System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28925
- **State**: PUBLISHED
- **Published Date**: April 08, 2021 at 12:57 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Nagios Network Analyzer before 2.4.3 via the o[col] parameter to api/checks/read/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/stolabs/issues-found-on-nagios-network-analyzer-2-4-2-50ec4ffb5e25)
2. [](https://www.nagios.com/downloads/nagios-network-analyzer/change-log/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5527
- **State**: PUBLISHED
- **Published Date**: June 18, 2024 at 05:38 UTC
- **Last Updated**: August 02, 2024 at 07:59 UTC
- **Reserved Date**: October 11, 2023 at 16:01 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Business Directory Plugin plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 6.4.3 via the class-csv-exporter.php file. This allows authenticated attackers, with author-level permissions and above, to embed untrusted input into CSV files exported by administrators, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L`
### Affected Products
**strategy11team - Business Directory Plugin – Easy Listing Directories for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ed037e94-68b4-4efc-9d1a-fffc4aff1c45?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/business-directory-plugin/trunk/includes/admin/class-csv-exporter.php)
3. [](https://plugins.trac.wordpress.org/browser/business-directory-plugin/trunk/includes/admin/helpers/csv/class-csv-exporter.php)
4. [](https://plugins.trac.wordpress.org/changeset/3102475/business-directory-plugin/trunk/includes/admin/helpers/csv/class-csv-exporter.php)
### Credits
- Dmitrii Ignatyev |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1008
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Java Plugin 1.4 for JRE 1.3 executes signed applets even if the certificate is expired, which could allow remote attackers to conduct unauthorized activities via an applet that has been signed by an expired certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3245](http://www.securityfocus.com/bid/3245)
2. [javaplugin-jre-expired-certificate(7048)](http://www.iss.net/security_center/static/7048.php)
3. [20010824 Java Plugin 1.4 with JRE 1.3 -> Ignores certificates.](http://archives.neohapsis.com/archives/bugtraq/2001-08/0359.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1405
- **State**: PUBLISHED
- **Published Date**: January 10, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple open redirect vulnerabilities on the Conceptronic C54APM access point with runtime code 1.26 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the submit-url parameter in a Refresh action to goform/formWlSiteSurvey or (2) the wlan-url parameter to goform/formWlanSetup.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf)
2. [101916](http://osvdb.org/101916)
3. [101917](http://osvdb.org/101917) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23932
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 20:08 UTC
- **Last Updated**: March 10, 2025 at 21:16 UTC
- **Reserved Date**: January 19, 2023 at 21:12 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash when parsing badly-formed input. This issue has been patched in version 3.23.1.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**OpenDDS - OpenDDS**
Affected versions:
- < 3.23.1 (Status: affected)
### References
1. [https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-8wvq-25f5-f8h4](https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-8wvq-25f5-f8h4)
2. [https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.23.1](https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.23.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37629
- **State**: PUBLISHED
- **Published Date**: September 07, 2021 at 20:25 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users unable to upgrade it is recommended that the Richdocuments application be disabled.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 3.8.4 (Status: affected)
- >= 4.0.0, < 4.2.1 (Status: affected)
### References
1. [](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx)
2. [](https://github.com/nextcloud/richdocuments/pull/1663)
3. [](https://hackerone.com/reports/1258750) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42342
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 11:58 UTC
- **Last Updated**: September 10, 2024 at 14:49 UTC
- **Reserved Date**: July 30, 2024 at 09:20 UTC
- **Assigned By**: INCD
### Vulnerability Description
Loway - CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-444: Security Weakness
### Affected Products
**Loway - QueueMetrics**
Affected versions:
- 22.11.6 (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Dudu Moyal, Moriel Harush - Peer Security LTD |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26569
- **State**: PUBLISHED
- **Published Date**: December 28, 2020 at 15:52 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 06, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11722
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WUZHI CMS 4.1.0 has a SQL Injection in api/uc.php via the 'code' parameter, because 'UC_KEY' is hard coded.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wuzhicms/wuzhicms/issues/141) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6395
- **State**: PUBLISHED
- **Published Date**: March 02, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: February 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in HashOver 2.0. The vulnerability exists due to insufficient filtration of user-supplied data passed to the 'hashover/scripts/widget-output.php' URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96550](http://www.securityfocus.com/bid/96550)
2. [](https://github.com/jacobwb/hashover-next/issues/152) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28286
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 14:02 UTC
- **Reserved Date**: March 31, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-13/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-14/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-15/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1735265) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9035
- **State**: PUBLISHED
- **Published Date**: November 25, 2014 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 20, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Press This in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3085](http://www.debian.org/security/2014/dsa-3085)
2. [[oss-security] 20141125 Re: WordPress 4.0.1 Security Release](http://openwall.com/lists/oss-security/2014/11/25/12)
3. [](http://advisories.mageia.org/MGASA-2014-0493.html)
4. [1031243](http://www.securitytracker.com/id/1031243)
5. [71236](http://www.securityfocus.com/bid/71236)
6. [MDVSA-2014:233](http://www.mandriva.com/security/advisories?name=MDVSA-2014:233)
7. [](https://wordpress.org/news/2014/11/wordpress-4-0-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42729
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:02 UTC
- **Last Updated**: April 23, 2025 at 18:51 UTC
- **Reserved Date**: October 19, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge version 11.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Bridge**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb21-94.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1002100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1002100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1002100
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 16:17 UTC
- **Reserved Date**: June 01, 2018 at 00:00 UTC
- **Assigned By**: kubernetes
### Vulnerability Description
In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.
### Affected Products
**Kubernetes - Kubernetes**
Affected versions:
- v1.5.x (Status: affected)
- v1.6.x (Status: affected)
- v1.7.x (Status: affected)
- v1.8.x (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://github.com/kubernetes/kubernetes/issues/61297)
2. [](https://hansmi.ch/articles/2018-04-openshift-s2i-security)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1564305)
### Credits
- Reported by Michael Hanselmann |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37242
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 02, 2025 at 14:52 UTC
- **Reserved Date**: June 04, 2024 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Automattic Newspack Newsletters allows Cross Site Request Forgery.This issue affects Newspack Newsletters: from n/a through 2.13.2.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Automattic - Newspack Newsletters**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/newspack-newsletters/vulnerability/wordpress-newspack-newsletters-plugin-2-13-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2553
- **State**: PUBLISHED
- **Published Date**: June 05, 2008 at 20:21 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.slashcode.com/article.pl?sid=08/01/07/2314232)
2. [slash-userfield-xss(42882)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42882)
3. [31691](http://secunia.com/advisories/31691)
4. [](http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&r2=1.225)
5. [](http://www.slashcode.com/article.pl?sid=08/01/04/1950244&tid=4)
6. [DSA-1633](http://www.debian.org/security/2008/dsa-1633)
7. [1020207](http://www.securitytracker.com/id?1020207)
8. [30551](http://secunia.com/advisories/30551)
9. [29548](http://www.securityfocus.com/bid/29548) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12935
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:42 UTC
- **Last Updated**: June 11, 2021 at 21:42 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40714
- **State**: PUBLISHED
- **Published Date**: September 27, 2021 at 15:44 UTC
- **Last Updated**: April 23, 2025 at 19:27 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability via the accesskey parameter. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48887
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 06:10 UTC
- **Last Updated**: May 04, 2025 at 08:25 UTC
- **Reserved Date**: August 21, 2024 at 06:06 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Remove rcu locks from user resources
User resource lookups used rcu to avoid two extra atomics. Unfortunately
the rcu paths were buggy and it was easy to make the driver crash by
submitting command buffers from two different threads. Because the
lookups never show up in performance profiles replace them with a
regular spin lock which fixes the races in accesses to those shared
resources.
Fixes kernel oops'es in IGT's vmwgfx execution_buffer stress test and
seen crashes with apps using shared resources.
### Affected Products
**Linux - Linux**
Affected versions:
- e14c02e6b6990e9f6ee18a214a22ac26bae1b25e (Status: affected)
- e14c02e6b6990e9f6ee18a214a22ac26bae1b25e (Status: affected)
**Linux - Linux**
Affected versions:
- 4.20 (Status: affected)
- 0 (Status: unaffected)
- 6.1.7 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7ac9578e45b20e3f3c0c8eb71f5417a499a7226a)
2. [](https://git.kernel.org/stable/c/a309c7194e8a2f8bd4539b9449917913f6c2cd50) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3903
- **State**: PUBLISHED
- **Published Date**: April 23, 2025 at 17:08 UTC
- **Last Updated**: April 23, 2025 at 18:53 UTC
- **Reserved Date**: April 23, 2025 at 16:27 UTC
- **Assigned By**: drupal
### Vulnerability Description
Vulnerability in Drupal UEditor - 百度编辑器.This issue affects UEditor - 百度编辑器: *.*.
### Affected Products
**Drupal - UEditor - 百度编辑器**
Affected versions:
- *.* (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2025-044) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6863
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:10 UTC
- **Last Updated**: March 20, 2025 at 18:20 UTC
- **Reserved Date**: July 17, 2024 at 20:44 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.
### Weakness Classification (CWE)
- CWE-749: Security Weakness
### Affected Products
**h2oai - h2oai/h2o-3**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/10f55937-0cba-4530-897f-2abf30ed5270) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5572
- **State**: PUBLISHED
- **Published Date**: May 29, 2020 at 08:40 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Android App 'Mailwise for Android' 1.0.0 to 1.0.1 allows an attacker to obtain credential information registered in the product via unspecified vectors.
### Affected Products
**Cybozu, Inc. - Android App 'Mailwise for Android'**
Affected versions:
- 1.0.0 to 1.0.1 (Status: affected)
### References
1. [](https://kb.cybozu.support/article/36411/)
2. [](https://jvn.jp/en/jp/JVN78745667/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10908
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 20:51 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Export command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9865.
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Foxit - PhantomPDF**
Affected versions:
- 9.7.0.29478 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-515/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1450
- **State**: PUBLISHED
- **Published Date**: August 31, 2017 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:02 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Emptoris Sourcing 9.5 - 10.1.3 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 128177.
### Affected Products
**IBM - Emptoris Sourcing**
Affected versions:
- 9.5 (Status: affected)
- 10.0.0 (Status: affected)
- 10.0.1 (Status: affected)
- 10.0.2 (Status: affected)
- 10.0.4 (Status: affected)
- 10.1.0 (Status: affected)
- 10.1.1 (Status: affected)
- 10.1.3 (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg22005834)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/128177) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0412
- **State**: PUBLISHED
- **Published Date**: October 25, 2021 at 13:16 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In flv extractor, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561366; Issue ID: ALPS05561366.
### Affected Products
**n/a - MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6896, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981**
Affected versions:
- Android 10.0, 11.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/October-2021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4530
- **State**: PUBLISHED
- **Published Date**: June 19, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
OSIsoft PI SQL Data Access Server (aka OLE DB) 2016 1.5 allows remote authenticated users to cause a denial of service (service outage and data loss) via a message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://techsupport.osisoft.com/Troubleshooting/Alerts/AL00300)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-166-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24554
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 13:49 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The redirect module in Liferay Portal before 7.3.3 does not limit the number of URLs resulting in a 404 error that is recorded, which allows remote attackers to perform a denial of service attack by making repeated requests for pages that do not exist.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://portal.liferay.dev/learn/security/known-vulnerabilities)
2. [](https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784956) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5296
- **State**: PUBLISHED
- **Published Date**: December 01, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gallery 1.5.x before 1.5.10 and 1.6 before 1.6-RC3, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative via unspecified cookies. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32817](http://secunia.com/advisories/32817)
2. [gallery-cookie-security-bypass(46804)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46804)
3. [32440](http://www.securityfocus.com/bid/32440)
4. [](http://gallery.menalto.com/last_official_G1_releases)
5. [50089](http://osvdb.org/50089) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57843
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 14:30 UTC
- **Last Updated**: May 04, 2025 at 10:05 UTC
- **Reserved Date**: January 11, 2025 at 12:32 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: fix overflow inside virtnet_rq_alloc
When the frag just got a page, then may lead to regression on VM.
Specially if the sysctl net.core.high_order_alloc_disable value is 1,
then the frag always get a page when do refill.
Which could see reliable crashes or scp failure (scp a file 100M in size
to VM).
The issue is that the virtnet_rq_dma takes up 16 bytes at the beginning
of a new frag. When the frag size is larger than PAGE_SIZE,
everything is fine. However, if the frag is only one page and the
total size of the buffer and virtnet_rq_dma is larger than one page, an
overflow may occur.
The commit f9dac92ba908 ("virtio_ring: enable premapped mode whatever
use_dma_api") introduced this problem. And we reverted some commits to
fix this in last linux version. Now we try to enable it and fix this
bug directly.
Here, when the frag size is not enough, we reduce the buffer len to fix
this problem.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6.66 (Status: unaffected)
- 6.12.5 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a8f7d6963768b114ec9644ff0148dde4c104e84b)
2. [](https://git.kernel.org/stable/c/67a11de8965c2ab19e215fb6651d44847e068614)
3. [](https://git.kernel.org/stable/c/6aacd1484468361d1d04badfe75f264fa5314864) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30587
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 16:03 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the urls parameter of the saveParentControlInfo function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32511
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:24 UTC
- **Reserved Date**: April 09, 2025 at 11:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Excellent Dynamics Make Email Customizer for WooCommerce allows Reflected XSS. This issue affects Make Email Customizer for WooCommerce: from n/a through 1.0.5.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Excellent Dynamics - Make Email Customizer for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/make-email-customizer-for-woocommerce/vulnerability/wordpress-make-email-customizer-for-woocommerce-plugin-1-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7771
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:08 UTC
- **Last Updated**: March 20, 2025 at 19:02 UTC
- **Reserved Date**: August 13, 2024 at 19:25 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A vulnerability in the Dockerized version of mintplex-labs/anything-llm (latest, digest 1d9452da2b92) allows for a denial of service. Uploading an audio file with a very low sample rate causes the functionality responsible for transcribing it to crash the entire site instance. The issue arises from the localWhisper implementation, where resampling the audio file from 1 Hz to 16000 Hz quickly exceeds available memory, leading to the Docker instance being killed by the instance manager.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**mintplex-labs - mintplex-labs/anything-llm**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/a31a9834-e9c4-4b50-a1ec-ecb69f2a6142)
2. [](https://github.com/mintplex-labs/anything-llm/commit/dd017c6cbbf42abdef7861a66558c53b66424d07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3653
- **State**: PUBLISHED
- **Published Date**: June 29, 2013 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 16:28 UTC
- **Reserved Date**: May 22, 2013 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the RecommendSearch feature in the management screen in LOCKON EC-CUBE before 2.12.5 allow remote attackers to inject arbitrary web script or HTML via vectors involving the rank parameter, a different vulnerability than CVE-2013-3652.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ec-cube.net/info/weakness/20130626/index.php)
2. [](http://www.ec-cube.net/info/weakness/weakness.php?id=46)
3. [JVN#98665228](http://jvn.jp/en/jp/JVN98665228/index.html)
4. [JVNDB-2013-000064](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000064)
5. [](http://svn.ec-cube.net/open_trac/changeset/22861) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2360
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:44 UTC
- **Last Updated**: December 20, 2021 at 22:44 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49795
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 14:09 UTC
- **Last Updated**: May 04, 2025 at 08:45 UTC
- **Reserved Date**: May 01, 2025 at 14:05 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
rethook: fix a potential memleak in rethook_alloc()
In rethook_alloc(), the variable rh is not freed or passed out
if handler is NULL, which could lead to a memleak, fix it.
[Masami: Add "rethook:" tag to the title.]
Acke-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
### Affected Products
**Linux - Linux**
Affected versions:
- 54ecbe6f1ed5138c895bdff55608cf502755b20e (Status: affected)
- 54ecbe6f1ed5138c895bdff55608cf502755b20e (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.0.10 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cbc5d1f9a8cc40ba2bc6779b36d2ea1f65bc027c)
2. [](https://git.kernel.org/stable/c/0a1ebe35cb3b7aa1f4b26b37e2a0b9ae68dc4ffb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11789
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: May 06, 2019 at 00:00 UTC
- **Assigned By**: odoo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14071
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Compromised reset handler may bypass access control due to AC config is being reset if debug path is enabled to collect secure or non-secure ram dumps in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8017, APQ8053, APQ8096, APQ8096AU, IPQ6018, MDM9205, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8017, APQ8053, APQ8096, APQ8096AU, IPQ6018, MDM9205, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2089
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 08:30 UTC
- **Last Updated**: August 01, 2024 at 19:03 UTC
- **Reserved Date**: March 01, 2024 at 15:14 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Remote Content Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'remote_content' shortcode in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**doublesharp - Remote Content Shortcode**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/66abfe6b-c706-4e70-b35b-ee04da613933?source=cve)
2. [](https://wordpress.org/plugins/remote-content-shortcode/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56751
- **State**: PUBLISHED
- **Published Date**: December 29, 2024 at 11:30 UTC
- **Last Updated**: May 04, 2025 at 10:03 UTC
- **Reserved Date**: December 29, 2024 at 11:26 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6: release nexthop on device removal
The CI is hitting some aperiodic hangup at device removal time in the
pmtu.sh self-test:
unregister_netdevice: waiting for veth_A-R1 to become free. Usage count = 6
ref_tracker: veth_A-R1@ffff888013df15d8 has 1/5 users at
dst_init+0x84/0x4a0
dst_alloc+0x97/0x150
ip6_dst_alloc+0x23/0x90
ip6_rt_pcpu_alloc+0x1e6/0x520
ip6_pol_route+0x56f/0x840
fib6_rule_lookup+0x334/0x630
ip6_route_output_flags+0x259/0x480
ip6_dst_lookup_tail.constprop.0+0x5c2/0x940
ip6_dst_lookup_flow+0x88/0x190
udp_tunnel6_dst_lookup+0x2a7/0x4c0
vxlan_xmit_one+0xbde/0x4a50 [vxlan]
vxlan_xmit+0x9ad/0xf20 [vxlan]
dev_hard_start_xmit+0x10e/0x360
__dev_queue_xmit+0xf95/0x18c0
arp_solicit+0x4a2/0xe00
neigh_probe+0xaa/0xf0
While the first suspect is the dst_cache, explicitly tracking the dst
owing the last device reference via probes proved such dst is held by
the nexthop in the originating fib6_info.
Similar to commit f5b51fe804ec ("ipv6: route: purge exception on
removal"), we need to explicitly release the originating fib info when
disconnecting a to-be-removed device from a live ipv6 dst: move the
fib6_info cleanup into ip6_dst_ifdown().
Tested running:
./pmtu.sh cleanup_ipv6_exception
in a tight loop for more than 400 iterations with no spat, running an
unpatched kernel I observed a splat every ~10 iterations.
### Affected Products
**Linux - Linux**
Affected versions:
- f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 (Status: affected)
- f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 (Status: affected)
- f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 (Status: affected)
- f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 (Status: affected)
- f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 (Status: affected)
- f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.3 (Status: affected)
- 0 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/77aa9855a878fb43f547ddfbda3127a1e88ad31a)
2. [](https://git.kernel.org/stable/c/b2f26a27ea3f72f75d18330f76f5d1007c791848)
3. [](https://git.kernel.org/stable/c/43e25adc80269f917d2a195f0d59f74cdd182955)
4. [](https://git.kernel.org/stable/c/a3c3f8a4d025acc8c857246ec2b812c59102487a)
5. [](https://git.kernel.org/stable/c/0e4c6faaef8a24b762a24ffb767280e263ef8e10)
6. [](https://git.kernel.org/stable/c/eb02688c5c45c3e7af7e71f036a7144f5639cbfe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4196
- **State**: PUBLISHED
- **Published Date**: March 11, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The object manager implementation (objectmanager.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly restrict access to internal methods, which allows remote attackers to obtain sensitive information via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=978475)
2. [](http://plone.org/products/plone/security/advisories/20130618-announcement)
3. [](http://plone.org/products/plone-hotfix/releases/20130618)
4. [[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)](http://seclists.org/oss-sec/2013/q3/261) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21207
- **State**: PUBLISHED
- **Published Date**: April 26, 2021 at 16:25 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html)
2. [](https://crbug.com/1185732)
3. [DSA-4906](https://www.debian.org/security/2021/dsa-4906)
4. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08)
5. [FEDORA-2021-c3754414e7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/)
6. [FEDORA-2021-ff893e12c5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/)
7. [FEDORA-2021-35d2bb4627](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10830
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In 2345 Security Guard 3.7, the driver file (2345BdPcSafe.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x002220e0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44615](https://www.exploit-db.com/exploits/44615/)
2. [](https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x002220e0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36298
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 17:22 UTC
- **Reserved Date**: July 22, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13627
- **State**: PUBLISHED
- **Published Date**: May 27, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the widgetId parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1263
- **State**: PUBLISHED
- **Published Date**: March 19, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple "unannounced" cross-site scripting (XSS) vulnerabilities in WordPress before 2.0.2 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17069](http://www.securityfocus.com/bid/17069)
2. [](http://wordpress.org/development/2006/03/security-202/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51094
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 00:00 UTC
- **Last Updated**: November 19, 2024 at 16:48 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Snipe-IT v.7.0.13 build 15514 allows a low-privileged attacker to modify their profile name and inject a malicious payload into the "Name" field. When an administrator later accesses the People Management page, exports the data as a CSV file, and opens it, the injected payload will be executed, allowing the attacker to exfiltrate internal system data from the CSV file to a remote server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.githubusercontent.com/Tommywarren/b3a6c6ae5a93dd67c863313f71f53a76/raw/ddff8cbbab5179f680ba3f5e94fc080575ad8913/CVE-2024-51094) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4303
- **State**: PUBLISHED
- **Published Date**: August 13, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple race conditions in (1) certain rules and (2) argument copying during VM protection, in CerbNG for FreeBSD 4.8 allow local users to defeat system call interposition and possibly gain privileges or bypass auditing, as demonstrated by modifying command lines in log-exec.cb.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.watson.org/~robert/2007woot/)
2. [26474](http://secunia.com/advisories/26474)
3. [25259](http://www.securityfocus.com/bid/25259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42683
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 20:05 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1894
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 01:00 UTC
- **Last Updated**: March 04, 2025 at 14:25 UTC
- **Reserved Date**: March 03, 2025 at 18:17 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Restaurant Table Booking System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-298412 | PHPGurukul Restaurant Table Booking System search-result.php sql injection](https://vuldb.com/?id.298412)
2. [VDB-298412 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298412)
3. [Submit #506592 | PHPGurukul RTBS Project PHP V1.0 SQL Injection](https://vuldb.com/?submit.506592)
4. [](https://github.com/Maochuyue/cve/issues/1)
5. [](https://phpgurukul.com/)
### Credits
- maochuyue (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2261
- **State**: PUBLISHED
- **Published Date**: June 30, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PeaZIP 2.6.1, 2.5.1, and earlier on Windows allows user-assisted remote attackers to execute arbitrary commands via a .zip archive with a .txt file whose name contains | (pipe) characters and a command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8881](http://www.exploit-db.com/exploits/8881) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49694
- **State**: PUBLISHED
- **Published Date**: November 29, 2023 at 22:47 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 29, 2023 at 22:03 UTC
- **Assigned By**: tenable
### Vulnerability Description
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**NETGEAR - NETGEAR ProSAFE Network Management System**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2023-39)
2. [](https://kb.netgear.com/000065885/Security-Advisory-for-Vertical-Privilege-Escalation-on-the-NMS300-PSV-2023-0127) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11688
- **State**: PUBLISHED
- **Published Date**: June 13, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180605 Ignite Realtime Openfire Version 3.7.1 Reflected Cross Site Scripting (CVE-2018-11688)](http://seclists.org/fulldisclosure/2018/Jun/13)
2. [](https://vulmon.com/vulnerabilitydetails?qid=CVE-2018-11688)
3. [](http://packetstormsecurity.com/files/148057/Ignite-Realtime-Openfire-3.7.1-Cross-Site-Scripting.html)
4. [20180605 Ignite Realtime Openfire Version 3.7.1 Reflected Cross Site Scripting (CVE-2018-11688)](http://www.securityfocus.com/archive/1/542060/100/0/threaded)
5. [20180608 Re: Ignite Realtime Openfire Version 3.7.1 Reflected Cross Site Scripting (CVE-2018-11688)](http://seclists.org/fulldisclosure/2018/Jun/24)
6. [](https://github.com/igniterealtime/Openfire/compare/v3.9.1...v3.9.2)
7. [](https://github.com/igniterealtime/Openfire/commit/ed3492a24274fd454afe93a499db49f3d6335108#diff-3f607cf668ad8f1091e789a2c1dca32a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7301
- **State**: PUBLISHED
- **Published Date**: October 05, 2011 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: October 04, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/login.php in jSite 1.0 OE allows remote attackers to execute arbitrary SQL commands via the username parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31049](http://secunia.com/advisories/31049)
2. [jsite-username-sql-injection(43747)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43747) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36399
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 17:57 UTC
- **Last Updated**: April 29, 2025 at 23:34 UTC
- **Reserved Date**: June 21, 2023 at 15:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Storage Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
### References
1. [Windows Storage Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36399) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1362
- **State**: PUBLISHED
- **Published Date**: April 21, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco AireOS 4.1 through 7.4.120.0, 7.5.x, and 7.6.100.0 on Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCun86747.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160420 Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-wlc)
2. [1035634](http://www.securitytracker.com/id/1035634) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4202
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38476
- **State**: PUBLISHED
- **Published Date**: October 19, 2021 at 12:10 UTC
- **Last Updated**: September 16, 2024 at 16:17 UTC
- **Reserved Date**: August 10, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-204: Improper Input Validation
### Affected Products
**InHand Networks - IR615 Router**
Affected versions:
- 2.3.0.r4724 and 2.3.0.r4870 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05)
### Credits
- Haviv Vaizman, Hay Mizrachi, Alik Koldobsky, Ofir Manzur, and Nikolay Sokolik of OTORIO reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0320
- **State**: PUBLISHED
- **Published Date**: September 17, 2020 at 20:57 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-129282427
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33461
- **State**: PUBLISHED
- **Published Date**: June 01, 2023 at 00:00 UTC
- **Last Updated**: January 09, 2025 at 16:26 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ndevilla/iniparser/issues/144)
2. [FEDORA-2023-65f751f76d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAIP5AURSTWIQOOP7G4CXYJ5IIGPY3Q/)
3. [FEDORA-2023-6454c8edea](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASV7SEDHGCP63GYAFEW3CTTVQDZM5RIK/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000097
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 12:33 UTC
- **Reserved Date**: March 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3605-1](https://usn.ubuntu.com/3605-1/)
2. [DSA-4167](https://www.debian.org/security/2018/dsa-4167)
3. [20180221 Sharutils 4.15.2 Heap-Buffer-Overflow](http://seclists.org/bugtraq/2018/Feb/54) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10931
- **State**: PUBLISHED
- **Published Date**: July 11, 2019 at 21:17 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 device types 7SS85 and 7KE85 (All versions < V8.01), SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.59), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.59). Specially crafted packets sent to port 443/TCP could cause a Denial of Service condition.
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**Siemens AG - All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules**
Affected versions:
- All versions (Status: affected)
**Siemens AG - DIGSI 5 engineering software**
Affected versions:
- All versions < V7.90 (Status: affected)
**Siemens AG - SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules**
Affected versions:
- All versions < V7.90 (Status: affected)
**Siemens AG - SIPROTEC 5 device types 7SS85 and 7KE85**
Affected versions:
- All versions < V8.01 (Status: affected)
**Siemens AG - SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules**
Affected versions:
- All versions < V7.59 (Status: affected)
**Siemens AG - SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules**
Affected versions:
- All versions < V7.59 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-899560.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14048
- **State**: PUBLISHED
- **Published Date**: June 12, 2020 at 01:41 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine ServiceDesk Plus before 11.1 build 11115 allows remote unauthenticated attackers to change the installation status of deployed agents.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/service-desk/on-premises/readme.html)
2. [](https://gitlab.com/eLeN3Re/CVE-2020-14048) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3161
- **State**: PUBLISHED
- **Published Date**: October 16, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1.1 allows remote attackers to affect integrity via unknown vectors related to Web Client (CS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50998](http://secunia.com/advisories/50998)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html)
3. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2452
- **State**: PUBLISHED
- **Published Date**: September 11, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
The logon application of SAP NetWeaver AS Java 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 does not sufficiently encode user-controlled inputs, resulting in a cross-site scripting (XSS) vulnerability.
### Affected Products
**SAP - SAP NetWeaver AS Java**
Affected versions:
- = 7.10 to 7.11 (Status: affected)
- = 7.20 (Status: affected)
- = 7.30 (Status: affected)
- = 7.31 (Status: affected)
- = 7.40 (Status: affected)
- = 7.50 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993)
2. [](https://launchpad.support.sap.com/#/notes/2623846)
3. [105325](http://www.securityfocus.com/bid/105325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6001
- **State**: PUBLISHED
- **Published Date**: December 05, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: October 03, 2013 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
SQL injection vulnerability in the Space function in Cybozu Garoon before 3.7 SP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.cybozu.com/ja-jp/article/6955)
2. [](http://products.cybozu.co.jp/garoon/download/update/gr3/fix371sp1.html)
3. [JVNDB-2013-000114](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000114)
4. [](http://cs.cybozu.co.jp/information/20131202up01.php)
5. [JVN#82375148](http://jvn.jp/en/jp/JVN82375148/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23390
- **State**: PUBLISHED
- **Published Date**: July 12, 2021 at 15:15 UTC
- **Last Updated**: September 17, 2024 at 04:15 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - total4**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527)
2. [](https://github.com/totaljs/framework4/blob/master/utils.js%23L5430-L5455)
3. [](https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821)
### Credits
- Alessio Della Libera (@d3lla) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2123
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 09:35 UTC
- **Last Updated**: August 02, 2024 at 20:26 UTC
- **Reserved Date**: March 01, 2024 at 21:53 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the several parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**ultimatemember - Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c8bc1653-8fee-468a-bb6d-f24959846ee5?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L44)
3. [](https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L53)
4. [](https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L65)
5. [](https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-list.php#L39)
6. [](https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-list.php#L53)
7. [](https://plugins.trac.wordpress.org/changeset/3046611/ultimate-member#file746)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53103
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 07:29 UTC
- **Last Updated**: May 04, 2025 at 09:53 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
When hvs is released, there is a possibility that vsk->trans may not
be initialized to NULL, which could lead to a dangling pointer.
This issue is resolved by initializing vsk->trans to NULL.
### Affected Products
**Linux - Linux**
Affected versions:
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
- ae0078fcf0a5eb3a8623bfb5f988262e0911fdb9 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.14 (Status: affected)
- 0 (Status: unaffected)
- 4.19.324 (Status: unaffected)
- 5.4.286 (Status: unaffected)
- 5.10.230 (Status: unaffected)
- 5.15.172 (Status: unaffected)
- 6.1.117 (Status: unaffected)
- 6.6.61 (Status: unaffected)
- 6.11.8 (Status: unaffected)
- 6.12.1 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/285266ef92f7b4bf7d26e1e95e215ce6a6badb4a)
2. [](https://git.kernel.org/stable/c/4fe1d42f2acc463b733bb42e3f8e67dbc2a0eb2d)
3. [](https://git.kernel.org/stable/c/414476c4fb11be070c09ab8f3e75c9ee324a108a)
4. [](https://git.kernel.org/stable/c/7cf25987820350cb950856c71b409e5b6eed52bd)
5. [](https://git.kernel.org/stable/c/98d8dde9232250a57ad5ef16479bf6a349e09b80)
6. [](https://git.kernel.org/stable/c/4bdc5a62c6e50600d8a1c3e18fd6dce0c27c9497)
7. [](https://git.kernel.org/stable/c/e0fe3392371293175f25028020ded5267f4cd8e3)
8. [](https://git.kernel.org/stable/c/8621725afb38e111969c64280b71480afde2aace)
9. [](https://git.kernel.org/stable/c/e629295bd60abf4da1db85b82819ca6a4f6c1e79) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11623
- **State**: PUBLISHED
- **Published Date**: April 30, 2019 at 19:41 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/configurationRequest.php when action=siteweb. A remote background administrator privilege user (or a user with permission to manage configuration siteweb) could exploit the vulnerability to obtain database sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/itodaro/doorGets_cve) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6699
- **State**: PUBLISHED
- **Published Date**: April 11, 2016 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 21:36 UTC
- **Reserved Date**: December 03, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds read) via a crafted response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226)
2. [[oss-security] 20151202 CVE Request: dhcpcd 3.x, potentially other versions too](http://www.openwall.com/lists/oss-security/2015/12/02/1)
3. [](https://launchpadlibrarian.net/228152582/dhcp.c.patch)
4. [DSA-3534](http://www.debian.org/security/2016/dsa-3534)
5. [[oss-security] 20151203 Re: CVE Request: dhcpcd 3.x, potentially other versions too](http://www.openwall.com/lists/oss-security/2015/12/03/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6294
- **State**: PUBLISHED
- **Published Date**: December 10, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 3 R3.7 allow attackers to gain privileges via "some HMC commands."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26769](http://www.securityfocus.com/bid/26769)
2. [](http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power4/install/ptf_U814685.html)
3. [1019062](http://www.securitytracker.com/id?1019062)
4. [27970](http://secunia.com/advisories/27970)
5. [ADV-2007-4143](http://www.vupen.com/english/advisories/2007/4143)
6. [ibm-hmc-hmc-privilege-escalation(38914)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38914)
7. [](http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4036)
8. [41623](http://osvdb.org/41623) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28387
- **State**: PUBLISHED
- **Published Date**: June 30, 2023 at 06:22 UTC
- **Last Updated**: December 04, 2024 at 15:58 UTC
- **Reserved Date**: March 15, 2023 at 08:11 UTC
- **Assigned By**: jpcert
### Vulnerability Description
"NewsPicks" App for Android versions 10.4.5 and earlier and "NewsPicks" App for iOS versions 10.4.2 and earlier use hard-coded credentials, which may allow a local attacker to analyze data in the app and to obtain API key for an external service.
### Affected Products
**NewsPicks, Inc. - "NewsPicks" App for Android**
Affected versions:
- versions 10.4.5 and earlier (Status: affected)
**NewsPicks, Inc. - "NewsPicks" App for iOS**
Affected versions:
- versions 10.4.2 and earlier (Status: affected)
### References
1. [](https://play.google.com/store/apps/details?id=com.newspicks)
2. [](https://apps.apple.com/us/app/%E3%83%8B%E3%83%A5%E3%83%BC%E3%82%BA%E3%83%94%E3%83%83%E3%82%AF%E3%82%B9-%E3%83%93%E3%82%B8%E3%83%8D%E3%82%B9%E3%81%AB%E5%BD%B9%E7%AB%8B%E3%81%A4%E7%B5%8C%E6%B8%88%E3%83%8B%E3%83%A5%E3%83%BC%E3%82%B9%E3%82%A2%E3%83%97%E3%83%AA/id640956497)
3. [](https://jvn.jp/en/jp/JVN32739265/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24455
- **State**: PUBLISHED
- **Published Date**: August 02, 2021 at 10:32 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Tutor LMS – eLearning and online course solution WordPress plugin before 1.9.2 did not escape the Summary field of Announcements (when outputting it in an attribute), which can be created by users as low as Tutor Instructor. This lead to a Stored Cross-Site Scripting issue, which is triggered when viewing the Announcements list, and could result in privilege escalation when viewed by an admin.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Tutor LMS – eLearning and online course solution**
Affected versions:
- 1.9.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9)
### Credits
- Phu Tran from techlabcorp.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0786
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 22:00 UTC
- **Last Updated**: January 29, 2025 at 14:20 UTC
- **Reserved Date**: January 28, 2025 at 14:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**ESAFENET - CDG**
Affected versions:
- V5 (Status: affected)
### References
1. [VDB-293910 | ESAFENET CDG appDetail.jsp sql injection](https://vuldb.com/?id.293910)
2. [VDB-293910 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.293910)
3. [Submit #483339 | esafenet CDG V5 SQL Injection](https://vuldb.com/?submit.483339)
4. [](https://github.com/Rain1er/report/blob/main/CDG/appDetail.md)
### Credits
- raindrop (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43991, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43991 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43991
- **State**: PUBLISHED
- **Published Date**: December 03, 2021 at 14:42 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 17, 2021 at 00:00 UTC
- **Assigned By**: AppCheck
### Vulnerability Description
The Kentico Xperience CMS version 13.0 – 13.0.43 is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Kentico - Kentico Xperience XMS**
Affected versions:
- 13.0 (Status: affected)
### References
1. [](https://appcheck-ng.com/persistent-xss-kentico-cms/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8815
- **State**: PUBLISHED
- **Published Date**: March 03, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: February 16, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Umbraco before 7.4.0 allow remote attackers to inject arbitrary web script or HTML via the name parameter to (1) the media page, (2) the developer data edit page, or (3) the form page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://issues.umbraco.org/issue/U4-7461)
2. [[oss-security] 20160216 Re: Umbraco - The open source ASP.NET CMS Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2016/02/16/10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48986
- **State**: PUBLISHED
- **Published Date**: February 14, 2024 at 00:00 UTC
- **Last Updated**: March 20, 2025 at 13:14 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the users.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1551
- **State**: PUBLISHED
- **Published Date**: March 20, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in phpx 3.5.15 allow remote attackers to inject arbitrary web script or HTML via (1) the signature in "dans profile," or (2) search.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070319 phpx 3.5.15 multiples vulnerabilities](http://www.securityfocus.com/archive/1/463192/100/0/threaded)
2. [34413](http://osvdb.org/34413)
3. [34412](http://osvdb.org/34412)
4. [2457](http://securityreason.com/securityalert/2457)
5. [23033](http://www.securityfocus.com/bid/23033)
6. [ADV-2007-1087](http://www.vupen.com/english/advisories/2007/1087)
7. [24565](http://secunia.com/advisories/24565)
8. [phpx-search-xss(33154)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33154)
9. [phpx-signature-xss(33153)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33153) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4431
- **State**: PUBLISHED
- **Published Date**: August 29, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the (a) Session Clustering Daemon and the (b) mod_cluster module in the Zend Platform 2.2.1 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a (1) empty or (2) crafted PHP session identifier (PHPSESSID).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28231](http://www.osvdb.org/28231)
2. [28230](http://www.osvdb.org/28230)
3. [20060824 Advisory 05/2006: Zend Platform Multiple Remote Vulnerabilities](http://www.securityfocus.com/archive/1/444263/100/0/threaded)
4. [1466](http://securityreason.com/securityalert/1466)
5. [19692](http://www.securityfocus.com/bid/19692)
6. [zend-modcluster-bo(28573)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28573)
7. [20060824 Advisory 05/2006: Zend Platform Multiple Remote](http://marc.info/?l=full-disclosure&m=115642248226217&w=2)
8. [](http://www.hardened-php.net/advisory_052006.128.html)
9. [21573](http://secunia.com/advisories/21573)
10. [ADV-2006-3388](http://www.vupen.com/english/advisories/2006/3388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0828
- **State**: PUBLISHED
- **Published Date**: October 18, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:28 UTC
- **Reserved Date**: October 15, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in ddicgi.exe in Mobius DocumentDirect for the Internet 1.2 allows remote attackers to execute arbitrary commands via a long User-Agent parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [documentdirect-user-agent-bo(5212)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5212)
2. [1657](http://www.securityfocus.com/bid/1657)
3. [A090800-1](http://www.atstake.com/research/advisories/2000/a090800-1.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43232
- **State**: PUBLISHED
- **Published Date**: October 28, 2022 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 13:38 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the userid parameter at /php_action/fetchOrderData.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/HKD01l/bug_report/blob/main/vendors/mayuri_k/canteen-management-system/SQLi-2.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22842
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 02:35 UTC
- **Last Updated**: April 07, 2025 at 13:32 UTC
- **Reserved Date**: February 08, 2025 at 01:18 UTC
- **Assigned By**: OpenHarmony
### Vulnerability Description
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**OpenHarmony - OpenHarmony**
Affected versions:
- v4.1.0 (Status: affected)
### References
1. [](https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36891
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 19:16 UTC
- **Last Updated**: February 20, 2025 at 20:18 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Photo Gallery by Supsystic plugin <= 1.15.5 at WordPress allows changing the plugin settings.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Supsystic - Photo Gallery by Supsystic (WordPress plugin)**
Affected versions:
- <= 1.15.5 (Status: affected)
### References
1. [](https://wordpress.org/plugins/gallery-by-supsystic/#developers)
2. [](https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-5-cross-site-request-forgery-csrf-leading-to-plugin-settings-change)
### Credits
- Vulnerability discovered by Rasi Afeef (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3134
- **State**: PUBLISHED
- **Published Date**: September 02, 2011 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 11, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in TIBCO Spotfire Server 3.0.x before 3.0.2, 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.1, and Spotfire Analytics Server before 10.1.1, allows remote attackers to modify data or obtain sensitive information via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories/default.jsp)
2. [1025999](http://www.securitytracker.com/id?1025999)
3. [45864](http://secunia.com/advisories/45864)
4. [](http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35715
- **State**: PUBLISHED
- **Published Date**: December 26, 2020 at 00:46 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html)
2. [](https://downloads.linksys.com/support/assets/releasenotes/ExternalReleaseNotes_RE6500_1.0.012.001.txt)
3. [](https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8840
- **State**: REJECTED
- **Published Date**: January 03, 2017 at 20:00 UTC
- **Last Updated**: January 03, 2017 at 19:57 UTC
- **Reserved Date**: October 18, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9802
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 16:07 UTC
- **Last Updated**: May 05, 2025 at 17:03 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211168)
2. [](https://support.apple.com/HT211171)
3. [](https://support.apple.com/HT211175)
4. [](https://support.apple.com/HT211178)
5. [](https://support.apple.com/HT211179)
6. [](https://support.apple.com/HT211181)
7. [](https://support.apple.com/HT211177) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1791
- **State**: PUBLISHED
- **Published Date**: July 30, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: May 06, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [43068](http://secunia.com/advisories/43068)
3. [APPLE-SA-2010-09-08-1](http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html)
4. [](http://support.apple.com/kb/HT4334)
5. [](http://support.apple.com/kb/HT4276)
6. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
7. [oval:org.mitre.oval:def:11802](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11802)
8. [APPLE-SA-2010-07-28-1](http://lists.apple.com/archives/security-announce/2010//Jul/msg00001.html)
9. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
10. [42314](http://secunia.com/advisories/42314)
11. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
12. [42020](http://www.securityfocus.com/bid/42020)
13. [](http://support.apple.com/kb/HT4456)
14. [APPLE-SA-2010-11-22-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23833
- **State**: PUBLISHED
- **Published Date**: February 03, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 03:51 UTC
- **Reserved Date**: January 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://groups.google.com/forum/#%21forum/django-announce)
2. [](https://docs.djangoproject.com/en/4.0/releases/security/)
3. [](https://www.djangoproject.com/weblog/2022/feb/01/security-releases/)
4. [FEDORA-2022-e7fd530688](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/)
5. [](https://security.netapp.com/advisory/ntap-20220221-0003/)
6. [DSA-5254](https://www.debian.org/security/2022/dsa-5254)
7. [](https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a)
8. [](https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468)
9. [](https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19213
- **State**: REJECTED
- **Published Date**: June 03, 2020 at 16:41 UTC
- **Last Updated**: June 03, 2020 at 16:41 UTC
- **Reserved Date**: November 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12870
- **State**: PUBLISHED
- **Published Date**: September 01, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SimpleSAMLphp 1.14.12 and earlier make it easier for man-in-the-middle attackers to obtain sensitive information by leveraging use of the aesEncrypt and aesDecrypt methods in the SimpleSAML/Utils/Crypto class to protect session identifiers in replies to non-HTTPS service providers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://simplesamlphp.org/security/201704-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4069
- **State**: PUBLISHED
- **Published Date**: October 25, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 22:29 UTC
- **Reserved Date**: October 25, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 7.x through 7.31, 9.x through 9.40, 10.00 before 10.00.xC10, 11.10 before 11.10.xC3, and 11.50 before 11.50.xC3 allows remote authenticated users to execute arbitrary code via long DBINFO keyword arguments in a SQL statement, aka idsdb00165017, idsdb00165019, idsdb00165021, idsdb00165022, and idsdb00165023.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-10-217/)
2. [ADV-2010-2735](http://www.vupen.com/english/advisories/2010/2735)
3. [68707](http://www.osvdb.org/68707)
4. [41914](http://secunia.com/advisories/41914) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4464
- **State**: PUBLISHED
- **Published Date**: December 22, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ingate Firewall before 4.3.4 and SIParator before 4.3.4 allows remote attackers to cause a denial of service (kernel deadlock) by sending a SYN packet for a TCP stream, which requires an RST packet in response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16023](http://www.securityfocus.com/bid/16023)
2. [18138](http://secunia.com/advisories/18138)
3. [ADV-2005-3011](http://www.vupen.com/english/advisories/2005/3011)
4. [](http://www.ingate.com/relnote-434.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26003
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 08:12 UTC
- **Last Updated**: August 01, 2024 at 23:52 UTC
- **Reserved Date**: February 14, 2024 at 08:22 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
An unauthenticated remote attacker can DoS the control agent due to a out-of-bounds read which may prevent or disrupt the charging functionality.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**PHOENIX CONTACT - CHARX SEC-3000**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - CHARX SEC-3050**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - CHARX SEC-3100**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - CHARX SEC-3150**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2024-011)
### Credits
- Jack Dates
- RET2 Systems |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1109
- **State**: PUBLISHED
- **Published Date**: March 01, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: March 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 9.0.597.107 does not properly process nodes in Cascading Style Sheets (CSS) stylesheets, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT4981)
2. [APPLE-SA-2011-10-12-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html)
3. [APPLE-SA-2011-10-11-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html)
4. [46614](http://www.securityfocus.com/bid/46614)
5. [](http://code.google.com/p/chromium/issues/detail?id=68263)
6. [](http://support.apple.com/kb/HT4999)
7. [](http://support.apple.com/kb/HT4808)
8. [google-chrome-stylesheet-dos(65727)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65727)
9. [](http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html)
10. [APPLE-SA-2011-07-20-1](http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html)
11. [oval:org.mitre.oval:def:14422](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14422) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1504
- **State**: PUBLISHED
- **Published Date**: February 19, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The displaycontent function in config.php for Just Another Flat file (JAF) CMS 3.0RC allows remote attackers to gain sensitive information via a blank show parameter, which reveals the installation path in an error message, as demonstrated using index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://echo.or.id/adv/adv08-y3dips-2004.txt)
2. [jaf-cms-path-disclosure(18006)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18006)
3. [20041109 Vulnerabilities in JAF CMS](http://marc.info/?l=bugtraq&m=110004150430309&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3592
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 15:33 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
### Affected Products
**OpenShift Origin - OpenShift Origin**
Affected versions:
- through 2014-08-13 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3592)
2. [](https://access.redhat.com/security/cve/cve-2014-3592) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24095
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 03, 2025 at 20:16 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4. An app may be able to bypass Privacy preferences.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122371)
2. [](https://support.apple.com/en-us/122378) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22721
- **State**: PUBLISHED
- **Published Date**: March 14, 2022 at 10:15 UTC
- **Last Updated**: August 03, 2024 at 03:21 UTC
- **Reserved Date**: January 06, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Apache Software Foundation - Apache HTTP Server**
Affected versions:
- Apache HTTP Server 2.4 (Status: affected)
### References
1. [](https://httpd.apache.org/security/vulnerabilities_24.html)
2. [[oss-security] 20220314 CVE-2022-22721: Apache HTTP Server: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody](http://www.openwall.com/lists/oss-security/2022/03/14/2)
3. [FEDORA-2022-b4103753e9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/)
4. [[debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html)
5. [FEDORA-2022-21264ec6db](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/)
6. [FEDORA-2022-78e3211c55](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/)
7. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
8. [](https://security.netapp.com/advisory/ntap-20220321-0001/)
9. [20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina](http://seclists.org/fulldisclosure/2022/May/33)
10. [20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6](http://seclists.org/fulldisclosure/2022/May/35)
11. [20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4](http://seclists.org/fulldisclosure/2022/May/38)
12. [](https://www.oracle.com/security-alerts/cpujul2022.html)
13. [](https://support.apple.com/kb/HT213257)
14. [](https://support.apple.com/kb/HT213256)
15. [](https://support.apple.com/kb/HT213255)
16. [GLSA-202208-20](https://security.gentoo.org/glsa/202208-20)
### Credits
- Anonymous working with Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30046
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 12:09 UTC
- **Last Updated**: August 03, 2024 at 22:24 UTC
- **Reserved Date**: April 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VIGRA Computer Vision Library Version-1-11-1 contains a segmentation fault vulnerability in the impex.hxx read_image_band() function, in which a crafted file can cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ukoethe/vigra/issues/494) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.