ### Credits - stealthcopter (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52522 - **State**: PUBLISHED - **Published Date**: March 02, 2024 at 21:52 UTC - **Last Updated**: May 04, 2025 at 07:38 UTC - **Reserved Date**: February 20, 2024 at 12:30 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: net: fix possible store tearing in neigh_periodic_work() While looking at a related syzbot report involving neigh_periodic_work(), I found that I forgot to add an annotation when deleting an RCU protected item from a list. Readers use rcu_deference(*np), we need to use either rcu_assign_pointer() or WRITE_ONCE() on writer side to prevent store tearing. I use rcu_assign_pointer() to have lockdep support, this was the choice made in neigh_flush_dev(). ### Affected Products **Linux - Linux** Affected versions: - 767e97e1e0db0d0f3152cd2f3bd3403596aedbad (Status: affected) - 767e97e1e0db0d0f3152cd2f3bd3403596aedbad (Status: affected) - 767e97e1e0db0d0f3152cd2f3bd3403596aedbad (Status: affected) - 767e97e1e0db0d0f3152cd2f3bd3403596aedbad (Status: affected) - 767e97e1e0db0d0f3152cd2f3bd3403596aedbad (Status: affected) - 767e97e1e0db0d0f3152cd2f3bd3403596aedbad (Status: affected) **Linux - Linux** Affected versions: - 2.6.37 (Status: affected) - 0 (Status: unaffected) - 5.4.258 (Status: unaffected) - 5.10.198 (Status: unaffected) - 5.15.135 (Status: unaffected) - 6.1.57 (Status: unaffected) - 6.5.7 (Status: unaffected) - 6.6 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af) 2. [](https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0) 3. [](https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa) 4. [](https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580) 5. [](https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc) 6. [](https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6843 - **State**: PUBLISHED - **Published Date**: July 02, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 11:42 UTC - **Reserved Date**: July 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in index.php in Fantastico, as used with cPanel 11.x, allows remote attackers to read arbitrary files via a .. (dot dot) in the sup3r parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cpanel-index-directory-traversal(46991)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46991) 2. [20081202 Cpanel fantastico Privilege Escalation "ModSec and PHP restriction Bypass"](http://www.securityfocus.com/archive/1/498814/100/0/threaded) 3. [32578](http://www.securityfocus.com/bid/32578)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3923, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3923 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3923 - **State**: PUBLISHED - **Published Date**: November 10, 2009 at 00:00 UTC - **Last Updated**: August 07, 2024 at 06:45 UTC - **Reserved Date**: November 09, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The VirtualBox 2.0.8 and 2.0.10 web service in Sun Virtual Desktop Infrastructure (VDI) 3.0 does not require authentication, which allows remote attackers to obtain unspecified access via vectors involving requests to an Apache HTTP Server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [vdi-authentication-unauth-access(54136)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54136) 2. [268328](http://sunsolve.sun.com/search/document.do?assetkey=1-66-268328-1) 3. [](http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-03-1) 4. [36917](http://www.securityfocus.com/bid/36917)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9357 - **State**: PUBLISHED - **Published Date**: August 28, 2019 at 11:42 UTC - **Last Updated**: August 06, 2024 at 08:51 UTC - **Reserved Date**: August 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The akismet plugin before 3.1.5 for WordPress has XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/akismet/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000355 - **State**: PUBLISHED - **Published Date**: January 29, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 22:00 UTC - **Reserved Date**: January 29, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [98066](http://www.securityfocus.com/bid/98066) 2. [](https://jenkins.io/security/advisory/2017-04-26/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14520 - **State**: PUBLISHED - **Published Date**: August 24, 2022 at 19:43 UTC - **Last Updated**: August 05, 2024 at 09:29 UTC - **Reserved Date**: July 22, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Kirby 2.5.12. The application allows malicious HTTP requests to be sent in order to trick a user into adding web pages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://zaranshaikh.blogspot.com/2018/07/cross-site-request-forgery-kirby-cms.html) 2. [](https://www.exploit-db.com/exploits/45068)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3197 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 14:16 UTC - **Reserved Date**: December 05, 2016 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description GIGABYTE BRIX UEFI firmware for the GB-BSi7H-6500 (version F6) and GB-BXi7-5775 (version F2) platforms does not securely implement BIOSWE, BLE, SMM_BWP, and PRx features. As a result, the BIOS is not protected from arbitrary write access and may permit modifications to the SPI flash. ### Weakness Classification (CWE) - CWE-693: Security Weakness ### Affected Products **GIGABYTE - GB-BSi7H-6500** Affected versions: - F6 (Status: affected) **GIGABYTE - GB-BXi7-5775** Affected versions: - F2 (Status: affected) ### References 1. [](https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2017-01-001.md) 2. [](https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2017-01-002.md) 3. [VU#507496](https://www.kb.cert.org/vuls/id/507496) 4. [97294](http://www.securityfocus.com/bid/97294) 5. [](https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2631 - **State**: PUBLISHED - **Published Date**: December 04, 2009 at 11:00 UTC - **Last Updated**: August 07, 2024 at 05:59 UTC - **Reserved Date**: July 28, 2009 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Multiple clientless SSL VPN products that run in web browsers, including Stonesoft StoneGate; Cisco ASA; SonicWALL E-Class SSL VPN and SonicWALL SSL VPN; SafeNet SecureWire Access Gateway; Juniper Networks Secure Access; Nortel CallPilot; Citrix Access Gateway; and other products, when running in configurations that do not restrict access to the same domain as the VPN, retrieve the content of remote URLs from one domain and rewrite them so they originate from the VPN's domain, which violates the same origin policy and allows remote attackers to conduct cross-site scripting attacks, read cookies that originated from other domains, access the Web VPN session to gain access to internal resources, perform key logging, and conduct other attacks. NOTE: it could be argued that this is a fundamental design problem in any clientless VPN solution, as opposed to a commonly-introduced error that can be fixed in separate implementations. Therefore a single CVE has been assigned for all products that have this design. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37786](http://secunia.com/advisories/37786) 2. [](http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/50/025367-01.pdf) 3. [20091202 Same-origin policy bypass vulnerabilities in several VPN products reported](http://www.securityfocus.com/archive/1/508164/100/0/threaded) 4. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=984744) 5. [VU#261869](http://www.kb.cert.org/vuls/id/261869) 6. [37152](http://www.securityfocus.com/bid/37152) 7. [](http://www.stonesoft.com/en/support/security_advisories/2009_03_12.html) 8. [ADV-2009-3569](http://www.vupen.com/english/advisories/2009/3569) 9. [20060608 SSL VPNs and security](http://seclists.org/fulldisclosure/2006/Jun/238) 10. [1023255](http://securitytracker.com/id?1023255) 11. [ADV-2009-3571](http://www.vupen.com/english/advisories/2009/3571) 12. [20060609 Re: SSL VPNs and security](http://seclists.org/fulldisclosure/2006/Jun/269) 13. [37788](http://secunia.com/advisories/37788) 14. [37696](http://secunia.com/advisories/37696) 15. [](http://www.sonicwall.com/us/2123_14882.html) 16. [](http://www.sonicwall.com/us/2123_14883.html) 17. [ADV-2009-3570](http://www.vupen.com/english/advisories/2009/3570) 18. [sslvpn-sameorigin-security-bypass(54523)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54523) 19. [](http://kb.juniper.net/KB15799) 20. [20060609 Re: SSL VPNs and security](http://seclists.org/fulldisclosure/2006/Jun/270) 21. [ADV-2009-3568](http://www.vupen.com/english/advisories/2009/3568) 22. [ADV-2009-3567](http://www.vupen.com/english/advisories/2009/3567) 23. [37789](http://secunia.com/advisories/37789)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32040 - **State**: PUBLISHED - **Published Date**: April 22, 2024 at 20:36 UTC - **Last Updated**: February 13, 2025 at 17:52 UTC - **Reserved Date**: April 09, 2024 at 15:29 UTC - **Assigned By**: GitHub_M ### Vulnerability Description FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **FreeRDP - FreeRDP** Affected versions: - >= 3.0.0, 3.5.0 (Status: affected) - < 2.11.6 (Status: affected) ### References 1. [https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5) 2. [https://github.com/FreeRDP/FreeRDP/pull/10077](https://github.com/FreeRDP/FreeRDP/pull/10077) 3. [https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6](https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6) 4. [https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0](https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0) 5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/) 6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/) 7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/) 8. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1732 - **State**: PUBLISHED - **Published Date**: March 24, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 23:02 UTC - **Reserved Date**: January 13, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description AppleRAID in Apple OS X before 10.11.4 allows local users to obtain sensitive kernel memory-layout information or cause a denial of service (out-of-bounds read) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html) 2. [](https://support.apple.com/HT206167) 3. [1035363](http://www.securitytracker.com/id/1035363)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0770, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0770 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0770 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 15:48 UTC - **Last Updated**: August 04, 2024 at 06:11 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows ActiveX Installer Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0773, CVE-2020-0860. ### Affected Products **Microsoft - Windows** Affected versions: - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0770)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4652 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45516 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 01:00 UTC - **Last Updated**: August 04, 2024 at 04:39 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by denial of service. This affects R6400 before 1.0.1.70, R7000 before 1.0.11.126, R6900P before 1.3.3.140, R7000P before 1.3.3.140, R8000 before 1.0.4.74, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. ### CVSS Metrics - **CVSS Base Score**: 6.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:N/I:L/PR:H/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064060/Security-Advisory-for-Denial-of-Service-on-Some-Routers-and-WiFi-Systems-PSV-2019-0115)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33031 - **State**: PUBLISHED - **Published Date**: November 07, 2023 at 05:26 UTC - **Last Updated**: February 05, 2025 at 18:06 UTC - **Reserved Date**: May 17, 2023 at 09:28 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in Automotive Audio while copying data from ADSP shared buffer to the VOC packet data buffer. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - APQ8017 (Status: affected) - APQ8064AU (Status: affected) - AQT1000 (Status: affected) - AR8031 (Status: affected) - AR8035 (Status: affected) - C-V2X 9150 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - FastConnect 6200 (Status: affected) - FastConnect 6700 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Flight RB5 5G Platform (Status: affected) - MDM9628 (Status: affected) - MDM9640 (Status: affected) - MDM9650 (Status: affected) - MSM8108 (Status: affected) - MSM8209 (Status: affected) - MSM8608 (Status: affected) - MSM8996AU (Status: affected) - QAM8255P (Status: affected) - QAM8295P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QCA6174A (Status: affected) - QCA6310 (Status: affected) - QCA6335 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6564A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCA9377 (Status: affected) - QCC710 (Status: affected) - QCM4325 (Status: affected) - QCM6490 (Status: affected) - QCM8550 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN9011 (Status: affected) - QCN9012 (Status: affected) - QCN9074 (Status: affected) - QCS410 (Status: affected) - QCS610 (Status: affected) - QCS6490 (Status: affected) - QCS7230 (Status: affected) - QCS8250 (Status: affected) - QCS8550 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - QRB5165M (Status: affected) - QRB5165N (Status: affected) - Qualcomm 205 Mobile Platform (Status: affected) - Qualcomm 215 Mobile Platform (Status: affected) - Qualcomm Video Collaboration VC1 Platform (Status: affected) - Qualcomm Video Collaboration VC3 Platform (Status: affected) - Qualcomm Video Collaboration VC5 Platform (Status: affected) - Robotics RB3 Platform (Status: affected) - Robotics RB5 Platform (Status: affected) - SA4150P (Status: affected) - SA4155P (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8255P (Status: affected) - SA8295P (Status: affected) - SD660 (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SDM429W (Status: affected) - SDX55 (Status: affected) - SG4150P (Status: affected) - SG8275P (Status: affected) - SM7250P (Status: affected) - SM8550P (Status: affected) - Smart Audio 200 Platform (Status: affected) - Smart Audio 400 Platform (Status: affected) - Snapdragon 208 Processor (Status: affected) - Snapdragon 210 Processor (Status: affected) - Snapdragon 212 Mobile Platform (Status: affected) - Snapdragon 4 Gen 1 Mobile Platform (Status: affected) - Snapdragon 429 Mobile Platform (Status: affected) - Snapdragon 480 5G Mobile Platform (Status: affected) - Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected) - Snapdragon 660 Mobile Platform (Status: affected) - Snapdragon 680 4G Mobile Platform (Status: affected) - Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected) - Snapdragon 690 5G Mobile Platform (Status: affected) - Snapdragon 695 5G Mobile Platform (Status: affected) - Snapdragon 750G 5G Mobile Platform (Status: affected) - Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected) - Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected) - Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected) - Snapdragon 8 Gen 2 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 2 Mobile Platform (Status: affected) - Snapdragon 820 Automotive Platform (Status: affected) - Snapdragon 845 Mobile Platform (Status: affected) - Snapdragon 855 Mobile Platform (Status: affected) - Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon Auto 5G Modem-RF (Status: affected) - Snapdragon W5+ Gen 1 Wearable Platform (Status: affected) - Snapdragon Wear 4100+ Platform (Status: affected) - Snapdragon X12 LTE Modem (Status: affected) - Snapdragon X5 LTE Modem (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR2130 (Status: affected) - WCD9326 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9360 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WCN3610 (Status: affected) - WCN3615 (Status: affected) - WCN3620 (Status: affected) - WCN3660B (Status: affected) - WCN3680 (Status: affected) - WCN3680B (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35785 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 12:24 UTC - **Last Updated**: May 04, 2025 at 09:05 UTC - **Reserved Date**: May 17, 2024 at 12:19 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix kernel panic caused by incorrect error handling The error path while failing to register devices on the TEE bus has a bug leading to kernel panic as follows: [ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c [ 15.406913] Mem abort info: [ 15.409722] ESR = 0x0000000096000005 [ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits [ 15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW = 0 [ 15.425031] FSC = 0x05: level 1 translation fault [ 15.429922] Data abort info: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000 [ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration") lead to the introduction of this bug. So fix it appropriately. ### Affected Products **Linux - Linux** Affected versions: - a953e45ebeae9a5ce342c012f7eb2a92cc8af89b (Status: affected) - 01c13d8a95e0909f0081d6e3e8a891761992371b (Status: affected) - 1c9561b438cbe61e78515fc7b16dc7fb8cf0b763 (Status: affected) - d3c4786b01aad8c377718f92d6d9b15906ee0a2a (Status: affected) - 7269cba53d906cf257c139d3b3a53ad272176bca (Status: affected) - 7269cba53d906cf257c139d3b3a53ad272176bca (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 5.10.215 (Status: unaffected) - 5.15.154 (Status: unaffected) - 6.1.84 (Status: unaffected) - 6.6.24 (Status: unaffected) - 6.7.12 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4) 2. [](https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7) 3. [](https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95) 4. [](https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee) 5. [](https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3) 6. [](https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3988 - **State**: PUBLISHED - **Published Date**: December 11, 2019 at 22:39 UTC - **Last Updated**: August 04, 2024 at 19:26 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when configuring the devices wifi configuration via the bssid parameter. ### Affected Products **n/a - Amazon's Blink XT2 Sync Module** Affected versions: - All firmware versions prior to version 2.13.11 (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2019-51)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0094 - **State**: PUBLISHED - **Published Date**: January 08, 2008 at 02:00 UTC - **Last Updated**: August 07, 2024 at 07:32 UTC - **Reserved Date**: January 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in MODx Content Management System 0.9.6.1 allow remote attackers to (1) include and execute arbitrary local files via a .. (dot dot) in the as_language parameter to assets/snippets/AjaxSearch/AjaxSearch.php, reached through index-ajax.php; and (2) read arbitrary local files via a .. (dot dot) in the file parameter to assets/js/htcmime.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [3522](http://securityreason.com/securityalert/3522) 2. [28220](http://secunia.com/advisories/28220) 3. [](http://modxcms.com/forums/index.php/topic%2C21290.0.html) 4. [modx-ajaxsearch-file-include(39352)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39352) 5. [27097](http://www.securityfocus.com/bid/27097) 6. [20080102 MODx CMS Source code disclosure, local file inclusion](http://www.securityfocus.com/archive/1/485707/100/0/threaded) 7. [27096](http://www.securityfocus.com/bid/27096)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5088 - **State**: REJECTED - **Published Date**: January 05, 2021 at 19:04 UTC - **Last Updated**: January 05, 2021 at 19:04 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8340, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8340 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8340 - **State**: PUBLISHED - **Published Date**: September 15, 2020 at 14:20 UTC - **Last Updated**: September 17, 2024 at 01:25 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description A cross-site scripting (XSS) vulnerability was discovered in the legacy IBM and Lenovo System x IMM2 (Integrated Management Module 2), prior to version 5.60, embedded Baseboard Management Controller (BMC) web interface during an internal security review. This vulnerability could allow JavaScript code to be executed in the user's web browser if the user is convinced to visit a crafted URL, possibly through phishing. Successful exploitation requires specific knowledge about the user’s network to be included in the crafted URL. Impact is limited to the normal access restrictions and permissions of the user clicking the crafted URL, and subject to the user being able to connect to and already being authenticated to IMM2 or other systems. The JavaScript code is not executed on IMM2 itself. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Lenovo - System x IMM2 firmware for: x240, Machine Types: 7162, 2588; x440, Machine Type 7167, 2590 ; x3750 M4, Machine Type: 8753 ; x3250 M6, Machine type 3633, 3943 ; nx360 M5, Machine type 5465, 5467 ; x280/x480/x880 X6 , Machine Type 7196, 4258 ; x3850 X6 and x3950 X6, Machine type 6241 ; x3550 M5, Machine Type 5463, 8869 ; x3650 M5, Machine Type 5462, 8871; x3500 M5, Machine Type 5464, 5478** Affected versions: - unspecified (Status: affected) **Lenovo - System x IMM2 firmware for x240 M5, Machine Types: 9532, 2591** Affected versions: - unspecified (Status: affected) **IBM - System x IMM2 firmware** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-44717)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9302 - **State**: REJECTED - **Published Date**: December 06, 2016 at 18:00 UTC - **Last Updated**: December 06, 2016 at 18:57 UTC - **Reserved Date**: November 14, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2180 - **State**: PUBLISHED - **Published Date**: August 15, 2022 at 08:36 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: June 22, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The GREYD.SUITE WordPress theme does not properly validate uploaded custom font packages, and does not perform any authorization or csrf checks, allowing an unauthenticated attacker to upload arbitrary files including php source files, leading to possible remote code execution (RCE). ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Unknown - greyd_suite** Affected versions: - 1.2.7 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/c330f92b-1e21-414f-b316-d5e97cb62bd1) ### Credits - Bernhard Kau
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-43901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-43901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-43901 - **State**: REJECTED - **Last Updated**: April 19, 2025 at 02:55 UTC - **Reserved Date**: April 18, 2025 at 14:46 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22371 - **State**: PUBLISHED - **Published Date**: January 04, 2023 at 17:31 UTC - **Last Updated**: April 10, 2025 at 13:54 UTC - **Reserved Date**: January 03, 2022 at 22:29 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 221195. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **IBM - Sterling B2B Integrator Standard Edition** Affected versions: - 6.0.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6852461) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/221195)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2718 - **State**: PUBLISHED - **Published Date**: June 12, 2023 at 17:28 UTC - **Last Updated**: August 02, 2024 at 06:33 UTC - **Reserved Date**: May 15, 2023 at 18:27 UTC - **Assigned By**: WPScan ### Vulnerability Description The Contact Form Email WordPress plugin before 1.3.38 does not escape submitted values before displaying them in the HTML, leading to a Stored XSS vulnerability. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Contact Form Email** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/8ad824a6-2d49-4f02-8252-393c59aa9705) 2. [](https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins) ### Credits - Andreas Damen - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27489, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27489 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27489 - **State**: PUBLISHED - **Published Date**: February 16, 2023 at 18:06 UTC - **Last Updated**: October 23, 2024 at 14:46 UTC - **Reserved Date**: March 21, 2022 at 16:03 UTC - **Assigned By**: fortinet ### Vulnerability Description A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.0.0 through 7.0.3, 5.3.2, 4.2.4 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests. ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Fortinet - FortiExtender** Affected versions: - 7.0.0 (Status: affected) - 5.3.2 (Status: affected) - 4.2.0 (Status: affected) - 4.1.1 (Status: affected) - 4.0.0 (Status: affected) - 3.3.0 (Status: affected) - 3.2.1 (Status: affected) - 3.1.0 (Status: affected) - 3.0.0 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-22-048](https://fortiguard.com/psirt/FG-IR-22-048)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18951 - **State**: PUBLISHED - **Published Date**: November 13, 2019 at 22:38 UTC - **Last Updated**: August 05, 2024 at 02:02 UTC - **Reserved Date**: November 13, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SibSoft Xfilesharing through 2.5.1 allows op=page&tmpl=../ directory traversal to read arbitrary files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/pak0s/af9f640170aed335fdf6d110d468dbce) 2. [](http://packetstormsecurity.com/files/155324/Xfilesharing-2.5.1-Local-File-Inclusion-Shell-Upload.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46131 - **State**: PUBLISHED - **Published Date**: December 20, 2023 at 23:24 UTC - **Last Updated**: August 02, 2024 at 20:37 UTC - **Reserved Date**: October 16, 2023 at 17:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Grails is a framework used to build web applications with the Groovy programming language. A specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable. This issue has been patched in version 3.3.17, 4.1.3, 5.3.4, 6.1.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **grails - grails-core** Affected versions: - >= 6.0.0, < 6.1.0 (Status: affected) - >= 5.0.0, < 5.3.4 (Status: affected) - >= 4.0.0, < 4.1.3 (Status: affected) - >= 2.0.0, < 3.3.17 (Status: affected) ### References 1. [https://github.com/grails/grails-core/security/advisories/GHSA-3pjv-r7w4-2cf5](https://github.com/grails/grails-core/security/advisories/GHSA-3pjv-r7w4-2cf5) 2. [https://github.com/grails/grails-core/issues/13302](https://github.com/grails/grails-core/issues/13302) 3. [https://github.com/grails/grails-core/commit/74326bdd2cf7dcb594092165e9464520f8366c60](https://github.com/grails/grails-core/commit/74326bdd2cf7dcb594092165e9464520f8366c60) 4. [https://github.com/grails/grails-core/commit/c401faaa6c24c021c758b95f72304a0e855a8db3](https://github.com/grails/grails-core/commit/c401faaa6c24c021c758b95f72304a0e855a8db3) 5. [https://grails.org/blog/2023-12-20-cve-data-binding-dos.html](https://grails.org/blog/2023-12-20-cve-data-binding-dos.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0725 - **State**: PUBLISHED - **Published Date**: February 08, 2023 at 01:08 UTC - **Last Updated**: January 13, 2025 at 17:06 UTC - **Reserved Date**: February 07, 2023 at 17:21 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_clone_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Affected Products **wickedplugins - Wicked Folders** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/80797183-c69f-4dce-a2e0-52a395ceffaa) 2. [](https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4607 - **State**: PUBLISHED - **Published Date**: February 12, 2020 at 13:49 UTC - **Last Updated**: August 06, 2024 at 11:20 UTC - **Reserved Date**: June 23, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html) 2. [](https://web.archive.org/web/20140701023922/http://www.oberhumer.com/opensource/lzo/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1767 - **State**: PUBLISHED - **Published Date**: July 14, 2015 at 21:00 UTC - **Last Updated**: August 06, 2024 at 04:54 UTC - **Reserved Date**: February 17, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2401 and CVE-2015-2408. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032894](http://www.securitytracker.com/id/1032894) 2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-568) 3. [MS15-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42970 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 00:00 UTC - **Last Updated**: February 05, 2025 at 20:17 UTC - **Reserved Date**: October 17, 2022 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-306: Missing Authentication for Critical Function The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261) ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **Schneider Electric - APC Easy UPS Online Monitoring Software** Affected versions: - Windows 7, 10, 11 Windows Server 2016, 2019, 2022 (Status: affected) **Schneider Electric - APC Easy UPS Online Monitoring Software** Affected versions: - (Windows 11, Windows Server 2019, 2022 (Status: affected) **Schneider Electric - Schneider Electric Easy UPS Online Monitoring Software** Affected versions: - Windows 7, 10, 11 Windows Server 2016, 2019, 2022 (Status: affected) **Schneider Electric - Schneider Electric Easy UPS Online Monitoring Software** Affected versions: - Windows 11, Windows Server 2019, 2022 (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11720 - **State**: PUBLISHED - **Published Date**: December 14, 2024 at 08:26 UTC - **Last Updated**: December 16, 2024 at 16:40 UTC - **Reserved Date**: November 25, 2024 at 18:46 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via submission forms in all versions up to, and including, 3.24.5 due to insufficient input sanitization and output escaping on the new Taxonomy form. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is only exploitable when lower-level users have been granted access to submit specific forms, which is disabled by default. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **shabti - Frontend Admin by DynamiApps** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/69a464f4-c357-446f-a5b8-0919d9af56c9?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3204192%40acf-frontend-form-element&new=3204192%40acf-frontend-form-element&sfp_email=&sfph_mail=#file32) ### Credits - Max Boll
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47140 - **State**: PUBLISHED - **Published Date**: January 15, 2025 at 14:59 UTC - **Last Updated**: January 15, 2025 at 17:02 UTC - **Reserved Date**: October 16, 2024 at 16:03 UTC - **Assigned By**: talos ### Vulnerability Description A cross-site scripting (xss) vulnerability exists in the add_alert_check page of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Observium - Observium** Affected versions: - CE 24.4.13528 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2090](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2090) ### Credits - Discovered by Marcin &#39;Icewall&#39; Noga of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3564, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3564 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3564 - **State**: PUBLISHED - **Published Date**: January 18, 2012 at 22:00 UTC - **Last Updated**: September 16, 2024 at 20:07 UTC - **Reserved Date**: September 16, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle GlassFish Enterprise Server 2.1.1 allows local users to affect confidentiality via unknown vectors related to Administration. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43662 - **State**: PUBLISHED - **Published Date**: January 09, 2023 at 02:23 UTC - **Last Updated**: April 09, 2025 at 14:11 UTC - **Reserved Date**: November 24, 2022 at 11:48 UTC - **Assigned By**: OpenHarmony ### Vulnerability Description Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **OpenHarmony - OpenHarmony** Affected versions: - 3.1.0 (Status: affected) - 3.0.0 (Status: affected) - 1.1.0 (Status: affected) ### References 1. [](https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0875 - **State**: PUBLISHED - **Published Date**: February 15, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 04:26 UTC - **Reserved Date**: January 08, 2015 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description The Ogaki Kyoritsu Bank Smartphone Passbook application 1.0.0 for Android creates a log file containing input data from the user, which allows attackers to obtain sensitive information by reading a file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVNDB-2015-000016](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000016) 2. [JVN#48659722](http://jvn.jp/en/jp/JVN48659722/index.html) 3. [](http://www.okb.co.jp/okdirect/sp_passbook/information01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4957, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4957 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4957 - **State**: PUBLISHED - **Published Date**: December 03, 2023 at 19:00 UTC - **Last Updated**: June 03, 2025 at 02:17 UTC - **Reserved Date**: December 02, 2023 at 07:53 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in librespeed speedtest up to 5.2.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file results/stats.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. Upgrading to version 5.2.5 is able to address this issue. The patch is named a85f2c086f3449dffa8fe2edb5e2ef3ee72dc0e9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-246643. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **librespeed - speedtest** Affected versions: - 5.2.0 (Status: affected) - 5.2.1 (Status: affected) - 5.2.2 (Status: affected) - 5.2.3 (Status: affected) - 5.2.4 (Status: affected) ### References 1. [](https://vuldb.com/?id.246643) 2. [](https://vuldb.com/?ctiid.246643) 3. [](https://github.com/librespeed/speedtest/commit/a85f2c086f3449dffa8fe2edb5e2ef3ee72dc0e9) 4. [](https://github.com/librespeed/speedtest/releases/tag/5.2.5) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5915, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5915 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5915 - **State**: PUBLISHED - **Published Date**: September 17, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:03 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Tigo Copa Mundial FIFA 2014 (aka com.fwc2014.millicom.and) application 3.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#179897](http://www.kb.cert.org/vuls/id/179897) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1837 - **State**: PUBLISHED - **Published Date**: May 23, 2023 at 18:23 UTC - **Last Updated**: January 17, 2025 at 17:44 UTC - **Reserved Date**: April 04, 2023 at 14:59 UTC - **Assigned By**: HYPR ### Vulnerability Description Missing Authentication for critical function vulnerability in HYPR Server allows Authentication Bypass when using Legacy APIs.This issue affects HYPR Server: before 8.0 (with enabled Legacy APIs) ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **HYPR - HYPR Server** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.hypr.com/security-advisories)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27422 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 10:15 UTC - **Last Updated**: September 25, 2024 at 16:51 UTC - **Reserved Date**: March 01, 2023 at 14:31 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NsThemes NS Coupon To Become Customer plugin <= 1.2.2 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **NsThemes - NS Coupon To Become Customer** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ns-coupon-to-become-customer/wordpress-ns-coupon-to-become-customer-plugin-1-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Pavitra Tiwari (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21396 - **State**: PUBLISHED - **Published Date**: February 13, 2024 at 18:02 UTC - **Last Updated**: May 09, 2025 at 18:24 UTC - **Reserved Date**: December 08, 2023 at 22:45 UTC - **Assigned By**: microsoft ### Vulnerability Description Dynamics 365 Sales Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Microsoft - Microsoft Dynamics 365 (on-premises) version 9.1** Affected versions: - 9.0 (Status: affected) ### References 1. [Dynamics 365 Sales Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21396)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10832 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 02:40 UTC - **Last Updated**: December 04, 2024 at 14:09 UTC - **Reserved Date**: November 04, 2024 at 23:08 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Posti Shipping plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.10.3. This is due to missing or incorrect nonce validation on the generate_notices_html() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **jooseposti - Posti Shipping** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/079c77f1-3aab-4457-ad66-a2a2d9a55b2e?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/posti-shipping/tags/3.10.3/core/class-shipping-method.php#L87) 3. [](https://plugins.trac.wordpress.org/browser/posti-shipping/tags/3.10.3/core/class-shipping-method.php#L104) 4. [](https://wordpress.org/plugins/posti-shipping/#developers) ### Credits - Dale Mavers
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4034 - **State**: PUBLISHED - **Published Date**: December 06, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: December 06, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Web4Future eDating Professional 5 allow remote attackers to execute arbitrary SQL commands via the (1) s, (2) pg, and (3) sortb parameters to (a) index.php; (4) cid parameter to (b) gift.php and (c) fq.php; and (5) cat parameter to (d) articles.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels0.blogspot.com/2005/12/web4future-edating-professional-v5-sql.html) 2. [17879](http://secunia.com/advisories/17879) 3. [ADV-2005-2734](http://www.vupen.com/english/advisories/2005/2734) 4. [21419](http://www.osvdb.org/21419) 5. [21418](http://www.osvdb.org/21418) 6. [15715](http://www.securityfocus.com/bid/15715) 7. [21421](http://www.osvdb.org/21421) 8. [21420](http://www.osvdb.org/21420)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41997 - **State**: PUBLISHED - **Published Date**: October 14, 2024 at 00:00 UTC - **Last Updated**: October 16, 2024 at 19:31 UTC - **Reserved Date**: July 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/warpdotdev/warp) 2. [](https://gist.github.com/bhyh/d1ee7a825fce283bf8acbdb42c8a7832) 3. [](https://docs.warp.dev/getting-started/changelog#id-2024.07.18-v0.2024.07.16.08.02) 4. [](https://docs.warp.dev/features/integrations-and-plugins#docker)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4439, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4439 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4439 - **State**: PUBLISHED - **Published Date**: January 19, 2011 at 16:00 UTC - **Last Updated**: August 07, 2024 at 03:43 UTC - **Reserved Date**: December 06, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft and JDEdwards Suite 9.0 Bundle #14 and 9.1 Bundle #4 allows remote authenticated users to affect confidentiality via unknown vectors related to eProfile - Manager Desktop. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2011-0147](http://www.vupen.com/english/advisories/2011/0147) 2. [70574](http://osvdb.org/70574) 3. [1024978](http://www.securitytracker.com/id?1024978) 4. [peoplesoft-eprofile-info-disclosure(64794)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64794) 5. [45866](http://www.securityfocus.com/bid/45866) 6. [42982](http://secunia.com/advisories/42982) 7. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1154 - **State**: PUBLISHED - **Published Date**: December 22, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:39 UTC - **Reserved Date**: December 07, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.samba.org/samba/security/CAN-2004-1154.html) 2. [101643](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1) 3. [oval:org.mitre.oval:def:10236](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236) 4. [11973](http://www.securityfocus.com/bid/11973) 5. [samba-msrpc-heap-corruption(18519)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18519) 6. [RHSA-2005:020](http://www.redhat.com/support/errata/RHSA-2005-020.html) 7. [oval:org.mitre.oval:def:642](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642) 8. [13453](http://secunia.com/advisories/13453/) 9. [DSA-701](http://www.debian.org/security/2005/dsa-701) 10. [APPLE-SA-2005-03-21](http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html) 11. [57730](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1) 12. [20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability](http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities) 13. [SUSE-SA:2004:045](http://www.novell.com/linux/security/advisories/2004_45_samba.html) 14. [oval:org.mitre.oval:def:1459](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459) 15. [SCOSA-2005.17](ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt) 16. [VU#226184](http://www.kb.cert.org/vuls/id/226184)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1559, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1559 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1559 - **State**: PUBLISHED - **Published Date**: April 05, 2011 at 15:00 UTC - **Last Updated**: September 16, 2024 at 20:32 UTC - **Reserved Date**: April 05, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the IBM Web Interface for Content Management (aka WEBi) 1.0.4 before FP3 has unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IO13806](http://www-01.ibm.com/support/docview.wss?uid=swg1IO13806) 2. [](http://www.ibm.com/support/docview.wss?uid=swg24029060) 3. [43993](http://secunia.com/advisories/43993)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2848 - **State**: PUBLISHED - **Published Date**: July 26, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: April 03, 2015 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#857948](http://www.kb.cert.org/vuls/id/857948)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19643 - **State**: PUBLISHED - **Published Date**: August 14, 2020 at 14:02 UTC - **Last Updated**: August 05, 2024 at 02:25 UTC - **Reserved Date**: December 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ise smart connect KNX Vaillant 1.2.839 contain a Denial of Service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://psytester.github.io/CVE-2019-19643/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7928, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7928 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7928 - **State**: PUBLISHED - **Published Date**: January 22, 2015 at 22:00 UTC - **Last Updated**: August 06, 2024 at 13:03 UTC - **Reserved Date**: October 06, 2014 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description hydrogen.cc in Google V8, as used Google Chrome before 40.0.2214.91, does not properly handle arrays with holes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers an array copy. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [62665](http://secunia.com/advisories/62665) 2. [](https://codereview.chromium.org/737383002) 3. [](http://googlechromereleases.blogspot.com/2015/01/stable-update.html) 4. [62575](http://secunia.com/advisories/62575) 5. [USN-2476-1](http://www.ubuntu.com/usn/USN-2476-1) 6. [72288](http://www.securityfocus.com/bid/72288) 7. [GLSA-201502-13](http://security.gentoo.org/glsa/glsa-201502-13.xml) 8. [](https://code.google.com/p/chromium/issues/detail?id=435073) 9. [1031623](http://www.securitytracker.com/id/1031623) 10. [openSUSE-SU-2015:0441](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html) 11. [RHSA-2015:0093](http://rhn.redhat.com/errata/RHSA-2015-0093.html) 12. [62383](http://secunia.com/advisories/62383)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8484 - **State**: PUBLISHED - **Published Date**: September 25, 2024 at 02:05 UTC - **Last Updated**: September 25, 2024 at 13:23 UTC - **Reserved Date**: September 05, 2024 at 16:07 UTC - **Assigned By**: Wordfence ### Vulnerability Description The REST API TO MiniProgram plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the /wp-json/watch-life-net/v1/comment/getcomments REST API endpoint in all versions up to, and including, 4.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **xjb - REST API TO MiniProgram** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0945eb-ceec-4536-822a-fe864c21b580?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-comments-controller.php#L247) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29637 - **State**: REJECTED - **Last Updated**: February 15, 2024 at 05:31 UTC - **Reserved Date**: March 30, 2021 at 17:16 UTC - **Assigned By**: freebsd ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3606, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3606 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3606 - **State**: PUBLISHED - **Published Date**: September 24, 2010 at 19:44 UTC - **Last Updated**: August 07, 2024 at 03:18 UTC - **Reserved Date**: September 24, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in AGENTS/index.php in NetArt MEDIA Real Estate Portal 2.0 allow remote emote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) folder and (2) action parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [68062](http://osvdb.org/68062) 2. [](http://pridels-team.blogspot.com/2010/09/netartmedia-real-estate-portal-v20-xss.html) 3. [43266](http://www.securityfocus.com/bid/43266) 4. [41377](http://secunia.com/advisories/41377) 5. [realestateportal-index-file-include(61867)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61867)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24194 - **State**: PUBLISHED - **Published Date**: June 06, 2024 at 21:23 UTC - **Last Updated**: February 13, 2025 at 15:47 UTC - **Reserved Date**: January 25, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description robdns commit d76d2e6 was discovered to contain a NULL pointer dereference via the item->tokens component at /src/conf-parse.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/robertdavidgraham/robdns/issues/10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22620, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22620 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22620 - **State**: PUBLISHED - **Published Date**: April 12, 2023 at 00:00 UTC - **Last Updated**: February 13, 2025 at 16:43 UTC - **Reserved Date**: January 04, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rcesecurity.com) 2. [](https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt) 3. [20230418 [CVE-2023-22620] SecurePoint UTM <= 12.2.5 "spcgi.cgi" sessionId Information Disclosure Allowing Device Takeover](http://seclists.org/fulldisclosure/2023/Apr/7) 4. [](http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43398 - **State**: PUBLISHED - **Published Date**: November 08, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 13:32 UTC - **Reserved Date**: October 18, 2022 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-384: Security Weakness ### Affected Products **Siemens - POWER METER SICAM Q100** Affected versions: - All versions < V2.50 (Status: affected) **Siemens - POWER METER SICAM Q100** Affected versions: - All versions < V2.50 (Status: affected) **Siemens - POWER METER SICAM Q100** Affected versions: - All versions < V2.50 (Status: affected) **Siemens - POWER METER SICAM Q100** Affected versions: - All versions < V2.50 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0982, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0982 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0982 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 24, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Internet Explorer before 5.5 forwards cached user credentials for a secure web site to insecure pages on the same web site, which could allow remote attackers to obtain the credentials by monitoring connections to the web server, aka the "Cached Web Credentials" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1793](http://www.securityfocus.com/bid/1793) 2. [](http://www.acrossecurity.com/aspr/ASPR-2000-07-22-2-PUB.txt) 3. [ie-cache-info(5367)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5367) 4. [MS00-076](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-076)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34906 - **State**: PUBLISHED - **Published Date**: January 13, 2022 at 21:43 UTC - **Last Updated**: August 04, 2024 at 00:26 UTC - **Reserved Date**: June 17, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14879. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Bentley - View** Affected versions: - 10.15.0.75 (Status: affected) ### References 1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0006) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1495/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23999, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23999 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23999 - **State**: PUBLISHED - **Published Date**: February 11, 2022 at 17:40 UTC - **Last Updated**: August 03, 2024 at 03:59 UTC - **Reserved Date**: January 26, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description PendingIntent hijacking vulnerability in CpaReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent. ### CVSS Metrics - **CVSS Base Score**: 3.9/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Samsung Mobile - Samsung Mobile Devices ** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23651 - **State**: PUBLISHED - **Published Date**: January 31, 2024 at 21:49 UTC - **Last Updated**: May 29, 2025 at 15:03 UTC - **Reserved Date**: January 19, 2024 at 00:18 UTC - **Assigned By**: GitHub_M ### Vulnerability Description BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **moby - buildkit** Affected versions: - < 0.12.5 (Status: affected) ### References 1. [https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv](https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv) 2. [https://github.com/moby/buildkit/pull/4604](https://github.com/moby/buildkit/pull/4604) 3. [https://github.com/moby/buildkit/releases/tag/v0.12.5](https://github.com/moby/buildkit/releases/tag/v0.12.5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1236 - **State**: PUBLISHED - **Published Date**: April 24, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:44 UTC - **Reserved Date**: April 24, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in DUware DUportal 3.1.2 and 3.1.2 SQL allow remote attackers to execute arbitrary SQL commands via the (1) iChannel parameter to channel.asp or search.asp, (2) iData parameter to detail.asp or inc_rating.asp, (3) iCat parameter to detail.asp or type.asp, (4) DAT_PARENT parameter to inc_poll_voting.asp, or (5) iRate parameter to inc_rating.asp, a different set of vulnerabilities than CVE-2005-1224. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.digitalparadox.org/advisories/dup.txt) 2. [15044](http://secunia.com/advisories/15044) 3. [13288](http://www.securityfocus.com/bid/13288)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27173, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27173 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27173 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:19 UTC - **Reserved Date**: April 05, 2022 at 15:11 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9060, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9060 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9060 - **State**: PUBLISHED - **Published Date**: June 01, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 16:55 UTC - **Reserved Date**: May 18, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201706-03](https://security.gentoo.org/glsa/201706-03) 2. [98632](http://www.securityfocus.com/bid/98632) 3. [[oss-security] 20170519 CVE-2017-9060 Qemu: virtio-gpu: host memory leakage in Virtio GPU device](http://www.openwall.com/lists/oss-security/2017/05/19/1) 4. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=dd248ed7e204ee8a1873914e02b8b526e8f1b80d) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1452597)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0929, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0929 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0929 - **State**: PUBLISHED - **Published Date**: March 05, 2010 at 19:00 UTC - **Last Updated**: September 16, 2024 at 18:09 UTC - **Reserved Date**: March 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Perforce service (p4s.exe) in Perforce Server 2008.1 allows remote attackers to cause a denial of service (daemon crash) via crafted data beginning with a byte sequence of 0x4c, 0xb3, 0xff, 0xff, and 0xff. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36261](http://www.securityfocus.com/bid/36261) 2. [[dailydave] 20100304 Perforce](http://lists.immunitysec.com/pipermail/dailydave/2010-March/006063.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3438 - **State**: PUBLISHED - **Published Date**: November 07, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 09, 2014 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in console interface scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [symantec-endpoint-cve20143438-xss(98526)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98526) 2. [20141106 SEC Consult SA-20141106-0 :: XXE & XSS & Arbitrary File Write vulnerabilities in Symantec Endpoint Protection](http://seclists.org/fulldisclosure/2014/Nov/7) 3. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20141105_00) 4. [70844](http://www.securityfocus.com/bid/70844) 5. [20141106 SEC Consult SA-20141106-0 :: XXE & XSS & Arbitrary File Write vulnerabilities in Symantec Endpoint Protection](http://www.securityfocus.com/archive/1/533918/100/0/threaded) 6. [1031176](http://www.securitytracker.com/id/1031176)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16130 - **State**: PUBLISHED - **Published Date**: June 07, 2018 at 02:00 UTC - **Last Updated**: September 17, 2024 at 03:43 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description exxxxxxxxxxx is an Http eX Frame Google Style JavaScript Guide. exxxxxxxxxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Accessible files are restricted to those with a file extension. Files with no extension such as /etc/passwd throw an error. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **HackerOne - exxxxxxxxxxx node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/478) 2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2914 - **State**: PUBLISHED - **Published Date**: July 30, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 02:46 UTC - **Reserved Date**: July 30, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in nessusd_www_server.nbin in the Nessus Web Server plugin 1.2.4 for Nessus allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40722](http://secunia.com/advisories/40722) 2. [1024248](http://www.securitytracker.com/id?1024248) 3. [](https://discussions.nessus.org/message/7245#7245) 4. [20100726 Nessus Vulnerabilities](http://www.securityfocus.com/archive/1/512645/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19312 - **State**: PUBLISHED - **Published Date**: November 16, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 11:30 UTC - **Reserved Date**: November 16, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.24) allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/centreon/centreon/pull/6257) 2. [](http://www.roothc.com.br/1349-2/) 3. [](https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html) 4. [](https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html) 5. [](https://github.com/centreon/centreon/pull/6628)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0447 - **State**: PUBLISHED - **Published Date**: April 11, 2022 at 14:40 UTC - **Last Updated**: August 02, 2024 at 23:25 UTC - **Reserved Date**: February 01, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Post Grid WordPress plugin before 2.1.16 does not sanitise and escape the post_types parameter before outputting it back in the response of the post_grid_update_taxonomies_terms_by_posttypes AJAX action, available to any authenticated users, leading to a Reflected Cross-Site Scripting ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Post Grid** Affected versions: - 2.1.16 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0722 - **State**: PUBLISHED - **Published Date**: January 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:48 UTC - **Reserved Date**: November 25, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [558](http://www.securityfocus.com/bid/558)