System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38117
- **State**: PUBLISHED
- **Published Date**: October 24, 2022 at 13:21 UTC
- **Last Updated**: May 07, 2025 at 13:34 UTC
- **Reserved Date**: August 10, 2022 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt users’ ciphertext and tamper with it.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Juiker - Juiker app**
Affected versions:
- 4.6.0311.1 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-6630-d4d2f-1.html)
### Credits
- RayHong (CCoE) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2271
- **State**: PUBLISHED
- **Published Date**: July 13, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 17:38 UTC
- **Reserved Date**: July 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iCab 2.9.8 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/)
2. [15477](http://secunia.com/advisories/15477) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37941
- **State**: PUBLISHED
- **Published Date**: December 08, 2021 at 21:15 UTC
- **Last Updated**: August 04, 2024 at 01:30 UTC
- **Reserved Date**: August 03, 2021 at 00:00 UTC
- **Assigned By**: elastic
### Vulnerability Description
A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Elastic - APM Java Agent**
Affected versions:
- 1.10.0 through 1.26.0 (Status: affected)
### References
1. [](https://discuss.elastic.co/t/apm-java-agent-security-update/289627) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9717
- **State**: PUBLISHED
- **Published Date**: September 19, 2019 at 20:28 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libav/libav/blob/df744e3cf66548c9167ea857104a29d2ea92819e/libavcodec/srtdec.c#L90)
2. [](https://lgtm.com/security/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23992
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 15:42 UTC
- **Last Updated**: January 22, 2025 at 19:44 UTC
- **Reserved Date**: January 16, 2025 at 11:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leetoo Toocheke Companion allows Stored XSS. This issue affects Toocheke Companion: from n/a through 1.166.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Leetoo - Toocheke Companion**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/toocheke-companion/vulnerability/wordpress-toocheke-companion-plugin-1-166-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Pham Van Tam (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9139
- **State**: PUBLISHED
- **Published Date**: February 16, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 01, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.3.x before 3.3.16, 4.0.x before 4.0.19, and 5.0.x before 5.0.14 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [94141](http://www.securityfocus.com/bid/94141)
2. [](https://www.otrs.com/security-advisory-2016-02-security-update-otrs/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24936
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 14:52 UTC
- **Last Updated**: January 01, 2025 at 01:43 UTC
- **Reserved Date**: January 31, 2023 at 20:37 UTC
- **Assigned By**: microsoft
### Vulnerability Description
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Visual Studio 2022 version 17.2**
Affected versions:
- 17.2.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.0**
Affected versions:
- 17.0.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.4**
Affected versions:
- 17.4.0 (Status: affected)
**Microsoft - .NET 6.0**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - .NET 7.0**
Affected versions:
- 7.0.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.6**
Affected versions:
- 17.6.0 (Status: affected)
**Microsoft - PowerShell 7.2**
Affected versions:
- 7.2.0 (Status: affected)
**Microsoft - PowerShell 7.3**
Affected versions:
- 7.3.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- 3.0.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8.1**
Affected versions:
- 4.8.1 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 and 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 2.0 Service Pack 2**
Affected versions:
- 2.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.0 Service Pack 2**
Affected versions:
- 3.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5.1**
Affected versions:
- 3.5.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5**
Affected versions:
- 3.5.0 (Status: affected)
### References
1. [.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45346
- **State**: PUBLISHED
- **Published Date**: August 28, 2024 at 06:44 UTC
- **Last Updated**: April 08, 2025 at 20:42 UTC
- **Reserved Date**: August 28, 2024 at 02:24 UTC
- **Assigned By**: Xiaomi
### Vulnerability Description
The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Xiaomi - GetApps application**
Affected versions:
- GetApps application (Status: affected)
### References
1. [](https://trust.mi.com/misrc/bulletins/advisory?cveId=545) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13526
- **State**: PUBLISHED
- **Published Date**: March 07, 2025 at 01:44 UTC
- **Last Updated**: March 07, 2025 at 16:31 UTC
- **Reserved Date**: January 17, 2025 at 22:58 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the export_submittion_attendees function in all versions up to, and including, 4.0.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download list of attendees for any event.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**metagauss - EventPrime – Events Calendar, Bookings and Tickets**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2be578d9-27c3-4a16-a634-1514ed97a1a2?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.0.7.3/includes/class-ep-ajax.php#L1903)
### Credits
- Tim Coen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38676
- **State**: PUBLISHED
- **Published Date**: July 20, 2024 at 07:51 UTC
- **Last Updated**: August 02, 2024 at 04:12 UTC
- **Reserved Date**: June 19, 2024 at 11:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Booking Ultra Pro allows Stored XSS.This issue affects Booking Ultra Pro: from n/a through 1.1.13.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Booking Ultra Pro - Booking Ultra Pro**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-appointments-booking-calendar-plugin-plugin-1-1-13-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6299
- **State**: PUBLISHED
- **Published Date**: September 20, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
SQL injection vulnerability in the web interface in Cisco Unity Connection 9.1(1.2) and earlier allows remote authenticated users to execute arbitrary SQL commands via a crafted POST request, aka Bug ID CSCuv63824.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150918 Cisco Unity Connection Web Interface SQL Injection Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=41074)
2. [1033622](http://www.securitytracker.com/id/1033622) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13109
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 22, 2017 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2523
- **State**: PUBLISHED
- **Published Date**: May 04, 2023 at 18:00 UTC
- **Last Updated**: August 02, 2024 at 06:26 UTC
- **Reserved Date**: May 04, 2023 at 16:14 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Weaver E-Office 9.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file App/Ajax/ajax.php?action=mobile_upload_save. The manipulation of the argument upload_quwan leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228014 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Weaver - E-Office**
Affected versions:
- 9.5 (Status: affected)
### References
1. [](https://vuldb.com/?id.228014)
2. [](https://vuldb.com/?ctiid.228014)
3. [](https://github.com/RCEraser/cve/blob/main/Weaver.md)
### Credits
- RCEraser (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21106
- **State**: PUBLISHED
- **Published Date**: February 20, 2025 at 12:04 UTC
- **Last Updated**: February 20, 2025 at 14:13 UTC
- **Reserved Date**: November 22, 2024 at 06:42 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Dell - RecoverPoint for VMs**
Affected versions:
- 6.0 SP1 (Status: affected)
- 6.0 SP1 P1 (Status: affected)
- 6.0 SP1 P2 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000287503/dsa-2025-101-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-component-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0870
- **State**: PUBLISHED
- **Published Date**: July 20, 2011 at 22:36 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: February 04, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Schema Management component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2; and Oracle Enterprise Manager Grid Control 10.1.0.6 and 10.2.0.5; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
2. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html)
3. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1151
- **State**: PUBLISHED
- **Published Date**: December 19, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: December 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Baxter IRC client in BeOS r5 pro and earlier allows remote attackers to conduct a denial of service via a message that contains a long URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001113 beos vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2000-11/0203.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11134
- **State**: PUBLISHED
- **Published Date**: August 01, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 17:57 UTC
- **Reserved Date**: July 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android. The login credentials are written into a log file on the device. Hence, an attacker with access to the logs can read them.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Jul/90) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42483
- **State**: PUBLISHED
- **Published Date**: September 12, 2024 at 14:12 UTC
- **Last Updated**: September 12, 2024 at 16:46 UTC
- **Reserved Date**: August 02, 2024 at 14:13 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-349: Security Weakness
### Affected Products
**espressif - esp-now**
Affected versions:
- < 2.5.2 (Status: affected)
### References
1. [https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj](https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj)
2. [https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef](https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44337
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 09:52 UTC
- **Last Updated**: January 07, 2025 at 18:42 UTC
- **Reserved Date**: September 28, 2023 at 16:25 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25947
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 07:04 UTC
- **Last Updated**: August 01, 2024 at 13:14 UTC
- **Reserved Date**: February 13, 2024 at 05:29 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Dell - iDRAC Service Module (iSM)**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32610
- **State**: PUBLISHED
- **Published Date**: July 27, 2021 at 05:21 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/sa-core-2021-004)
2. [[debian-lts-announce] 20210726 [SECURITY] [DLA 2721-1] drupal7 security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html)
3. [](https://github.com/pear/Archive_Tar/releases/tag/1.4.14)
4. [](https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f)
5. [FEDORA-2021-6cf271948a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/)
6. [FEDORA-2021-c9c1f6e5c7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/)
7. [](https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755)
8. [FEDORA-2021-8093e197f4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/)
9. [FEDORA-2021-0c013f520c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20177
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 13:21 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Product: AndroidVersions: Android kernelAndroid ID: A-209906686References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0386
- **State**: PUBLISHED
- **Published Date**: March 21, 2022 at 23:45 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: Sophos
### Vulnerability Description
A post-auth SQL injection vulnerability in the Mail Manager potentially allows an authenticated attacker to execute code in Sophos UTM before version 9.710.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Sophos - Sophos UTM**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.sophos.com/en-us/security-advisories/sophos-sa-20220321-utm-9710) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9926
- **State**: PUBLISHED
- **Published Date**: April 10, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 10, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can add an admin account via index.php?m=core&f=power&v=add.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/6/)
2. [44439](https://www.exploit-db.com/exploits/44439/)
3. [](https://github.com/wuzhicms/wuzhicms/issues/128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43459
- **State**: PUBLISHED
- **Published Date**: February 28, 2023 at 13:29 UTC
- **Last Updated**: January 13, 2025 at 15:56 UTC
- **Reserved Date**: October 19, 2022 at 11:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Forms by CaptainForm – Form Builder for WordPress plugin <= 2.5.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Captainform - Forms by CaptainForm – Form Builder for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/captainform/wordpress-forms-by-captainform-2-5-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rasi Afeef (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38915
- **State**: PUBLISHED
- **Published Date**: August 15, 2023 at 00:00 UTC
- **Last Updated**: October 09, 2024 at 14:22 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
File Upload vulnerability in Wolf-leo EasyAdmin8 v.1.0 allows a remote attacker to execute arbtirary code via the upload type function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wolf-leo/EasyAdmin8/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8634
- **State**: PUBLISHED
- **Published Date**: December 12, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Windows where Microsoft text-to-speech fails to properly handle objects in the memory, aka "Microsoft Text-To-Speech Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
### Affected Products
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for ARM64-based Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for ARM64-based Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- Version 1809 for 32-bit Systems (Status: affected)
- Version 1809 for ARM64-based Systems (Status: affected)
- Version 1809 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [106078](http://www.securityfocus.com/bid/106078)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8634) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8345
- **State**: PUBLISHED
- **Published Date**: August 30, 2024 at 17:00 UTC
- **Last Updated**: August 30, 2024 at 18:09 UTC
- **Reserved Date**: August 30, 2024 at 07:59 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Music Gallery Site 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Music Gallery Site**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-276224 | SourceCodester Music Gallery Site Users.php sql injection](https://vuldb.com/?id.276224)
2. [VDB-276224 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276224)
3. [Submit #400192 | sourcecodester Music Gallery Site v1.0 SQL injection](https://vuldb.com/?submit.400192)
4. [](https://github.com/GAO-UNO/cve/blob/main/sql3.md)
5. [](https://www.sourcecodester.com/)
### Credits
- G_GX (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27619
- **State**: PUBLISHED
- **Published Date**: April 25, 2023 at 11:41 UTC
- **Last Updated**: January 09, 2025 at 15:34 UTC
- **Reserved Date**: March 05, 2023 at 01:56 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Macho Themes Regina Lite theme <= 2.0.7 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Macho Themes - Regina Lite**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/regina-lite/wordpress-regina-lite-theme-2-0-7-reflected-cross-site-scripting-xss?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23190
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 08:09 UTC
- **Last Updated**: August 01, 2024 at 22:59 UTC
- **Reserved Date**: January 12, 2024 at 07:03 UTC
- **Assigned By**: OX
### Vulnerability Description
Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Open-Xchange GmbH - OX App Suite**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://documentation.open-xchange.com/appsuite/releases/8.21/)
2. [](https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6268_7.10.6_2024-02-08.pdf)
3. [](https://documentation.open-xchange.com/appsuite/releases/8.22/)
4. [](https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0001.json) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1762
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 16:20 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 19, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts. This may allow a user with 'Contributor-level' privileges to post as if they had 'publish_posts' permission.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**n/a - wordpress**
Affected versions:
- wordpress before 3.0.6 and 3.1.2 (Status: affected)
### References
1. [](https://wordpress.org/support/wordpress-version/version-3-1-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26668
- **State**: PUBLISHED
- **Published Date**: April 02, 2024 at 06:43 UTC
- **Last Updated**: May 04, 2025 at 08:53 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_limit: reject configurations that cause integer overflow
Reject bogus configs where internal token counter wraps around.
This only occurs with very very large requests, such as 17gbyte/s.
Its better to reject this rather than having incorrect ratelimit.
### Affected Products
**Linux - Linux**
Affected versions:
- d2168e849ebf617b2b7feae44c0c0baf739cb610 (Status: affected)
- d2168e849ebf617b2b7feae44c0c0baf739cb610 (Status: affected)
- d2168e849ebf617b2b7feae44c0c0baf739cb610 (Status: affected)
- d2168e849ebf617b2b7feae44c0c0baf739cb610 (Status: affected)
- d2168e849ebf617b2b7feae44c0c0baf739cb610 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.3 (Status: affected)
- 0 (Status: unaffected)
- 5.15.149 (Status: unaffected)
- 6.1.76 (Status: unaffected)
- 6.6.15 (Status: unaffected)
- 6.7.3 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/79d4efd75e7dbecd855a3b8a63e65f7265f466e1)
2. [](https://git.kernel.org/stable/c/bc6e242bb74e2ae616bfd2b250682b738e781c9b)
3. [](https://git.kernel.org/stable/c/9882495d02ecc490604f747437a40626dc9160d0)
4. [](https://git.kernel.org/stable/c/00c2c29aa36d1d1827c51a3720e9f893a22c7c6a)
5. [](https://git.kernel.org/stable/c/c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4602
- **State**: PUBLISHED
- **Published Date**: December 29, 2010 at 17:27 UTC
- **Last Updated**: August 07, 2024 at 03:51 UTC
- **Reserved Date**: December 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Web client in IBM Rational ClearQuest 7.1.1.x before 7.1.1.4 and 7.1.2.x before 7.1.2.1 allows remote authenticated users to bypass "restricted user" limitations, and read arbitrary records, via a modified record number in the URL for a RECORD action, as demonstrated by a modified bookmark.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://public.dhe.ibm.com/software/rational/clearquest/7.1.1/7.1.1.4-RATL-RCQ/7.1.1.4-RATL-RCQ.ux.readme)
2. [45646](http://www.securityfocus.com/bid/45646)
3. [clearquest-webclient-sec-bypass(64440)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64440)
4. [PM20172](http://www-01.ibm.com/support/docview.wss?uid=swg1PM20172) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50724
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 14:50 UTC
- **Last Updated**: August 27, 2024 at 15:02 UTC
- **Reserved Date**: December 11, 2023 at 17:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Resque (pronounced like "rescue") is a Redis-backed library for creating background jobs, placing those jobs on multiple queues, and processing them later. resque-web in resque versions before 2.1.0 are vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint. This issue has been patched in version 2.1.0.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**resque - resque**
Affected versions:
- < 2.1.0 (Status: affected)
### References
1. [https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj](https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj)
2. [https://github.com/resque/resque/issues/1679](https://github.com/resque/resque/issues/1679)
3. [https://github.com/resque/resque/pull/1687](https://github.com/resque/resque/pull/1687) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7359
- **State**: PUBLISHED
- **Published Date**: April 09, 2019 at 19:22 UTC
- **Last Updated**: August 04, 2024 at 20:46 UTC
- **Reserved Date**: February 04, 2019 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
An exploitable heap overflow vulnerability in the AcCellMargin handling code in Autodesk Advance Steel 2018, Autodesk AutoCAD 2018, Autodesk AutoCAD Architecture 2018, Autodesk AutoCAD Electrical 2018, Autodesk AutoCAD Map 3D 2018, Autodesk AutoCAD Mechanical 2018, Autodesk AutoCAD MEP 2018, Autodesk AutoCAD P&ID 2018, Autodesk AutoCAD Plant 3D 2018, Autodesk AutoCAD LT 2018, and Autodesk Civil 3D 2018. A specially crafted DXF file with too many cell margins populating an AcCellMargin object may cause a heap overflow, resulting in code execution.
### Affected Products
**Autodesk - Autodesk Advance Steel**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD Architecture**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD Electrical**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD Map 3D**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD Mechanical**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD MEP**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD P&ID**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD Plant 3D**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk AutoCAD LT**
Affected versions:
- 2018 (Status: affected)
**Autodesk - Autodesk Civil 3D**
Affected versions:
- 2018 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2748
- **State**: PUBLISHED
- **Published Date**: March 20, 2024 at 23:09 UTC
- **Last Updated**: August 02, 2024 at 19:20 UTC
- **Reserved Date**: March 20, 2024 at 17:04 UTC
- **Assigned By**: GitHub_P
### Vulnerability Description
A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**GitHub - Enterprise Server**
Affected versions:
- 3.12 (Status: affected)
### References
1. [](https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1)
### Credits
- adrianoapj |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6267
- **State**: PUBLISHED
- **Published Date**: December 04, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: December 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PostNuke 0.7.5.0, and certain minor versions, allows remote attackers to obtain sensitive information via a non-numeric value of the stop parameter, which reveals the path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061121 Vulnerability in PostNuke](http://www.securityfocus.com/archive/1/452283/100/100/threaded)
2. [postnuke-user-information-disclosure(30474)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30474) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2239
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3307
- **State**: PUBLISHED
- **Published Date**: June 21, 2007 at 00:38 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in game_listing.php in Solar Empire 2.9.1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the User-Agent HTTP header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [solarempire-gamelisting-sql-injection(34909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34909)
2. [4078](https://www.exploit-db.com/exploits/4078)
3. [25716](http://secunia.com/advisories/25716)
4. [36303](http://osvdb.org/36303)
5. [24519](http://www.securityfocus.com/bid/24519) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14623
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:30 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.20 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
2. [](https://security.netapp.com/advisory/ntap-20200717-0004/)
3. [USN-4441-1](https://usn.ubuntu.com/4441-1/)
4. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11048
- **State**: PUBLISHED
- **Published Date**: May 20, 2020 at 07:15 UTC
- **Last Updated**: September 16, 2024 at 18:13 UTC
- **Reserved Date**: April 09, 2019 at 00:00 UTC
- **Assigned By**: php
### Vulnerability Description
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
- CWE-190: Security Weakness
### Affected Products
**PHP Group - PHP**
Affected versions:
- 7.3.x (Status: affected)
- 7.4.x (Status: affected)
- 7.2.x (Status: affected)
### References
1. [FEDORA-2020-8838d072d5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBA3TFZSP3TB5N4G24SO6BI64RJZXE3D/)
2. [FEDORA-2020-9fa7f4e25c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMDUQ7XFONY3BWTAQQUD3QUGZT6NFZUF/)
3. [USN-4375-1](https://usn.ubuntu.com/4375-1/)
4. [openSUSE-SU-2020:0847](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html)
5. [[debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html)
6. [DSA-4717](https://www.debian.org/security/2020/dsa-4717)
7. [DSA-4719](https://www.debian.org/security/2020/dsa-4719)
8. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
9. [](https://bugs.php.net/bug.php?id=78875)
10. [](https://bugs.php.net/bug.php?id=78876)
11. [](https://security.netapp.com/advisory/ntap-20200528-0006/)
12. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
13. [](https://www.tenable.com/security/tns-2021-14)
### Credits
- jr at coredu dot mp |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49054
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:54 UTC
- **Last Updated**: May 04, 2025 at 08:28 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests
hv_panic_page might contain guest-sensitive information, do not dump it
over to Hyper-V by default in isolated guests.
While at it, update some comments in hyperv_{panic,die}_event().
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.35 (Status: unaffected)
- 5.17.4 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1b576e81d31b56b248316b8ff816b1cc5c4407c7)
2. [](https://git.kernel.org/stable/c/6230bc50d6d21cae4c084766623d0a6d17958721)
3. [](https://git.kernel.org/stable/c/9f8b577f7b43b2170628d6c537252785dcc2dcea) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53768
- **State**: PUBLISHED
- **Published Date**: November 30, 2024 at 21:02 UTC
- **Last Updated**: December 02, 2024 at 15:50 UTC
- **Reserved Date**: November 22, 2024 at 13:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in IDE Interactive Content Audit Exporter allows Retrieve Embedded Sensitive Data.This issue affects Content Audit Exporter: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**IDE Interactive - Content Audit Exporter**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/content-audit-exporter/vulnerability/wordpress-content-audit-exporter-plugin-1-1-sensitive-data-exposure-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3192
- **State**: PUBLISHED
- **Published Date**: August 14, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:00 UTC
- **Reserved Date**: April 17, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via crafted character sequences with EUC-JP encoding, aka "EUC-JP Character Encoding Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS13-059](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059)
2. [oval:org.mitre.oval:def:17980](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17980) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15809
- **State**: PUBLISHED
- **Published Date**: August 23, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:38 UTC
- **Reserved Date**: August 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AccuPOS 2017.8 is installed with the insecure "Authenticated Users: Modify" permission for files within the installation path. This may allow local attackers to compromise the integrity of critical resource and executable files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://versprite.com/advisories/accupos/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36559
- **State**: PUBLISHED
- **Published Date**: August 29, 2022 at 22:46 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain a command injection vulnerability via the Ping parameter at ping_exec.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e)
2. [](https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13075
- **State**: PUBLISHED
- **Published Date**: June 30, 2019 at 13:47 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: June 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tor Browser through 8.5.3 has an information exposure vulnerability. It allows remote attackers to detect the browser's language via vectors involving an IFRAME element, because text in that language is included in the title attribute of a LINK element for a non-HTML page. This is related to a behavior of Firefox before 68.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://trac.torproject.org/projects/tor/ticket/30657)
2. [](https://hackerone.com/reports/588239) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51755
- **State**: PUBLISHED
- **Published Date**: November 06, 2024 at 19:27 UTC
- **Last Updated**: November 07, 2024 at 15:12 UTC
- **Reserved Date**: October 31, 2024 at 14:12 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 2.2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**twigphp - Twig**
Affected versions:
- < 3.11.2 (Status: affected)
- >= 3.12.0, < 3.14.1 (Status: affected)
### References
1. [https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh](https://github.com/twigphp/Twig/security/advisories/GHSA-jjxq-ff2g-95vh)
2. [https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21](https://github.com/twigphp/Twig/commit/831c148e786178e5f2fde9db67266be3bf241c21) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52719
- **State**: PUBLISHED
- **Published Date**: May 11, 2024 at 09:58 UTC
- **Last Updated**: August 02, 2024 at 23:11 UTC
- **Reserved Date**: April 23, 2024 at 03:42 UTC
- **Assigned By**: huawei
### Vulnerability Description
Privilege escalation vulnerability in the PMS module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-16: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 14.0.0 (Status: affected)
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/5/)
2. [](https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4657
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 17:33 UTC
- **Last Updated**: August 06, 2024 at 16:52 UTC
- **Reserved Date**: June 24, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Symlink Traversal vulnerability in NETGEAR WNR3500U and WNR3500L due to misconfiguration in the SMB service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ise.io/soho_service_hacks/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5364
- **State**: PUBLISHED
- **Published Date**: June 05, 2019 at 14:43 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
### Affected Products
**n/a - HPE Intelligent Management Center (IMC) PLAT**
Affected versions:
- 7.3 E0506P09 and earlier (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0775
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 13:03 UTC
- **Last Updated**: November 25, 2024 at 08:36 UTC
- **Reserved Date**: January 21, 2024 at 12:37 UTC
- **Assigned By**: redhat
### Vulnerability Description
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [](https://access.redhat.com/security/cve/CVE-2024-0775)
2. [RHBZ#2259414](https://bugzilla.redhat.com/show_bug.cgi?id=2259414)
3. [](https://scm.linefinity.com/common/linux-stable/commit/4c0b4818b1f636bc96359f7817a2d8bab6370162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1737
- **State**: PUBLISHED
- **Published Date**: July 17, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 16, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Enterprise Manager for Oracle Database component in Oracle Database Server 11.1.0.7, 11.2.0.2, and 11.2.0.3, and Enterprise Manager Grid Control EM Base Platform 10.2.0.5, EM Base Platform 11.1.0.1, EM Plugin for DB 12.1.0.1, and EM Plugin for DB 12.1.0.2, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to DB Performance Advisories/UIs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2012:1020](http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00018.html)
2. [emgcl-dbp-cve20121737(77014)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77014)
3. [83945](http://osvdb.org/83945)
4. [1027260](http://www.securitytracker.com/id?1027260)
5. [54569](http://www.securityfocus.com/bid/54569)
6. [](http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html)
7. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0204
- **State**: PUBLISHED
- **Published Date**: February 22, 2018 at 00:00 UTC
- **Last Updated**: December 02, 2024 at 21:00 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web portal of the Cisco Prime Collaboration Provisioning Tool could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for individual users. The vulnerability is due to weak login controls. An attacker could exploit this vulnerability by using a brute-force attack (Repeated Bad Login Attempts). A successful exploit could allow the attacker to restrict user access. Manual administrative intervention is required to restore access. Cisco Bug IDs: CSCvd07264.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - Cisco Prime Collaboration Provisioning Tool**
Affected versions:
- Cisco Prime Collaboration Provisioning Tool (Status: affected)
### References
1. [1040410](http://www.securitytracker.com/id/1040410)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt)
3. [103150](http://www.securityfocus.com/bid/103150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5615
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 22:00 UTC
- **Last Updated**: June 05, 2025 at 18:00 UTC
- **Reserved Date**: June 04, 2025 at 10:59 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /details.php. The manipulation of the argument requestid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Online Fire Reporting System**
Affected versions:
- 1.2 (Status: affected)
### References
1. [VDB-311101 | PHPGurukul Online Fire Reporting System details.php sql injection](https://vuldb.com/?id.311101)
2. [VDB-311101 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311101)
3. [Submit #589108 | PHPGurukul Online Fire Reporting System v1.2 SQL Injection](https://vuldb.com/?submit.589108)
4. [](https://github.com/YZS17/CVE/blob/main/Online_Fire_Reporting_System/sqli_details.php_requestid.md)
5. [](https://phpgurukul.com/)
### Credits
- f10w3r (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31237
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 09:56 UTC
- **Last Updated**: September 09, 2024 at 17:40 UTC
- **Reserved Date**: April 26, 2023 at 15:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.9.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Dylan James - Zephyr Project Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23550
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 02:42 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e82.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.irfanview.com/plugins.htm)
2. [](https://github.com/nhiephon/Research) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2292
- **State**: PUBLISHED
- **Published Date**: May 18, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1020527](http://www.securitytracker.com/id?1020527)
2. [30615](http://secunia.com/advisories/30615)
3. [32664](http://secunia.com/advisories/32664)
4. [SUSE-SA:2008:039](http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html)
5. [30187](http://secunia.com/advisories/30187)
6. [31351](http://secunia.com/advisories/31351)
7. [](http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm)
8. [](http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694)
9. [FEDORA-2008-5215](https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html)
10. [31334](http://secunia.com/advisories/31334)
11. [ADV-2008-2141](http://www.vupen.com/english/advisories/2008/2141/references)
12. [30647](http://secunia.com/advisories/30647)
13. [29212](http://www.securityfocus.com/bid/29212)
14. [33003](http://secunia.com/advisories/33003)
15. [ADV-2008-2361](http://www.vupen.com/english/advisories/2008/2361)
16. [31568](http://secunia.com/advisories/31568)
17. [31467](http://secunia.com/advisories/31467)
18. [239785](http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1)
19. [DSA-1663](http://www.debian.org/security/2008/dsa-1663)
20. [RHSA-2008:0529](http://www.redhat.com/support/errata/RHSA-2008-0529.html)
21. [](http://www.vmware.com/security/advisories/VMSA-2008-0013.html)
22. [31155](http://secunia.com/advisories/31155)
23. [GLSA-200808-02](http://security.gentoo.org/glsa/glsa-200808-02.xml)
24. [netsnmp-snprintvalue-bo(42430)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42430)
25. [FEDORA-2008-5218](https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html)
26. [FEDORA-2008-5224](https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html)
27. [MDVSA-2008:118](http://www.mandriva.com/security/advisories?name=MDVSA-2008:118)
28. [USN-685-1](http://www.ubuntu.com/usn/usn-685-1)
29. [ADV-2008-1528](http://www.vupen.com/english/advisories/2008/1528/references)
30. [oval:org.mitre.oval:def:11261](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6454
- **State**: REJECTED
- **Published Date**: March 15, 2017 at 21:00 UTC
- **Last Updated**: March 15, 2017 at 20:57 UTC
- **Reserved Date**: March 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2576
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 16:33 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.4 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3534
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:48 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Installed Base component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Engineering Change Order. NOTE: the previous information is from the July 2016 CPU. Oracle has not commented on third-party claims that this issue involves an open redirect vulnerability, which allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.onapsis.com/blog/oracle-fixes-record-276-vulnerabilities-july-2016)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [91907](http://www.securityfocus.com/bid/91907)
5. [1036403](http://www.securitytracker.com/id/1036403) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4907
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 02:31 UTC
- **Last Updated**: May 19, 2025 at 13:51 UTC
- **Reserved Date**: May 17, 2025 at 14:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Daily Expense Tracker System 1.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Daily Expense Tracker System**
Affected versions:
- 1.1 (Status: affected)
### References
1. [VDB-309464 | PHPGurukul Daily Expense Tracker System forgot-password.php sql injection](https://vuldb.com/?id.309464)
2. [VDB-309464 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309464)
3. [Submit #578194 | PHPGurukul Daily Expense Tracker V1.1 SQL Injection](https://vuldb.com/?submit.578194)
4. [](https://github.com/f1rstb100d/myCVE/issues/22)
5. [](https://phpgurukul.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0825
- **State**: PUBLISHED
- **Published Date**: October 28, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:38 UTC
- **Reserved Date**: January 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Drupal 6.x before 6.23 and 7.x before 7.11 does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drupal.org/node/1425084)
2. [](http://openid.net/2011/05/05/attribute-exchange-security-alert/)
3. [DSA-2776](http://www.debian.org/security/2013/dsa-2776) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1867
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:05 UTC
- **Last Updated**: December 05, 2024 at 19:33 UTC
- **Reserved Date**: February 23, 2024 at 19:50 UTC
- **Assigned By**: zdi
### Vulnerability Description
G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22312.
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**G DATA - Total Security**
Affected versions:
- 25.5.15.21 (Status: affected)
### References
1. [ZDI-24-559](https://www.zerodayinitiative.com/advisories/ZDI-24-559/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5945
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 01:54 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: September 27, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allow remote attackers to execute arbitrary SQL commands via the password to (1) the login.authenticate function in share/lua/5.1/teamf1lualib/login.lua or (2) captivePortal.lua.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf)
2. [](http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf)
3. [](http://tsd.dlink.com.tw/temp/PMD/12966/DSR-150_A1_A2_Release_Notes_FW_v1.08B44_WW.pdf)
4. [](http://tsd.dlink.com.tw/temp/PMD/13039/DSR-250_250N_A1_A2_Release_Notes_FW_v1.08B44_WW_RU.pdf)
5. [](http://www.exploit-db.com/exploits/30061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4469
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15931
- **State**: PUBLISHED
- **Published Date**: October 20, 2020 at 19:23 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability)
2. [](https://www.netwrix.com/netwrix_reports_vulnerability_in_netwrix_account_lockout_examiner_4_1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5557
- **State**: PUBLISHED
- **Published Date**: December 23, 2008 at 18:13 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBUX02465](http://marc.info/?l=bugtraq&m=125631037611762&w=2)
2. [](http://support.apple.com/kb/HT3549)
3. [SSRT090085](http://marc.info/?l=bugtraq&m=124654546101607&w=2)
4. [](http://cvs.php.net/viewvc.cgi/php-src/ext/mbstring/libmbfl/filters/mbfilter_htmlent.c?r1=1.7&r2=1.8)
5. [FEDORA-2009-3768](https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html)
6. [20090302 rPSA-2009-0035-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl](http://www.securityfocus.com/archive/1/501376/100/0/threaded)
7. [20081221 CVE-2008-5557 - PHP mbstring buffer overflow](http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0477.html)
8. [](http://wiki.rpath.com/Advisories:rPSA-2009-0035)
9. [34642](http://secunia.com/advisories/34642)
10. [1021482](http://securitytracker.com/id?1021482)
11. [35074](http://secunia.com/advisories/35074)
12. [HPSBMA02492](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444)
13. [SSRT090192](http://marc.info/?l=bugtraq&m=125631037611762&w=2)
14. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html)
15. [SUSE-SR:2009:004](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html)
16. [SUSE-SR:2009:008](http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html)
17. [RHSA-2009:0350](http://www.redhat.com/support/errata/RHSA-2009-0350.html)
18. [FEDORA-2009-3848](https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html)
19. [35003](http://secunia.com/advisories/35003)
20. [](http://www.php.net/ChangeLog-5.php#5.2.7)
21. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html)
22. [php-multibyte-bo(47525)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47525)
23. [MDVSA-2009:045](http://www.mandriva.com/security/advisories?name=MDVSA-2009:045)
24. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297)
25. [HPSBUX02431](http://marc.info/?l=bugtraq&m=124654546101607&w=2)
26. [](http://bugs.php.net/bug.php?id=45722)
27. [oval:org.mitre.oval:def:10286](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10286)
28. [35306](http://secunia.com/advisories/35306)
29. [SSRT100079](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444)
30. [35650](http://secunia.com/advisories/35650)
31. [32948](http://www.securityfocus.com/bid/32948)
32. [DSA-1789](http://www.debian.org/security/2009/dsa-1789) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24295
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 03, 2024 at 18:41 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in FreeImage 3.19.0 [r1859] allows remote attackers to ru narbitrary code via use of crafted psd file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/)
2. [FEDORA-2023-604a7d56b0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6GKMK74POW3RU7F4HLUJE7XEFLQDO35/)
3. [FEDORA-2023-8e640cb540](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFRQ76ZDPSWT7OH6FJDLSFWBXVBE6JDN/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1104
- **State**: PUBLISHED
- **Published Date**: March 11, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: March 11, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in IBM Tivoli Firewall Toolbox (TFST) 1.2 allows remote attackers to execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7154](http://www.securityfocus.com/bid/7154)
2. [VU#210937](http://www.kb.cert.org/vuls/id/210937)
3. [20030320 IBM Tivoli Firewall Security Toolbox buffer overflow vulnerability](http://archives.neohapsis.com/archives/bugtraq/2003-03/0307.html)
4. [tivoli-tfst-relay-bo(11584)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11584)
5. [8349](http://secunia.com/advisories/8349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0437
- **State**: PUBLISHED
- **Published Date**: February 10, 2009 at 22:13 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: February 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Installation Factory installation process for IBM WebSphere Application Server (WAS) 6.0.2 on Windows, when WAS is registered as a Windows service, allows local users to obtain sensitive information by reading the logs/instconfigifwas6.log log file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [PK67405](http://www-1.ibm.com/support/docview.wss?uid=swg1PK67405)
2. [33849](http://www.securityfocus.com/bid/33849)
3. [websphere-install-log-info-disclosure(48527)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48527) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30246
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 15:50 UTC
- **Last Updated**: August 21, 2024 at 14:33 UTC
- **Reserved Date**: March 26, 2024 at 12:52 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted. This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L`
### Weakness Classification (CWE)
- CWE-440: Security Weakness
- CWE-670: Security Weakness
### Affected Products
**Enalean - tuleap**
Affected versions:
- >= 14.11.99.34, < 15.7.99.6 (Status: affected)
### References
1. [https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj](https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj)
2. [https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316](https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316)
3. [https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a0ba0ae82a29eb8bfacef286778e5e49954f5316](https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a0ba0ae82a29eb8bfacef286778e5e49954f5316)
4. [https://tuleap.net/plugins/tracker/?aid=37545](https://tuleap.net/plugins/tracker/?aid=37545) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2818
- **State**: PUBLISHED
- **Published Date**: June 27, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 19, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the layout of documents that use the Cascading Style Sheets (CSS) counters feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2012-09-19-3](http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html)
2. [](http://code.google.com/p/chromium/issues/detail?id=120944)
3. [openSUSE-SU-2012:0813](https://hermes.opensuse.org/messages/15075728)
4. [](http://support.apple.com/kb/HT5485)
5. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
6. [](http://support.apple.com/kb/HT5503)
7. [](http://support.apple.com/kb/HT5502)
8. [](http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html)
9. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html)
10. [oval:org.mitre.oval:def:14771](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14771) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1002153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1002153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1002153
- **State**: PUBLISHED
- **Published Date**: October 06, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 19:10 UTC
- **Reserved Date**: October 06, 2017 at 00:00 UTC
- **Assigned By**: fedora
### Vulnerability Description
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Koji Project - Koji**
Affected versions:
- 1.13.0 (Status: affected)
### References
1. [](https://pagure.io/koji/issue/563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16726
- **State**: PUBLISHED
- **Published Date**: September 12, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
razorCMS 3.4.7 allows HTML injection via the description of the homepage within the settings component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/smiffy6969/razorCMS/issues/52) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32849
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 00:00 UTC
- **Last Updated**: May 27, 2025 at 14:57 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to access sensitive user information.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213345)
2. [](https://support.apple.com/en-us/HT213342)
3. [](https://support.apple.com/en-us/HT213346)
4. [](https://support.apple.com/en-us/HT213344)
5. [](https://support.apple.com/en-us/HT213343)
6. [](https://support.apple.com/kb/HT213488) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7090
- **State**: PUBLISHED
- **Published Date**: August 26, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: August 26, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in Pligg 9.9 and earlier allow remote attackers to (1) determine the existence of arbitrary files via a .. (dot dot) in the $tb_url variable in trackback.php, or (2) include arbitrary files via a .. (dot dot) in the template parameter to settemplate.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50188](http://www.osvdb.org/50188)
2. [pligg-settemplate-file-include(44191)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44191)
3. [50187](http://www.osvdb.org/50187)
4. [](http://www.gulftech.org/?node=research&article_id=00120-07312008)
5. [20080730 Pligg <= 9.9.0 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/494987/100/0/threaded)
6. [30458](http://www.securityfocus.com/bid/30458)
7. [pligg-trackback-info-disclosure(44190)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44190)
8. [6173](https://www.exploit-db.com/exploits/6173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32781
- **State**: PUBLISHED
- **Published Date**: April 24, 2024 at 07:56 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 18, 2024 at 09:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ThemeHigh Email Customizer for WooCommerce.This issue affects Email Customizer for WooCommerce: from n/a through 2.6.0.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**ThemeHigh - Email Customizer for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/email-customizer-for-woocommerce/wordpress-email-customizer-for-woocommerce-plugin-2-6-0-sensitive-data-exposure-vulnerability?_s_id=cve)
### Credits
- Emili Castells (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34035
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 15:29 UTC
- **Last Updated**: October 25, 2024 at 15:47 UTC
- **Reserved Date**: May 25, 2023 at 17:21 UTC
- **Assigned By**: vmware
### Vulnerability Description
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)
Specifically, an application is vulnerable when all of the following are true:
* Spring MVC is on the classpath
* Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)
* The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints
An application is not vulnerable if any of the following is true:
* The application does not have Spring MVC on the classpath
* The application secures no servlets other than Spring MVC’s DispatcherServlet
* The application uses requestMatchers(String) only for Spring MVC endpoints
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**n/a - Spring Security**
Affected versions:
- Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1 (Status: affected)
### References
1. [](https://spring.io/security/cve-2023-34035) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9496
- **State**: PUBLISHED
- **Published Date**: October 22, 2019 at 20:27 UTC
- **Last Updated**: August 06, 2024 at 08:51 UTC
- **Reserved Date**: October 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/7972)
2. [36942](https://www.exploit-db.com/exploits/36942) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37079
- **State**: PUBLISHED
- **Published Date**: June 18, 2024 at 05:43 UTC
- **Last Updated**: March 14, 2025 at 13:36 UTC
- **Reserved Date**: June 03, 2024 at 05:40 UTC
- **Assigned By**: vmware
### Vulnerability Description
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - VMware vCenter Server**
Affected versions:
- 8.0 (Status: affected)
- 8.0 (Status: affected)
- 7.0 (Status: affected)
**n/a - VMware Cloud Foundation**
Affected versions:
- 5.x (Status: affected)
- 4.x (Status: affected)
### References
1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000494
- **State**: PUBLISHED
- **Published Date**: January 03, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 22:00 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Uninitialized stack variable vulnerability in NameValueParserEndElt (upnpreplyparse.c) in miniupnpd < 2.0 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/miniupnp/miniupnp/commit/7aeb624b44f86d335841242ff427433190e7168a)
2. [USN-3562-1](https://usn.ubuntu.com/3562-1/)
3. [](https://github.com/miniupnp/miniupnp/issues/268)
4. [[debian-lts-announce] 20190530 [SECURITY] [DLA 1811-1] miniupnpd security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00045.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6736
- **State**: PUBLISHED
- **Published Date**: November 25, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 11, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the NVIDIA GPU driver in Android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Android ID: A-30953284. References: NVIDIA N-CVE-2016-6736.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.18 (Status: affected)
### References
1. [94140](http://www.securityfocus.com/bid/94140)
2. [](https://source.android.com/security/bulletin/2016-11-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31805
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:51 UTC
- **Last Updated**: April 01, 2025 at 18:33 UTC
- **Reserved Date**: April 01, 2025 at 13:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExpressTech Systems Gutena Kit – Gutenberg Blocks and Templates allows Stored XSS. This issue affects Gutena Kit – Gutenberg Blocks and Templates: from n/a through 2.0.7.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ExpressTech Systems - Gutena Kit – Gutenberg Blocks and Templates**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/gutena-kit/vulnerability/wordpress-gutena-kit-plugin-2-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7774
- **State**: PUBLISHED
- **Published Date**: November 17, 2020 at 12:30 UTC
- **Last Updated**: September 16, 2024 at 20:13 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P`
### Affected Products
**n/a - y18n**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-Y18N-1021887)
2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306)
3. [](https://github.com/yargs/y18n/pull/108)
4. [](https://github.com/yargs/y18n/issues/96)
5. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
6. [](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)
### Credits
- po6ix |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2768
- **State**: PUBLISHED
- **Published Date**: June 18, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in admin/search.asp in Xigla Poll Manager XE allows remote authenticated users with administrator role privileges to inject arbitrary web script or HTML via unspecified vectors ("all fields").
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [absolutepoll-search-xss(43054)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43054)
2. [](http://bugreport.ir/index.php?/41)
3. [29672](http://www.securityfocus.com/bid/29672)
4. [20080611 Xigla Multiple Products - Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=121322052622903&w=2)
5. [3950](http://securityreason.com/securityalert/3950) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0629
- **State**: PUBLISHED
- **Published Date**: November 18, 2021 at 14:56 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In mdlactl driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05776625; Issue ID: ALPS05776625.
### Affected Products
**n/a - MT6873, MT6875, MT6883, MT6885, MT6889, MT6891, MT6893, MT8195, MT8791, MT8797, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9686, MT9970, MT9980, MT9981**
Affected versions:
- Android 10.0, 11.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/November-2021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1266
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: November 04, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mac OS X 10.2.2 allows local users to gain privileges by mounting a disk image file that was created on another system, aka "Local User Privilege Elevation via Disk Image File."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.info.apple.com/usen/security/security_updates.html)
2. [7057](http://www.osvdb.org/7057)
3. [macos-disk-image-privileges(10818)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10818) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0755
- **State**: PUBLISHED
- **Published Date**: February 13, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in the ReportSysLogEvent function in the LPD server in cyan soft Opium OPI Server 4.10.1028 and earlier; cyanPrintIP Easy OPI, Professional, and Basic 4.10.1030 and earlier; Workstation 4.10.836 and earlier; and Standard 4.10.940 and earlier; might allow remote attackers to execute arbitrary code via format string specifiers in the queue name in a request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0498](http://www.vupen.com/english/advisories/2008/0498)
2. [20080211 Format string and DoS in Opium OPI and cyanPrintIP servers 4.10.x](http://www.securityfocus.com/archive/1/487955/100/0/threaded)
3. [28870](http://secunia.com/advisories/28870)
4. [27728](http://www.securityfocus.com/bid/27728)
5. [27734](http://www.securityfocus.com/bid/27734)
6. [](http://aluigi.altervista.org/adv/cyanuro-adv.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5749
- **State**: PUBLISHED
- **Published Date**: May 07, 2020 at 16:15 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Insufficient output sanitization in TCExam 14.2.2 allows a remote, authenticated attacker to conduct persistent cross-site scripting (XSS) attacks by creating a crafted group.
### Affected Products
**n/a - TCExam**
Affected versions:
- 14.2.2 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2020-31) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4193
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30874
- **State**: PUBLISHED
- **Published Date**: June 21, 2022 at 14:35 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nukeviet/nukeviet)
2. [](https://blog.stmcyber.com/vulns/cve-2022-30874/)
3. [](https://whitehub.net/submissions/2968) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13524
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for PornCoin (PRNC), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/PornCoin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36008
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 19:33 UTC
- **Last Updated**: April 29, 2025 at 23:34 UTC
- **Reserved Date**: June 20, 2023 at 20:44 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft Edge (Chromium-based)**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Edge (Chromium-based) Extended Stable**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1847
- **State**: PUBLISHED
- **Published Date**: April 16, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:40 UTC
- **Reserved Date**: April 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in view.php in CoronaMatrix phpAddressBook 2.11 allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5432](https://www.exploit-db.com/exploits/5432)
2. [28750](http://www.securityfocus.com/bid/28750)
3. [phpaddressbook-index-sql-injection(41498)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41498) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4927
- **State**: PUBLISHED
- **Published Date**: July 09, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 07:24 UTC
- **Reserved Date**: July 09, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WB News 2.1.2 allows remote attackers to bypass authentication and gain administrative access via a modified WBNEWS cookie, as demonstrated by setting this cookie to 1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8492](http://www.exploit-db.com/exploits/8492)
2. [34609](http://www.securityfocus.com/bid/34609)
3. [34822](http://secunia.com/advisories/34822) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28016
- **State**: PUBLISHED
- **Published Date**: June 22, 2023 at 22:18 UTC
- **Last Updated**: December 05, 2024 at 17:18 UTC
- **Reserved Date**: March 10, 2023 at 03:59 UTC
- **Assigned By**: HCL
### Vulnerability Description
Host Header Injection vulnerability in the HCL BigFix OSD Bare Metal Server version 311.12 or lower allows attacker to supply invalid input to cause the OSD Bare Metal Server to perform a redirect to an attacker-controlled domain.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Affected Products
**HCL Software - HCL BigFix OSD Bare Metal Server**
Affected versions:
- < 311.12 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0105601) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5819
- **State**: PUBLISHED
- **Published Date**: March 21, 2019 at 13:23 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 23, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Moxa G3100V2 Series, editions prior to Version 2.8, and OnCell G3111/G3151/G3211/G3251 Series, editions prior to Version 1.7 allows a reflected cross-site scripting attack which may allow an attacker to execute arbitrary script code in the user’s browser within the trust relationship between their browser and the server.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Moxa - OnCell G3100V2 Series**
Affected versions:
- < 2.8 (Status: affected)
**Moxa - OnCell G3111/G3151/G3211/G3251 Series**
Affected versions:
- < 1.7 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-236-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6508
- **State**: PUBLISHED
- **Published Date**: January 24, 2013 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 19:50 UTC
- **Reserved Date**: January 23, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in NetArt Media Car Portal 3.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change arbitrary user passwords via a nouveau action in the security module to cars/ADMIN/index.php; (2) create a user or (3) create a sub user via a sub_accounts action in the home module to USERS/index.php; or (4) change profile information via an edit action in the profile module to USERS/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/files/112226/Car-Portal-CMS-3.0-CSRF-XSS-Shell-Upload.html)
2. [](http://www.vulnerability-lab.com/get_content.php?id=502)
3. [49010](http://secunia.com/advisories/49010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6105
- **State**: PUBLISHED
- **Published Date**: November 23, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in TalkBack 2.2.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) language_file parameter to (a) comments-display-tpl.php and (b) addons/separate-comments-mod/my-comments-display-tpl.php and the (2) config[comments_form_tpl] parameter to comments-display-tpl.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20071121 TalkBack 2.2.7 Multiple Remote File Inclusion Vulnerabilities](http://www.securityfocus.com/archive/1/484045/100/0/threaded)
2. [20071227 Re: TalkBack 2.2.7 Multiple Remote File Inclusion Vulnerabilities](http://www.securityfocus.com/archive/1/485662/100/100/threaded)
3. [27767](http://secunia.com/advisories/27767)
4. [26520](http://www.securityfocus.com/bid/26520)
5. [talkback-commentsdisplaytpl-file-include(38596)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38596)
6. [38815](http://osvdb.org/38815)
7. [ADV-2007-3963](http://www.vupen.com/english/advisories/2007/3963)
8. [talkback-mycommentsdisplaytpl-file-include(38597)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38597)
9. [](http://www.scripts.oldguy.us/forums/index.php/topic%2C290.0.html)
10. [4640](https://www.exploit-db.com/exploits/4640)
11. [38816](http://osvdb.org/38816) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.