System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0167
- **State**: PUBLISHED
- **Published Date**: January 11, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in MyPhPim 01.05 allows remote attackers to execute arbitrary SQL commands via the (1) cal_id parameter in calendar.php3 and the (2) password field on the login page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://evuln.com/vulns/22/summary.html)
2. [20060111 [eVuln] MyPhPim Multiple SQL Injection and XSS Vulnerabilities](http://www.securityfocus.com/archive/1/421863/100/0/threaded)
3. [22325](http://www.osvdb.org/22325)
4. [22324](http://www.osvdb.org/22324)
5. [18399](http://secunia.com/advisories/18399)
6. [myphpim-login-sql-injection(24075)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24075)
7. [16210](http://www.securityfocus.com/bid/16210)
8. [ADV-2006-0147](http://www.vupen.com/english/advisories/2006/0147)
9. [myphpim-calendar-sql-injection(24066)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4448
- **State**: PUBLISHED
- **Published Date**: May 10, 2024 at 07:33 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 02, 2024 at 20:03 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'Dual Color Header', 'Event Calendar', & 'Advanced Data Table' widgets in all versions up to, and including, 5.9.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**wpdevteam - Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/21e12c72-7898-4896-9852-ebb10e5f9a3b?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3083162/essential-addons-for-elementor-lite/tags/5.9.20/includes/Elements/Dual_Color_Header.php)
3. [](https://plugins.trac.wordpress.org/changeset/3083162/essential-addons-for-elementor-lite/tags/5.9.20/includes/Elements/Event_Calendar.php)
4. [](https://plugins.trac.wordpress.org/changeset/3083162/essential-addons-for-elementor-lite/tags/5.9.20/includes/Elements/Advanced_Data_Table.php)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12523
- **State**: PUBLISHED
- **Published Date**: December 17, 2020 at 22:43 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: April 30, 2020 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L`
### Weakness Classification (CWE)
- CWE-909: Security Weakness
### Affected Products
**Phoenix Contact - TC MGUARD RS4000 4G VZW VPN (1010461)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - TC MGUARD RS4000 4G ATT VPN (1010463)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - FL MGUARD RS4004 TX/DTX (2701876)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - FL MGUARD RS4004 TX/DTX VPN (2701877)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - TC MGUARD RS4000 3G VPN (2903440)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - TC MGUARD RS4000 4G VPN (2903586)**
Affected versions:
- unspecified (Status: affected)
**Innominate - Innominate mGuard rs4000 4TX/TX**
Affected versions:
- unspecified (Status: affected)
**Innominate - Innominate mGuard rs4000 4TX/TX VPN**
Affected versions:
- unspecified (Status: affected)
**Innominate - Innominate mGuard rs4000 4TX/3G/TX VPN**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://cert.vde.com/en-us/advisories/vde-2020-046)
### Credits
- Discovered by SMST Designers & Constructors B.V., Phoenix Contact reported to CERT@VDE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7959
- **State**: PUBLISHED
- **Published Date**: February 17, 2020 at 20:22 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LabVantage LIMS 8.3 does not properly maintain the confidentiality of database names. For example, the web application exposes the database name. An attacker might be able to enumerate database names by providing his own database name in a request, because the response will return an 'Unrecognized Database exception message if the database does not exist.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/websecnl/LabVantage8.3-Exploit)
2. [48090](https://www.exploit-db.com/exploits/48090) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2945
- **State**: PUBLISHED
- **Published Date**: June 30, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: June 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sun Java System Access Manager 6.3 through 7.1 and Sun Java System Identity Server 6.1 and 6.2 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute arbitrary code via a crafted stylesheet, a related issue to CVE-2007-3715, CVE-2007-3716, and CVE-2007-4289.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [201538](http://sunsolve.sun.com/search/document.do?assetkey=1-26-201538-1)
2. [sun-jsam-xslt-code-execution(43429)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43429)
3. [](http://support.avaya.com/elmodocs2/security/ASA-2008-294.htm)
4. [1020380](http://www.securitytracker.com/id?1020380)
5. [29988](http://www.securityfocus.com/bid/29988)
6. [ADV-2008-1967](http://www.vupen.com/english/advisories/2008/1967/references)
7. [30893](http://secunia.com/advisories/30893) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31628
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 20:58 UTC
- **Last Updated**: April 02, 2025 at 13:28 UTC
- **Reserved Date**: March 31, 2025 at 10:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in SlicedInvoices Sliced Invoices. This issue affects Sliced Invoices: from n/a through 3.9.4.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**SlicedInvoices - Sliced Invoices**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sliced-invoices/vulnerability/wordpress-sliced-invoices-plugin-3-9-4-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Manab Jyoti Dowarah (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8331
- **State**: PUBLISHED
- **Published Date**: October 20, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 20, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3236 before E3276sTCPU-V200R002B470D13SP00C00 and E3276sWebUI-V100R007B100D03SP01C03 and E3276 before E3236sTCPU-V200R002B146D41SP00C00 and E3236sWebUI-V100R007B100D03SP01C03 allow remote attackers to hijack the authentication of administrators for requests that (1) change configuration settings or (2) use device functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-360246.htm)
2. [huawei-e3276-e3236-csrf(95198)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95198)
3. [109885](http://osvdb.org/show/osvdb/109885) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29182
- **State**: PUBLISHED
- **Published Date**: May 20, 2022 at 19:05 UTC
- **Last Updated**: April 23, 2025 at 18:24 UTC
- **Reserved Date**: April 13, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GoCD is a continuous delivery server. GoCD versions 19.11.0 through 21.4.0 (inclusive) are vulnerable to a Document Object Model (DOM)-based cross-site scripting attack via a pipeline run's Stage Details > Graphs tab. It is possible for a malicious script on a attacker-hosted site to execute script that will run within the user's browser context and GoCD session via abuse of a messaging channel used for communication between with the parent page and the stage details graph's iframe. This could allow an attacker to steal a GoCD user's session cookies and/or execute malicious code in the user's context. This issue is fixed in GoCD 22.1.0. There are currently no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**gocd - gocd**
Affected versions:
- >= 19.11.0, < 22.1.0 (Status: affected)
### References
1. [](https://github.com/gocd/gocd/releases/tag/22.1.0)
2. [](https://www.gocd.org/releases/#22-1-0)
3. [](https://github.com/gocd/gocd/security/advisories/GHSA-qcg6-4q44-3589)
4. [](https://github.com/gocd/gocd/pull/10190/commits/a256d05de1445e6c77843f098581fc6a66fe4477) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7091
- **State**: PUBLISHED
- **Published Date**: October 23, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 15:49 UTC
- **Reserved Date**: March 17, 2017 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT208141)
2. [1039384](http://www.securitytracker.com/id/1039384)
3. [](https://support.apple.com/HT208142)
4. [100995](http://www.securityfocus.com/bid/100995)
5. [](https://support.apple.com/HT208113)
6. [](https://support.apple.com/HT208112)
7. [1039428](http://www.securitytracker.com/id/1039428)
8. [](https://support.apple.com/HT208116) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33976
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 18:19 UTC
- **Reserved Date**: June 19, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7609
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "AppleGraphicsPowerManagement" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [94903](http://www.securityfocus.com/bid/94903)
2. [1037469](http://www.securitytracker.com/id/1037469)
3. [](https://support.apple.com/HT207423) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2769
- **State**: REJECTED
- **Published Date**: January 03, 2018 at 15:00 UTC
- **Last Updated**: January 03, 2018 at 14:57 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2364
- **State**: PUBLISHED
- **Published Date**: October 29, 2007 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:52 UTC
- **Reserved Date**: October 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in PHP Ticket 0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a help ticket.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5124](http://www.securityfocus.com/bid/5124)
2. [phpticket-html-xss(9452)](http://www.iss.net/security_center/static/9452.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3657
- **State**: PUBLISHED
- **Published Date**: August 13, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 09:45 UTC
- **Reserved Date**: August 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31430](http://secunia.com/advisories/31430)
2. [31697](http://secunia.com/advisories/31697)
3. [USN-651-1](https://usn.ubuntu.com/651-1/)
4. [](http://support.apple.com/kb/HT3549)
5. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264)
6. [DSA-1652](http://www.debian.org/security/2008/dsa-1652)
7. [FEDORA-2008-8736](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html)
8. [oval:org.mitre.oval:def:9793](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9793)
9. [35074](http://secunia.com/advisories/35074)
10. [](http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm)
11. [DSA-1651](http://www.debian.org/security/2008/dsa-1651)
12. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html)
13. [30644](http://www.securityfocus.com/bid/30644)
14. [RHSA-2008:0897](http://www.redhat.com/support/errata/RHSA-2008-0897.html)
15. [](http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/)
16. [32219](http://secunia.com/advisories/32219)
17. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html)
18. [ruby-dl-security-bypass(44372)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44372)
19. [32255](http://secunia.com/advisories/32255)
20. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297)
21. [20080831 rPSA-2008-0264-1 ruby](http://www.securityfocus.com/archive/1/495884/100/0/threaded)
22. [32371](http://secunia.com/advisories/32371)
23. [32165](http://secunia.com/advisories/32165)
24. [GLSA-200812-17](http://security.gentoo.org/glsa/glsa-200812-17.xml)
25. [33178](http://secunia.com/advisories/33178)
26. [ADV-2008-2334](http://www.vupen.com/english/advisories/2008/2334)
27. [1020652](http://www.securitytracker.com/id?1020652)
28. [FEDORA-2008-8738](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html)
29. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401)
30. [32256](http://secunia.com/advisories/32256) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36146
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:52 UTC
- **Last Updated**: October 07, 2024 at 12:27 UTC
- **Reserved Date**: May 21, 2024 at 17:04 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5634
- **State**: PUBLISHED
- **Published Date**: October 25, 2016 at 14:00 UTC
- **Last Updated**: October 10, 2024 at 18:12 UTC
- **Reserved Date**: June 16, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL 5.7.13 and earlier allows remote administrators to affect availability via vectors related to RBR.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201701-01](https://security.gentoo.org/glsa/201701-01)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html)
3. [93709](http://www.securityfocus.com/bid/93709)
4. [1037050](http://www.securitytracker.com/id/1037050) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1716
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 19:42 UTC
- **Last Updated**: October 08, 2024 at 16:17 UTC
- **Reserved Date**: December 02, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Enterprise Server 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Word 2016**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Office Web Apps 2010 Service Pack 2**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Word 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Word 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Microsoft Word 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
### References
1. [Microsoft Word Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32907
- **State**: PUBLISHED
- **Published Date**: April 14, 2025 at 14:00 UTC
- **Last Updated**: May 29, 2025 at 06:49 UTC
- **Reserved Date**: April 14, 2025 at 01:37 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-1050: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 10**
Affected versions:
- 0:3.6.5-3.el10_0.6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:2.8-3.el8_10.1 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:8.10-1 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:2.72.0-10.el9_6.1 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions**
Affected versions:
- 0:2.72.0-8.el9_0.4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:2.72.0-8.el9_2.4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.4 Extended Update Support**
Affected versions:
- 0:2.72.0-8.el9_4.4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
### References
1. [RHSA-2025:4439](https://access.redhat.com/errata/RHSA-2025:4439)
2. [RHSA-2025:4440](https://access.redhat.com/errata/RHSA-2025:4440)
3. [RHSA-2025:4508](https://access.redhat.com/errata/RHSA-2025:4508)
4. [RHSA-2025:7436](https://access.redhat.com/errata/RHSA-2025:7436)
5. [RHSA-2025:8128](https://access.redhat.com/errata/RHSA-2025:8128)
6. [RHSA-2025:8292](https://access.redhat.com/errata/RHSA-2025:8292)
7. [](https://access.redhat.com/security/cve/CVE-2025-32907)
8. [RHBZ#2359342](https://bugzilla.redhat.com/show_bug.cgi?id=2359342) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0359
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: May 02, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020606-01-I](ftp://patches.sgi.com/support/free/security/advisories/20020606-01-I)
2. [20020620 [LSD] IRIX rpc.xfsmd multiple remote root vulnerabilities](http://marc.info/?l=bugtraq&m=102459162909825&w=2)
3. [irix-xfsmd-bypass-authentication(9401)](http://www.iss.net/security_center/static/9401.php)
4. [5072](http://www.securityfocus.com/bid/5072)
5. [VU#521147](http://www.kb.cert.org/vuls/id/521147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4192
- **State**: PUBLISHED
- **Published Date**: September 29, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:08 UTC
- **Reserved Date**: September 23, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pserver_shutdown function in fence_egenera in cman 2.20080629 and 2.20080801 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/eglog temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30898](http://www.securityfocus.com/bid/30898)
2. [32390](http://secunia.com/advisories/32390)
3. [[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire](http://www.openwall.com/lists/oss-security/2008/10/30/2)
4. [](http://dev.gentoo.org/~rbu/security/debiantemp/cman)
5. [32387](http://secunia.com/advisories/32387)
6. [](https://bugs.gentoo.org/show_bug.cgi?id=235770)
7. [31887](http://secunia.com/advisories/31887)
8. [](http://uvw.ru/report.lenny.txt)
9. [cman-fenceegenera-symlink(44845)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44845)
10. [ADV-2011-0419](http://www.vupen.com/english/advisories/2011/0419)
11. [USN-875-1](http://www.ubuntu.com/usn/USN-875-1)
12. [](https://bugzilla.redhat.com/show_bug.cgi?id=460476)
13. [[oss-security] 20080918 CVE Request (openswan, emacspeak, cman)](http://www.openwall.com/lists/oss-security/2008/09/18/3)
14. [[oss-security] 20080923 Re: CVE Request (openswan, emacspeak, cman)](http://www.openwall.com/lists/oss-security/2008/09/24/2)
15. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496410)
16. [FEDORA-2008-9042](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00666.html)
17. [43362](http://secunia.com/advisories/43362)
18. [RHSA-2011:0266](http://www.redhat.com/support/errata/RHSA-2011-0266.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25650
- **State**: PUBLISHED
- **Published Date**: November 25, 2020 at 14:35 UTC
- **Last Updated**: August 04, 2024 at 15:40 UTC
- **Reserved Date**: September 16, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**n/a - spice-vdagent**
Affected versions:
- spice-vdagent versions prior and including 0.20 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1886345)
2. [](https://www.openwall.com/lists/oss-security/2020/11/04/1)
3. [[debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update](https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html)
4. [FEDORA-2021-09ce0cdfac](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIWJ2EIQXWEA2VDBODEATHAT37X4CREP/)
5. [FEDORA-2021-510977db25](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQT56LATVTB2DJOVVJOKQVMVUXYCT2VB/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2293
- **State**: PUBLISHED
- **Published Date**: February 01, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 17:33 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: puppet
### Vulnerability Description
Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy.
### Affected Products
**Puppet - Puppet Enterprise**
Affected versions:
- prior to 2016.4.5, 2016.5.x, 2017.1.x, resolved in 2016.4.5 and 2017.2.1 (Status: affected)
### References
1. [](https://puppet.com/security/cve/cve-2017-2293) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15624
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 21, 2018 at 00:00 UTC
- **Assigned By**: avaya
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8053
- **State**: PUBLISHED
- **Published Date**: November 18, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: November 02, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 10 before Update 18 and 11 before Update 7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-8052.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [77625](http://www.securityfocus.com/bid/77625)
2. [](https://helpx.adobe.com/security/products/coldfusion/apsb15-29.html)
3. [1034211](http://www.securitytracker.com/id/1034211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30308
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 19:37 UTC
- **Last Updated**: February 13, 2025 at 15:46 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue discovered in Ruijie EG210G-P, Ruijie EG105G-V2, Ruijie NBR, and Ruijie EG105G routers allows attackers to hijack TCP sessions which could lead to a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33344
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:27 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-822+ V1.0.5 was found to contain a command injection in ftext function of upload_firmware.cgi, which allows remote attackers to execute arbitrary commands via shell.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-822%2B)
2. [](https://github.com/n0wstr/IOTVuln/tree/main/DIR-822%2B/UploadFirmware) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5838
- **State**: PUBLISHED
- **Published Date**: June 07, 2025 at 16:00 UTC
- **Last Updated**: June 09, 2025 at 14:51 UTC
- **Reserved Date**: June 06, 2025 at 20:14 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in PHPGurukul Employee Record Management System 1.3. Affected by this vulnerability is an unknown functionality of the file /admin/adminprofile.php. The manipulation of the argument AdminName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Employee Record Management System**
Affected versions:
- 1.3 (Status: affected)
### References
1. [VDB-311581 | PHPGurukul Employee Record Management System adminprofile.php sql injection](https://vuldb.com/?id.311581)
2. [VDB-311581 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311581)
3. [Submit #591365 | PHPGurukul Employee Record Management System 1.3 SQL Injection](https://vuldb.com/?submit.591365)
4. [](https://github.com/f1rstb100d/myCVE/issues/62)
5. [](https://phpgurukul.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0958
- **State**: PUBLISHED
- **Published Date**: January 27, 2024 at 06:00 UTC
- **Last Updated**: October 18, 2024 at 14:39 UTC
- **Reserved Date**: January 26, 2024 at 17:11 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in CodeAstro Stock Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /index.php of the component Add Category Handler. The manipulation of the argument Category Name/Category Description leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252203.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CodeAstro - Stock Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.252203)
2. [](https://vuldb.com/?ctiid.252203)
3. [](https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing)
### Credits
- Mohammed Aashique (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29478
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 18:19 UTC
- **Reserved Date**: May 11, 2022 at 04:17 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52934
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 16:37 UTC
- **Last Updated**: May 04, 2025 at 07:46 UTC
- **Reserved Date**: August 21, 2024 at 06:07 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups
In commit 34488399fa08 ("mm/madvise: add file and shmem support to
MADV_COLLAPSE") we make the following change to find_pmd_or_thp_or_none():
- if (!pmd_present(pmde))
- return SCAN_PMD_NULL;
+ if (pmd_none(pmde))
+ return SCAN_PMD_NONE;
This was for-use by MADV_COLLAPSE file/shmem codepaths, where
MADV_COLLAPSE might identify a pte-mapped hugepage, only to have
khugepaged race-in, free the pte table, and clear the pmd. Such codepaths
include:
A) If we find a suitably-aligned compound page of order HPAGE_PMD_ORDER
already in the pagecache.
B) In retract_page_tables(), if we fail to grab mmap_lock for the target
mm/address.
In these cases, collapse_pte_mapped_thp() really does expect a none (not
just !present) pmd, and we want to suitably identify that case separate
from the case where no pmd is found, or it's a bad-pmd (of course, many
things could happen once we drop mmap_lock, and the pmd could plausibly
undergo multiple transitions due to intervening fault, split, etc).
Regardless, the code is prepared install a huge-pmd only when the existing
pmd entry is either a genuine pte-table-mapping-pmd, or the none-pmd.
However, the commit introduces a logical hole; namely, that we've allowed
!none- && !huge- && !bad-pmds to be classified as genuine
pte-table-mapping-pmds. One such example that could leak through are swap
entries. The pmd values aren't checked again before use in
pte_offset_map_lock(), which is expecting nothing less than a genuine
pte-table-mapping-pmd.
We want to put back the !pmd_present() check (below the pmd_none() check),
but need to be careful to deal with subtleties in pmd transitions and
treatments by various arch.
The issue is that __split_huge_pmd_locked() temporarily clears the present
bit (or otherwise marks the entry as invalid), but pmd_present() and
pmd_trans_huge() still need to return true while the pmd is in this
transitory state. For example, x86's pmd_present() also checks the
_PAGE_PSE , riscv's version also checks the _PAGE_LEAF bit, and arm64 also
checks a PMD_PRESENT_INVALID bit.
Covering all 4 cases for x86 (all checks done on the same pmd value):
1) pmd_present() && pmd_trans_huge()
All we actually know here is that the PSE bit is set. Either:
a) We aren't racing with __split_huge_page(), and PRESENT or PROTNONE
is set.
=> huge-pmd
b) We are currently racing with __split_huge_page(). The danger here
is that we proceed as-if we have a huge-pmd, but really we are
looking at a pte-mapping-pmd. So, what is the risk of this
danger?
The only relevant path is:
madvise_collapse() -> collapse_pte_mapped_thp()
Where we might just incorrectly report back "success", when really
the memory isn't pmd-backed. This is fine, since split could
happen immediately after (actually) successful madvise_collapse().
So, it should be safe to just assume huge-pmd here.
2) pmd_present() && !pmd_trans_huge()
Either:
a) PSE not set and either PRESENT or PROTNONE is.
=> pte-table-mapping pmd (or PROT_NONE)
b) devmap. This routine can be called immediately after
unlocking/locking mmap_lock -- or called with no locks held (see
khugepaged_scan_mm_slot()), so previous VMA checks have since been
invalidated.
3) !pmd_present() && pmd_trans_huge()
Not possible.
4) !pmd_present() && !pmd_trans_huge()
Neither PRESENT nor PROTNONE set
=> not present
I've checked all archs that implement pmd_trans_huge() (arm64, riscv,
powerpc, longarch, x86, mips, s390) and this logic roughly translates
(though devmap treatment is unique to x86 and powerpc, and (3) doesn't
necessarily hold in general -- but that doesn't matter since
!pmd_present() always takes failure path).
Also, add a comment above find_pmd_or_thp_or_none()
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 34488399fa08faaf664743fa54b271eb6f9e1321 (Status: affected)
- 34488399fa08faaf664743fa54b271eb6f9e1321 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1 (Status: affected)
- 0 (Status: unaffected)
- 6.1.11 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/96aaaf8666010a39430cecf8a65c7ce2908a030f)
2. [](https://git.kernel.org/stable/c/edb5d0cf5525357652aff6eacd9850b8ced07143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-125053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-125053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-125053
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 22:44 UTC
- **Last Updated**: August 06, 2024 at 14:10 UTC
- **Reserved Date**: January 06, 2023 at 22:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The patch is identified as 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - Piwigo-Guest-Book**
Affected versions:
- 1.0 (Status: affected)
- 1.1 (Status: affected)
- 1.2 (Status: affected)
- 1.3 (Status: affected)
### References
1. [](https://vuldb.com/?id.217582)
2. [](https://vuldb.com/?ctiid.217582)
3. [](https://github.com/Piwigo/Piwigo-Guest-Book/commit/0cdd1c388edf15089c3a7541cefe7756e560581d)
4. [](https://github.com/Piwigo/Piwigo-Guest-Book/releases/tag/1.3.1)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3449
- **State**: PUBLISHED
- **Published Date**: August 17, 2020 at 18:00 UTC
- **Last Updated**: November 13, 2024 at 18:15 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Border Gateway Protocol (BGP) additional paths feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent authorized users from monitoring the BGP status and cause the BGP process to stop processing new updates, resulting in a denial of service (DOS) condition. The vulnerability is due to an incorrect calculation of lexicographical order when displaying additional path information within Cisco IOS XR Software, which causes an infinite loop. An attacker could exploit this vulnerability by sending a specific BGP update from a BGP neighbor peer session of an affected device; an authorized user must then issue a show bgp command for the vulnerability to be exploited. A successful exploit could allow the attacker to prevent authorized users from properly monitoring the BGP status and prevent BGP from processing new updates, resulting in outdated information in the routing and forwarding tables.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-754: Security Weakness
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20200805 Cisco IOS XR Software Additional Paths Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bgp-ErKEqAer) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16833
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:52 UTC
- **Last Updated**: December 20, 2021 at 22:52 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6455
- **State**: PUBLISHED
- **Published Date**: March 13, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:27 UTC
- **Reserved Date**: March 13, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Session fixation vulnerability in Edikon phpShop 0.8.1 allows remote attackers to hijack web sessions via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phpshop-unspecified-session-hijacking(45244)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45244)
2. [31251](http://www.securityfocus.com/bid/31251)
3. [31948](http://secunia.com/advisories/31948)
4. [48231](http://osvdb.org/48231) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27397
- **State**: PUBLISHED
- **Published Date**: December 23, 2020 at 17:54 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Marital - Online Matrimonial Project In PHP version 1.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) on the Hosting web server via uploading a maliciously crafted PHP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/160337/Online-Matrimonial-Project-1.0-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3535
- **State**: PUBLISHED
- **Published Date**: October 02, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: October 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in image.php in Clear Content 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. NOTE: the researcher also suggests an analogous PHP remote file inclusion vulnerability, but this may be incorrect.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt)
2. [35726](http://secunia.com/advisories/35726)
3. [clearcontent-image-file-include(51629)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51629)
4. [9089](http://www.exploit-db.com/exploits/9089)
5. [55742](http://www.osvdb.org/55742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31379
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 10:21 UTC
- **Last Updated**: August 02, 2024 at 01:52 UTC
- **Reserved Date**: April 01, 2024 at 06:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Smash Balloon Social Post Feed.This issue affects Smash Balloon Social Post Feed: from n/a through 4.2.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Smash Balloon - Smash Balloon Social Post Feed**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/custom-facebook-feed/wordpress-smash-balloon-social-post-feed-plugin-4-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Majed Refaea (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2965
- **State**: PUBLISHED
- **Published Date**: June 06, 2024 at 18:52 UTC
- **Last Updated**: November 03, 2024 at 18:27 UTC
- **Reserved Date**: March 26, 2024 at 19:55 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A Denial-of-Service (DoS) vulnerability exists in the `SitemapLoader` class of the `langchain-ai/langchain` repository, affecting all versions. The `parse_sitemap` method, responsible for parsing sitemaps and extracting URLs, lacks a mechanism to prevent infinite recursion when a sitemap URL refers to the current sitemap itself. This oversight allows for the possibility of an infinite loop, leading to a crash by exceeding the maximum recursion depth in Python. This vulnerability can be exploited to occupy server socket/port resources and crash the Python process, impacting the availability of services relying on this functionality.
### Weakness Classification (CWE)
- CWE-674: Security Weakness
### Affected Products
**langchain-ai - langchain-ai/langchain**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/90b0776d-9fa6-4841-aac4-09fde5918cae)
2. [](https://github.com/langchain-ai/langchain/commit/73c42306745b0831aa6fe7fe4eeb70d2c2d87a82) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39322
- **State**: PUBLISHED
- **Published Date**: September 02, 2021 at 16:42 UTC
- **Last Updated**: May 05, 2025 at 14:50 UTC
- **Reserved Date**: August 20, 2021 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**cybernetikz - Easy Social Icons**
Affected versions:
- 3.0.8 (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58)
2. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39322)
### Credits
- Ramuel Gall, Wordfence |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5556
- **State**: PUBLISHED
- **Published Date**: January 23, 2017 at 06:49 UTC
- **Last Updated**: August 05, 2024 at 15:04 UTC
- **Reserved Date**: January 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ConvertToPDF plugin in Foxit Reader before 8.2 and PhantomPDF before 8.2 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image. The vulnerability could lead to information disclosure; an attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [95353](http://www.securityfocus.com/bid/95353)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-17-039/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4468
- **State**: PUBLISHED
- **Published Date**: October 07, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in view_news.php in Vastal I-Tech Share Zone allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sharezone-viewnews-sql-injection(44954)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44954)
2. [31033](http://www.securityfocus.com/bid/31033)
3. [6375](https://www.exploit-db.com/exploits/6375) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1474
- **State**: PUBLISHED
- **Published Date**: August 17, 2020 at 19:13 UTC
- **Last Updated**: November 18, 2024 at 16:46 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera, scanner, cellular phone) to an affected system and run a specially crafted application to disclose information.
The security update addresses the vulnerability by correcting how the WIA Service handles objects in memory.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1474) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0436
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Retail Point-of-Service component in Oracle Retail Applications 13.4, 14.0, and 14.1 allows local users to affect confidentiality via vectors related to Mobile POS, a different vulnerability than CVE-2016-0434, CVE-2016-0437, and CVE-2016-0438.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034718](http://www.securitytracker.com/id/1034718) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1508
- **State**: PUBLISHED
- **Published Date**: May 01, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:13 UTC
- **Reserved Date**: May 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the xforum_validateUser function in Common.php in X-Forum 0.6.2 allows remote attackers to execute arbitrary SQL commands, as demonstrated via the cookie_username parameter to Configure.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34302](http://www.securityfocus.com/bid/34302)
2. [xforum-cookieusername-sql-injection(49537)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49537)
3. [8317](https://www.exploit-db.com/exploits/8317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1390
- **State**: PUBLISHED
- **Published Date**: March 24, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3764](http://securityreason.com/securityalert/3764)
2. [28316](http://www.securityfocus.com/bid/28316)
3. [20080318 AST-2008-005: HTTP Manager ID is predictable](http://www.securityfocus.com/archive/1/489819/100/0/threaded)
4. [asterisk-httpmanagerid-weak-security(41304)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41304)
5. [29449](http://secunia.com/advisories/29449)
6. [](http://downloads.digium.com/pub/security/AST-2008-005.html)
7. [FEDORA-2008-2554](https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html)
8. [1019679](http://www.securitytracker.com/id?1019679)
9. [FEDORA-2008-2620](https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html)
10. [29470](http://secunia.com/advisories/29470) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17619
- **State**: PUBLISHED
- **Published Date**: October 29, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Validate events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6352.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.1.5096 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-18-1100) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28409
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 00:00 UTC
- **Last Updated**: April 08, 2025 at 19:33 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yangzongzhuan/RuoYi)
2. [](https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28408.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32335
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 09:23 UTC
- **Last Updated**: August 05, 2024 at 15:52 UTC
- **Reserved Date**: May 08, 2023 at 18:32 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Maximo Application Suite 8.10, 8.11 and IBM Maximo Asset Management 7.6.1.3 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 255075.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-598: Security Weakness
### Affected Products
**IBM - Maximo Application Suite**
Affected versions:
- 8.10, 8.11 (Status: affected)
**IBM - Maximo Asset Management**
Affected versions:
- 7.6.1.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7138684)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/266875)
3. [](https://www.ibm.com/support/pages/node/7138686) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34481
- **State**: PUBLISHED
- **Published Date**: July 05, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
drupal-wiki.com Drupal Wiki before 8.31.1 allows XSS via comments, captions, and image titles of a Wiki page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.secuvera.de/advisories/secuvera-SA-2024-02.txt)
2. [](https://drupal-wiki.com/drupal-wiki-update-8-31/)
3. [](https://seclists.org/fulldisclosure/2024/May/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6266
- **State**: PUBLISHED
- **Published Date**: February 25, 2019 at 23:00 UTC
- **Last Updated**: August 04, 2024 at 20:16 UTC
- **Reserved Date**: January 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cordaware bestinformed Microsoft Windows client before 6.2.1.0 is affected by insecure SSL certificate verification and insecure access patterns. These issues allow remote attackers to downgrade encrypted connections to cleartext.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.detack.de/en/cve-2019-6265-6266) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3677
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:52 UTC
- **Last Updated**: August 15, 2024 at 14:24 UTC
- **Reserved Date**: April 11, 2024 at 20:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ultimate 410 Gone Status Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 410 entries in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**tinyweb - Ultimate 410 Gone Status Code**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7c10be28-43ff-4b43-8186-6ad9a487321e?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074532%40ultimate-410&new=3074532%40ultimate-410&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2635
- **State**: PUBLISHED
- **Published Date**: June 15, 2012 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 22:10 UTC
- **Reserved Date**: May 14, 2012 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
The Dolphin Browser HD application before 7.6 and Dolphin for Pad application before 1.0.1 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#90751882](http://jvn.jp/en/jp/JVN90751882/index.html)
2. [JVNDB-2012-000057](http://jvndb.jvn.jp/jvndb/JVNDB-2012-000057) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2238
- **State**: PUBLISHED
- **Published Date**: April 16, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 25, 2007 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Multiple stack-based buffer overflows in the Whale Client Components ActiveX control (WhlMgr.dll), as used in Microsoft Intelligent Application Gateway (IAG) before 3.7 SP2, allow remote attackers to execute arbitrary code via long arguments to the (1) CheckForUpdates or (2) UpdateComponents methods.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#789121](http://www.kb.cert.org/vuls/id/789121)
2. [ADV-2009-1061](http://www.vupen.com/english/advisories/2009/1061)
3. [34725](http://secunia.com/advisories/34725)
4. [34532](http://www.securityfocus.com/bid/34532)
5. [iag-activex-bo(49888)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49888) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45900
- **State**: PUBLISHED
- **Published Date**: March 30, 2022 at 21:38 UTC
- **Last Updated**: August 04, 2024 at 04:54 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vivoh Webinar Manager before 3.6.3.0 has improper API authentication. When a user logs in to the administration configuration web portlet, a VIVOH_AUTH cookie is assigned so that they can be uniquely identified. Certain APIs can be successfully executed without proper authentication. This can let an attacker impersonate as victim and make state changing requests on their behalf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vivoh.com/wp-content/uploads/2021/11/Vivoh-Webinar-Manager-for-Zoom-Installation-and-Administration-Guide.pdf)
2. [](https://vivoh.com/blog/finra-remediation/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10177
- **State**: PUBLISHED
- **Published Date**: June 27, 2019 at 20:50 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 27, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability was found in the PDF export component of CloudForms, versions 5.9 and 5.10, due to user input is not properly sanitized. An attacker with least privilege to edit compute is able to execute a XSS attack against other users, which could lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Red Hat - CloudForms**
Affected versions:
- 5.9, 5.10 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10177)
2. [109065](http://www.securityfocus.com/bid/109065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0090
- **State**: PUBLISHED
- **Published Date**: March 13, 2013 at 00:00 UTC
- **Last Updated**: January 16, 2025 at 20:37 UTC
- **Reserved Date**: November 27, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40935](https://www.exploit-db.com/exploits/40935/)
2. [](http://packetstormsecurity.com/files/140186/Microsoft-Internet-Explorer-9-IEFRAME-CView-EnsureSize-Use-After-Free.html)
3. [oval:org.mitre.oval:def:16049](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16049)
4. [TA13-071A](http://www.us-cert.gov/ncas/alerts/TA13-071A)
5. [MS13-021](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-021)
6. [](http://blog.skylined.nl/20161216001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14936
- **State**: PUBLISHED
- **Published Date**: August 05, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 09:46 UTC
- **Reserved Date**: August 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Add page option in my little forum 2.4.12 allows XSS via the Title field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://owendarlene.com/stored-xss-my-little-forum/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55192
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 00:00 UTC
- **Last Updated**: February 05, 2025 at 14:32 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5768
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 16:58 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect integrity via unknown vectors related to ActiveX Controls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5365
- **State**: PUBLISHED
- **Published Date**: October 18, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:48 UTC
- **Reserved Date**: October 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Oracle Forms in Oracle Application Server 9.0.4.3 and 10.1.2.0.2, and E-Business Suite and Applications 11.5.10CU2, has unknown impact and remote attack vectors, aka Vuln# FORM02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html)
2. [20588](http://www.securityfocus.com/bid/20588)
3. [HPSBMA02133](http://www.securityfocus.com/archive/1/449711/100/0/threaded)
4. [](http://www.oracle.com/technetwork/topics/security/cpuoct2006-095368.html)
5. [SSRT061201](http://www.securityfocus.com/archive/1/449711/100/0/threaded)
6. [ADV-2006-4065](http://www.vupen.com/english/advisories/2006/4065)
7. [22396](http://secunia.com/advisories/22396)
8. [1017077](http://securitytracker.com/id?1017077)
9. [TA06-291A](http://www.us-cert.gov/cas/techalerts/TA06-291A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0608
- **State**: PUBLISHED
- **Published Date**: March 08, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [52365](http://www.securityfocus.com/bid/52365)
2. [1026774](http://www.securitytracker.com/id?1026774)
3. [oval:org.mitre.oval:def:16726](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16726)
4. [apple-webkit-cve20120608-code-execution(73827)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73827)
5. [48377](http://secunia.com/advisories/48377)
6. [APPLE-SA-2012-03-12-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html)
7. [48274](http://secunia.com/advisories/48274)
8. [79930](http://osvdb.org/79930)
9. [APPLE-SA-2012-03-07-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html)
10. [48288](http://secunia.com/advisories/48288)
11. [APPLE-SA-2012-03-07-2](http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0205
- **State**: PUBLISHED
- **Published Date**: January 11, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in admin/skins.php for @lex Guestbook 4.0.2 and earlier allows remote attackers to create files in arbitrary directories via ".." sequences in the (1) aj_skin and (2) skin_edit parameters. NOTE: this can be leveraged for file inclusion by creating a skin file in the lang directory, then referencing that file via the lang parameter to index.php, which passes a sanity check in livre_include.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://acid-root.new.fr/poc/20070107.txt)
2. [@lexguestbook-livreinclude-file-include(31397)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31397)
3. [31709](http://osvdb.org/31709)
4. [2135](http://securityreason.com/securityalert/2135)
5. [31708](http://osvdb.org/31708)
6. [21926](http://www.securityfocus.com/bid/21926)
7. [20070107 @lex Guestbook <= 4.0.2 Remote Command Execution Exploit](http://www.securityfocus.com/archive/1/456218/100/0/threaded)
8. [3103](https://www.exploit-db.com/exploits/3103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9193
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 00:00 UTC
- **Last Updated**: November 15, 2024 at 15:13 UTC
- **Reserved Date**: February 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/)
2. [](https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5)
3. [](https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/)
4. [](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/)
5. [](https://security.netapp.com/advisory/ntap-20190502-0003/)
6. [](http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html)
7. [](http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html)
8. [](http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2660
- **State**: PUBLISHED
- **Published Date**: September 06, 2011 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 06, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The modify_resolvconf_suse script in the vpnc package before 0.5.1-55.10.1 in SUSE Linux Enterprise Desktop 11 SP1 might allow remote attackers to execute arbitrary commands via a crafted DNS domain name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49391](http://www.securityfocus.com/bid/49391)
2. [SUSE-SU-2011:0980](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00029.html)
3. [](https://bugzilla.novell.com/651577)
4. [vpnc-modifyresolvconfsuse-command-execution(69514)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69514)
5. [](https://bugzilla.novell.com/708656)
6. [SUSE-SU-2011:0979](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20092
- **State**: PUBLISHED
- **Published Date**: October 07, 2024 at 02:35 UTC
- **Last Updated**: October 07, 2024 at 13:44 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1700.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**MediaTek, Inc. - MT6761, MT6765, MT6768, MT6779, MT6785, MT6853, MT6873, MT6885, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789**
Affected versions:
- Android 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/October-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30800
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 13:38 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in iOS 14.7. Joining a malicious Wi-Fi network may result in a denial of service or arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212601) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18547
- **State**: REJECTED
- **Published Date**: October 28, 2019 at 14:42 UTC
- **Last Updated**: October 28, 2019 at 14:42 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27757
- **State**: PUBLISHED
- **Published Date**: March 18, 2024 at 00:00 UTC
- **Last Updated**: August 28, 2024 at 19:15 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
flusity CMS through 2.45 allows tools/addons_model.php Gallery Name XSS. The reporter indicates that this product "ceased its development as of February 2024."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0250
- **State**: PUBLISHED
- **Published Date**: March 18, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:10 UTC
- **Reserved Date**: March 17, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in PhotoPost PHP Pro 4.6 and earlier allows remote attackers to gain privileges via (1) the product parameter in showproduct.php or (2) the cat parameter in showcat.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [photopostphp-sql-injection(15008)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15008)
2. [20040204 ZH2004-04SA (security advisory): Multiple Sql Injection](http://marc.info/?l=bugtraq&m=107593114909696&w=2)
3. [9557](http://www.securityfocus.com/bid/9557)
4. [](http://www.zone-h.org/en/advisories/read/id=3864/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3284
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 10:39 UTC
- **Last Updated**: August 28, 2024 at 20:00 UTC
- **Reserved Date**: September 23, 2022 at 10:58 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Download key for a file in a vault was passed in an insecure way that could easily be logged in M-Files New Web in M-Files before 22.11.12011.0.
This issue affects M-Files New Web: before 22.11.12011.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**M-Files - M-Files New Web**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.m-files.com/about/trust-center/security-advisories/cve-2022-3284/)
2. [](https://product.m-files.com/security-advisories/cve-2022-3284/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8006
- **State**: PUBLISHED
- **Published Date**: January 05, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Authentication bypass vulnerability in Enterprise Security Manager (ESM) and License Manager (LM) in Intel Security McAfee Security Information and Event Management (SIEM) 9.6.0 MR3 allows an administrator to make changes to other SIEM users' information including user passwords without supplying the current administrator password a second time via the GUI or GUI terminal commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html)
2. [](https://kc.mcafee.com/corporate/index?page=content&id=KB87744)
3. [95313](http://www.securityfocus.com/bid/95313)
4. [](http://www.quantumleap.it/mcafee-siem-esm-esmrec-authentication-bypass-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25809
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 18:22 UTC
- **Last Updated**: February 12, 2025 at 16:02 UTC
- **Reserved Date**: February 15, 2023 at 16:34 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-281: Security Weakness
### Affected Products
**opencontainers - runc**
Affected versions:
- < 1.1.5 (Status: affected)
### References
1. [https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc](https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc)
2. [https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17](https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31712
- **State**: PUBLISHED
- **Published Date**: April 24, 2021 at 20:56 UTC
- **Last Updated**: August 03, 2024 at 23:03 UTC
- **Reserved Date**: April 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
react-draft-wysiwyg (aka React Draft Wysiwyg) before 1.14.6 allows a javascript: URi in a Link Target of the link decorator in decorators/Link/index.js when a draft is shared across users, leading to XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jpuri/react-draft-wysiwyg/issues/1102)
2. [](https://github.com/jpuri/react-draft-wysiwyg/pull/1104)
3. [](https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44279
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 21:07 UTC
- **Last Updated**: October 30, 2024 at 14:18 UTC
- **Reserved Date**: August 20, 2024 at 21:45 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Parsing a file may lead to disclosure of user information.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121570)
2. [](https://support.apple.com/en-us/121568) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39881
- **State**: PUBLISHED
- **Published Date**: November 09, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 19:34 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper input validation vulnerability for processing SIB12 PDU in Exynos modems prior to SMR Sep-2022 Release allows remote attacker to read out of bounds memory.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Select devices using Exynos CP chipsets (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9044
- **State**: PUBLISHED
- **Published Date**: March 10, 2020 at 19:28 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: jci
### Vulnerability Description
XXE vulnerability exists in the Metasys family of product Web Services which has the potential to facilitate DoS attacks or harvesting of ASCII server files. This affects Johnson Controls' Metasys Application and Data Server (ADS, ADS-Lite) versions 10.1 and prior; Metasys Extended Application and Data Server (ADX) versions 10.1 and prior; Metasys Open Data Server (ODS) versions 10.1 and prior; Metasys Open Application Server (OAS) version 10.1; Metasys Network Automation Engine (NAE55 only) versions 9.0.1, 9.0.2, 9.0.3, 9.0.5, 9.0.6; Metasys Network Integration Engine (NIE55/NIE59) versions 9.0.1, 9.0.2, 9.0.3, 9.0.5, 9.0.6; Metasys NAE85 and NIE85 versions 10.1 and prior; Metasys LonWorks Control Server (LCS) versions 10.1 and prior; Metasys System Configuration Tool (SCT) versions 13.2 and prior; Metasys Smoke Control Network Automation Engine (NAE55, UL 864 UUKL/ORD-C100-13 UUKLC 10th Edition Listed) version 8.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Johnson Controls - Metasys Application and Data Server (ADS, ADS-Lite)**
Affected versions:
- versions 10.1 and prior (Status: affected)
**Johnson Controls - Metasys Extended Application and Data Server (ADX)**
Affected versions:
- versions 10.1 and prior (Status: affected)
**Johnson Controls - Metasys Open Data Server (ODS)**
Affected versions:
- versions 10.1 and prior (Status: affected)
**Johnson Controls - Metasys Open Application Server (OAS)**
Affected versions:
- version 10.1 (Status: affected)
**Johnson Controls - Metasys Network Automation Engine (NAE55 only)**
Affected versions:
- versions 9.0.1 (Status: affected)
- 9.0.2 (Status: affected)
- 9.0.3 (Status: affected)
- 9.0.5 (Status: affected)
- 9.0.6 (Status: affected)
**Johnson Controls - Metasys Network Integration Engine (NIE55/NIE59)**
Affected versions:
- versions 9.0.1 (Status: affected)
- 9.0.2 (Status: affected)
- 9.0.3 (Status: affected)
- 9.0.5 (Status: affected)
- 9.0.6 (Status: affected)
**Johnson Controls - Metasys NAE85 and NIE85**
Affected versions:
- versions 10.1 and prior (Status: affected)
**Johnson Controls - Metasys LonWorks Control Server (LCS)**
Affected versions:
- versions 10.1 and prior (Status: affected)
**Johnson Controls - Metasys System Configuration Tool (SCT)**
Affected versions:
- versions 13.2 and prior (Status: affected)
**Johnson Controls - Metasys Smoke Control Network Automation Engine (NAE55, UL 864 UUKL/ORD-C100-13 UUKLC 10th Edition Listed)**
Affected versions:
- version 8.1 (Status: affected)
### References
1. [](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)
2. [ICS-CERT Advisory](https://www.us-cert.gov/ics/advisories/icsa-20-070-05)
### Credits
- Lukasz Rupala |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12419
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 03:21 UTC
- **Last Updated**: January 07, 2025 at 16:28 UTC
- **Reserved Date**: December 10, 2024 at 16:07 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The The Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**tobias_conrad - Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5d78ea71-5886-488e-a660-0dc25129a8b6?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7-customizer-admin.php#L405)
3. [](https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7-customizer-admin.php#L300)
4. [](https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7-customizer-admin.php#L295)
### Credits
- Arkadiusz Hydzik |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47235
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:09 UTC
- **Reserved Date**: November 03, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b)
2. [[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update](https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28062
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 16:36 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Access Control vulnerability exists in HisiPHP 2.0.11 via special packets that are constructed in $files = Dir::getList($decompath. '/ Upload/Plugins /, which could let a remote malicious user execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hisiphp/hisiphp/issues/10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26845
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 10:10 UTC
- **Last Updated**: May 04, 2025 at 08:57 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: core: Add TMF to tmr_list handling
An abort that is responded to by iSCSI itself is added to tmr_list but does
not go to target core. A LUN_RESET that goes through tmr_list takes a
refcounter on the abort and waits for completion. However, the abort will
be never complete because it was not started in target core.
Unable to locate ITT: 0x05000000 on CID: 0
Unable to locate RefTaskTag: 0x05000000 on CID: 0.
wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
...
INFO: task kworker/0:2:49 blocked for more than 491 seconds.
task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800
Workqueue: events target_tmr_work [target_core_mod]
Call Trace:
__switch_to+0x2c4/0x470
_schedule+0x314/0x1730
schedule+0x64/0x130
schedule_timeout+0x168/0x430
wait_for_completion+0x140/0x270
target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]
core_tmr_lun_reset+0x30/0xa0 [target_core_mod]
target_tmr_work+0xc8/0x1b0 [target_core_mod]
process_one_work+0x2d4/0x5d0
worker_thread+0x78/0x6c0
To fix this, only add abort to tmr_list if it will be handled by target
core.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.308 (Status: unaffected)
- 5.4.270 (Status: unaffected)
- 5.10.211 (Status: unaffected)
- 5.15.150 (Status: unaffected)
- 6.1.80 (Status: unaffected)
- 6.6.19 (Status: unaffected)
- 6.7.7 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171)
2. [](https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d)
3. [](https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf)
4. [](https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d)
5. [](https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a)
6. [](https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb)
7. [](https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f)
8. [](https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20039
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 21:01 UTC
- **Last Updated**: May 14, 2025 at 14:06 UTC
- **Reserved Date**: October 13, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Race condition for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-362: Security Weakness
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi Software for Windows**
Affected versions:
- before version 23.100 (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45208
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 00:00 UTC
- **Last Updated**: September 19, 2024 at 13:58 UTC
- **Reserved Date**: October 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell commands as root during the setup process of the repeater, via a crafted SSID. Also, network names containing single quotes (in the range of the repeater) can result in a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24878
- **State**: PUBLISHED
- **Published Date**: February 08, 2024 at 12:58 UTC
- **Last Updated**: August 27, 2024 at 20:17 UTC
- **Reserved Date**: February 01, 2024 at 10:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PT Woo Plugins (by Webdados) Portugal CTT Tracking for WooCommerce allows Reflected XSS.This issue affects Portugal CTT Tracking for WooCommerce: from n/a through 2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PT Woo Plugins (by Webdados) - Portugal CTT Tracking for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/portugal-ctt-tracking-woocommerce/wordpress-portugal-ctt-tracking-for-woocommerce-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3972
- **State**: PUBLISHED
- **Published Date**: February 09, 2012 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 01, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The shader translator implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/chromium/issues/detail?id=110559)
2. [oval:org.mitre.oval:def:14550](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14550)
3. [](http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0463
- **State**: PUBLISHED
- **Published Date**: April 16, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, and 6.3.6 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032124](http://www.securitytracker.com/id/1032124)
2. [](http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38738
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 00:41 UTC
- **Last Updated**: August 02, 2024 at 17:54 UTC
- **Reserved Date**: July 25, 2023 at 00:01 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM OpenPages with Watson 8.3 and 9.0 could provide weaker than expected security in a OpenPages environment using Native authentication. If OpenPages is using Native authentication an attacker with access to the OpenPages database could through a series of specially crafted steps could exploit this weakness and gain unauthorized access to other OpenPages accounts. IBM X-Force ID: 262594.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-257: Security Weakness
### Affected Products
**IBM - OpenPages with Watson**
Affected versions:
- 8.3, 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7107775)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/262594) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4541
- **State**: PUBLISHED
- **Published Date**: September 26, 2024 at 09:29 UTC
- **Last Updated**: September 26, 2024 at 13:28 UTC
- **Reserved Date**: December 16, 2022 at 02:26 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WordPress Visitors plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a spoofed HTTP Header value in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the nm_vistior page.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**nitinmaurya12 - WordPress Visitors**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/fa15c0a4-c99d-40c9-a654-f3a910460502?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/nm-visitors/trunk/nm-visitors.php#L105)
3. [](https://plugins.trac.wordpress.org/browser/nm-visitors/trunk/nm-visitors.php#L63)
### Credits
- Mohammadreza Rashidi |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5503
- **State**: PUBLISHED
- **Published Date**: October 07, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 28, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Guest Login Portal in the Sophos Cyberoam appliances with CyberoamOS before 10.6.1 GA allows remote attackers to execute arbitrary SQL commands via the add_guest_user opcode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://kb.cyberoam.com/default.asp?id=3049)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-14-329/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1421
- **State**: PUBLISHED
- **Published Date**: March 15, 2023 at 22:51 UTC
- **Last Updated**: December 06, 2024 at 23:06 UTC
- **Reserved Date**: March 15, 2023 at 22:45 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 5.32.0 (Status: affected)
- 7.7 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates/)
### Credits
- zerodivisi0n |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22004
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 07:19 UTC
- **Last Updated**: May 04, 2025 at 07:27 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: atm: fix use after free in lec_send()
The ->send() operation frees skb so save the length before calling
->send() to avoid a use after free.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.12 (Status: affected)
- 0 (Status: unaffected)
- 5.4.292 (Status: unaffected)
- 5.10.236 (Status: unaffected)
- 5.15.180 (Status: unaffected)
- 6.1.132 (Status: unaffected)
- 6.6.85 (Status: unaffected)
- 6.12.21 (Status: unaffected)
- 6.13.9 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e)
2. [](https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7)
3. [](https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6)
4. [](https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c)
5. [](https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730)
6. [](https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb)
7. [](https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762)
8. [](https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8819
- **State**: PUBLISHED
- **Published Date**: June 14, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XXE issue was discovered in Automated Logic Corporation (ALC) WebCTRL Versions 6.0, 6.1 and 6.5. An unauthenticated attacker could enter malicious input to WebCTRL and a weakly configured XML parser will allow the application to disclose full file contents from the underlying web server OS via the "X-Wap-Profile" HTTP header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180608 Multiple Automated Logic Corporation WebCTRL XML External Entity Injection (CVE-2018-8819)](http://seclists.org/fulldisclosure/2018/Jun/21)
2. [](http://packetstormsecurity.com/files/148126/WebCTRL-Out-Of-Band-XML-Injection.html)
3. [](https://hateshape.github.io/general/2018/06/07/CVE-2018-8819.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10424
- **State**: PUBLISHED
- **Published Date**: October 27, 2024 at 18:31 UTC
- **Last Updated**: October 28, 2024 at 13:11 UTC
- **Reserved Date**: October 26, 2024 at 14:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Project Worlds Student Project Allocation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /student/project_selection/remove_project.php of the component Project Selection Page. The manipulation of the argument no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Project Worlds - Student Project Allocation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-281965 | Project Worlds Student Project Allocation System Project Selection Page remove_project.php sql injection](https://vuldb.com/?id.281965)
2. [VDB-281965 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.281965)
3. [Submit #431983 | Project Worlds Student Project Allocation System 1.0 SQL Injection](https://vuldb.com/?submit.431983)
4. [](https://github.com/jadu101/CVE/blob/main/phpgurukul_student_project_allocation_system_remove_project_sqli.md)
### Credits
- jadu101 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43292
- **State**: PUBLISHED
- **Published Date**: August 18, 2024 at 21:12 UTC
- **Last Updated**: August 19, 2024 at 14:29 UTC
- **Reserved Date**: August 09, 2024 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EnvoThemes Envo's Elementor Templates & Widgets for WooCommerce allows Stored XSS.This issue affects Envo's Elementor Templates & Widgets for WooCommerce: from n/a through 1.4.16.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**EnvoThemes - Envo's Elementor Templates & Widgets for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/envo-elementor-for-woocommerce/wordpress-envo-s-elementor-templates-widgets-for-woocommerce-plugin-1-4-16-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Michael (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10725
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:41 UTC
- **Reserved Date**: July 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Winamp 5.666 Build 3516(x86) allows attackers to execute arbitrary code or cause a denial of service via a crafted .flv file, related to "Data from Faulting Address controls Code Flow starting at in_flv!winampGetInModule2+0x00000000000009a8."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10725) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0740
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:28 UTC
- **Reserved Date**: September 19, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote attackers to execute arbitrary commands via a long URL in the HTTPS port.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000802 NAI Net Tools PKI Server vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2000-07/0473.html)
2. [nai-nettools-strong-bo(5026)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5026)
3. [1536](http://www.securityfocus.com/bid/1536)
4. [1488](http://www.osvdb.org/1488)
5. [](http://download.nai.com/products/licensed/pgp/hf3pki10.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1597
- **State**: PUBLISHED
- **Published Date**: June 06, 2022 at 08:51 UTC
- **Last Updated**: August 03, 2024 at 00:10 UTC
- **Reserved Date**: May 05, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPQA Builder WordPress plugin before 5.4, used as a companion for the Discy and Himer , does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - WPQA Builder**
Affected versions:
- 5.4 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e)
### Credits
- Veshraj Ghimire |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21766
- **State**: PUBLISHED
- **Published Date**: July 06, 2022 at 13:06 UTC
- **Last Updated**: August 03, 2024 at 02:53 UTC
- **Reserved Date**: November 26, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641653.
### Affected Products
**MediaTek, Inc. - MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8321, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 10.0, 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/July-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33001
- **State**: PUBLISHED
- **Published Date**: May 16, 2022 at 17:52 UTC
- **Last Updated**: April 16, 2025 at 16:21 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
xArrow SCADA versions 7.2 and prior is vulnerable to cross-site scripting due to parameter ‘bdate’ of the resource xhisvalue.htm, which may allow an unauthorized attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**xArrow - xArrow SCADA**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-229-03)
### Credits
- Sharon Brizinov from Claroty, and Michael Heinzl reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7488
- **State**: PUBLISHED
- **Published Date**: January 27, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:51 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Scale 4.1.1.x before 4.1.1.4 and 4.2.x before 4.2.0.1, in certain LDAP File protocol configurations, allows remote attackers to discover an LDAP password via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=ssg1S1005580) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12337
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 11:09 UTC
- **Last Updated**: January 08, 2025 at 13:44 UTC
- **Reserved Date**: December 06, 2024 at 23:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Shipping via Planzer for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘processed-ids’ parameter in all versions up to, and including, 1.0.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**webwirkung - Shipping via Planzer for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e80ed130-8ad2-4fb0-a583-02fc675804d6?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3214785/wc-planzer-shipping)
### Credits
- Dale Mavers |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.