System stringclasses 1
value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29993
- **State**: PUBLISHED
- **Published Date**: May 12, 2022 at 14:48 UTC
- **Last Updated**: August 03, 2024 at 06:40 UTC
- **Reserved Date**: May 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Sports Complex Booking System 1.0 is vulnerable to SQL Injection via /scbs/admin/bookings/view_booking.php?id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Online-Sports-Complex-Booking-System/SQLi-8.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33167
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 17:05 UTC
- **Last Updated**: August 03, 2024 at 08:01 UTC
- **Reserved Date**: June 13, 2022 at 16:18 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 228587.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-1004: Security Weakness
### Affected Products
**IBM - Security Directory Integrator**
Affected versions:
- 7.2.0 (Status: affected)
**IBM - Security Verify Directory Integrator**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7161469)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/228587) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13220
- **State**: REJECTED
- **Published Date**: January 22, 2021 at 21:43 UTC
- **Last Updated**: January 22, 2021 at 21:43 UTC
- **Reserved Date**: May 19, 2020 at 00:00 UTC
- **Assigned By**: Teradici
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22984
- **State**: PUBLISHED
- **Published Date**: May 12, 2022 at 19:57 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via key parameter to the getGoogleExtraConfig task.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://microstrategy.com)
2. [](http://www.yourcompany.com:8080/MicroStrategy/servlet/taskProc)
3. [](https://www.microstrategy.com/us/report-a-security-vulnerability)
4. [](https://medium.com/%40win3zz/simple-story-of-some-complicated-xss-on-facebook-8a9c0d80969d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4704
- **State**: PUBLISHED
- **Published Date**: November 15, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Application Firewall in Apple Mac OS X 10.5 does not apply changed settings to processes that are started by launchd until the processes are restarted, which might allow attackers to bypass intended access restrictions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27695](http://secunia.com/advisories/27695)
2. [APPLE-SA-2007-11-15](http://lists.apple.com/archives/security-announce/2007/Nov/msg00004.html)
3. [ADV-2007-3897](http://www.vupen.com/english/advisories/2007/3897)
4. [](http://docs.info.apple.com/article.html?artnum=307004)
5. [1018958](http://securitytracker.com/id?1018958)
6. [macosx-appfw-launchd-bypass(38492)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38492)
7. [26459](http://www.securityfocus.com/bid/26459) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36957
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 15:35 UTC
- **Last Updated**: May 04, 2025 at 12:56 UTC
- **Reserved Date**: May 30, 2024 at 15:25 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: avoid off-by-one read from userspace
We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffer is NUL terminated, we use memdup_user_nul instead.
### Affected Products
**Linux - Linux**
Affected versions:
- dae49384d0d7695540e2d75168f323cef1384810 (Status: affected)
- 3a2eb515d1367c0f667b76089a6e727279c688b8 (Status: affected)
- 3a2eb515d1367c0f667b76089a6e727279c688b8 (Status: affected)
- 3a2eb515d1367c0f667b76089a6e727279c688b8 (Status: affected)
- 3a2eb515d1367c0f667b76089a6e727279c688b8 (Status: affected)
- 3a2eb515d1367c0f667b76089a6e727279c688b8 (Status: affected)
- c9a2ed3fdd037314a71e6a6ba5d99a3605f6f9c7 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.10.217 (Status: unaffected)
- 5.15.159 (Status: unaffected)
- 6.1.91 (Status: unaffected)
- 6.6.31 (Status: unaffected)
- 6.8.10 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e)
2. [](https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f)
3. [](https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67)
4. [](https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7)
5. [](https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19)
6. [](https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1664
- **State**: PUBLISHED
- **Published Date**: April 07, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in xine_list_delete_current in libxine 1.14 and earlier, as distributed in xine-lib 1.1.1 and earlier, allows remote attackers to execute arbitrary code via a crafted MPEG stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19856](http://secunia.com/advisories/19856)
2. [28666](http://secunia.com/advisories/28666)
3. [](http://www.securityfocus.com/data/vulnerabilities/exploits/xinelib_poc.pl)
4. [xinelib-mpeg-bo(25670)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25670)
5. [FEDORA-2008-1047](https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00976.html)
6. [FEDORA-2008-1043](https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00956.html)
7. [19853](http://secunia.com/advisories/19853)
8. [17370](http://www.securityfocus.com/bid/17370)
9. [](http://bugs.gentoo.org/show_bug.cgi?id=128838)
10. [1015868](http://securitytracker.com/id?1015868)
11. [](http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=571608)
12. [1641](https://www.exploit-db.com/exploits/1641)
13. [GLSA-200604-16](http://www.gentoo.org/security/en/glsa/glsa-200604-16.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51493
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 18:17 UTC
- **Last Updated**: November 05, 2024 at 19:01 UTC
- **Reserved Date**: October 28, 2024 at 14:20 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2 contain a vulnerability that allows an attacker that has gained temporary control over an authenticated victim's OctoPrint browser session to retrieve/recreate/delete the user's or - if the victim has admin permissions - the global API key without having to reauthenticate by re-entering the user account's password. An attacker could use a stolen API key to access OctoPrint through its API, or disrupt workflows depending on the API key they deleted. This vulnerability will be patched in version 1.10.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-620: Security Weakness
### Affected Products
**OctoPrint - OctoPrint**
Affected versions:
- < 1.10.3 (Status: affected)
### References
1. [https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-cc6x-8cc7-9953](https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-cc6x-8cc7-9953) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1269
- **State**: PUBLISHED
- **Published Date**: February 13, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 14:57 UTC
- **Reserved Date**: January 12, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS13-016](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016)
2. [oval:org.mitre.oval:def:16374](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16374)
3. [TA13-043B](http://www.us-cert.gov/cas/techalerts/TA13-043B.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32116
- **State**: PUBLISHED
- **Published Date**: April 10, 2025 at 08:09 UTC
- **Last Updated**: April 10, 2025 at 13:14 UTC
- **Reserved Date**: April 04, 2025 at 10:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Studi7 QR Master allows Reflected XSS. This issue affects QR Master: from n/a through 1.0.5.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Studi7 - QR Master**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/qr-master/vulnerability/wordpress-qr-master-plugin-1-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6739
- **State**: PUBLISHED
- **Published Date**: October 19, 2010 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: October 19, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FTPServer.py in pyftpdlib before 0.2.0 allows remote attackers to cause a denial of service via a long command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/pyftpdlib/source/diff?spec=svn20&r=20&format=side&path=/trunk/pyftpdlib/FTPServer.py)
2. [](http://code.google.com/p/pyftpdlib/issues/detail?id=3)
3. [](http://code.google.com/p/pyftpdlib/source/detail?r=20)
4. [](http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49392
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:11 UTC
- **Last Updated**: May 04, 2025 at 08:36 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe
platform_get_resource() may fail and return NULL, so we should
better check it's return value to avoid a NULL pointer dereference.
### Affected Products
**Linux - Linux**
Affected versions:
- 54da3e381c2b55289b220601f403f17df7b20597 (Status: affected)
- 54da3e381c2b55289b220601f403f17df7b20597 (Status: affected)
- 54da3e381c2b55289b220601f403f17df7b20597 (Status: affected)
- 54da3e381c2b55289b220601f403f17df7b20597 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.15.47 (Status: unaffected)
- 5.17.15 (Status: unaffected)
- 5.18.4 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/923d34ce069e8e51a4d003caa6b66a8cd6ecd0ed)
2. [](https://git.kernel.org/stable/c/90a6b6fc52bfdcfe9698454bf5bea26112abbcd1)
3. [](https://git.kernel.org/stable/c/d5f1275f101e0e8a172d300d897f5a12e87e3485)
4. [](https://git.kernel.org/stable/c/0e0fd55719fa081de6f9e5d9e6cef48efb04d34a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2216
- **State**: PUBLISHED
- **Published Date**: March 12, 2025 at 00:00 UTC
- **Last Updated**: March 12, 2025 at 19:49 UTC
- **Reserved Date**: March 11, 2025 at 15:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in zzskzy Warehouse Refinement Management System 1.3. Affected by this issue is the function UploadCrash of the file /crash/log/SaveCrash.ashx. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**zzskzy - Warehouse Refinement Management System**
Affected versions:
- 1.3 (Status: affected)
### References
1. [VDB-299288 | zzskzy Warehouse Refinement Management System SaveCrash.ashx UploadCrash unrestricted upload](https://vuldb.com/?id.299288)
2. [VDB-299288 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299288)
3. [Submit #512330 | www.zzskzy.com Refined warehousing management system v1.3 RCE](https://vuldb.com/?submit.512330)
4. [](https://github.com/f14g-orz/tmp/blob/main/3_.md)
### Credits
- f14g (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6334
- **State**: PUBLISHED
- **Published Date**: December 31, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 17:28 UTC
- **Reserved Date**: December 13, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3659
- **State**: PUBLISHED
- **Published Date**: July 17, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by setting the location or URL property of a MHTMLFile ActiveX object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27108](http://www.osvdb.org/27108)
2. [19013](http://www.securityfocus.com/bid/19013)
3. [ie-mhtmlfile-dos(27761)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27761)
4. [](http://browserfun.blogspot.com/2006/07/mobb-16-mhtmlfile-location.html)
5. [ADV-2006-2831](http://www.vupen.com/english/advisories/2006/2831) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7376
- **State**: PUBLISHED
- **Published Date**: August 02, 2024 at 01:31 UTC
- **Last Updated**: August 02, 2024 at 16:14 UTC
- **Reserved Date**: August 01, 2024 at 07:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Simple Realtime Quiz System 1.0. Affected is an unknown function of the file /print_quiz_records.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273360.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Simple Realtime Quiz System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-273360 | SourceCodester Simple Realtime Quiz System print_quiz_records.php sql injection](https://vuldb.com/?id.273360)
2. [VDB-273360 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.273360)
3. [Submit #383524 | SourceCodester Simple Realtime Quiz System 1.0 SQL Injection](https://vuldb.com/?submit.383524)
4. [](https://gist.github.com/topsky979/8c36e6a899fc02e8054f67b94e34f6c6)
### Credits
- topsky979 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3254
- **State**: PUBLISHED
- **Published Date**: May 10, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 18:08 UTC
- **Reserved Date**: April 22, 2013 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in wp-admin/admin.php in the WP Photo Album Plus plugin before 5.0.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the commentid parameter in a wppa_manage_comments edit action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53105](http://secunia.com/advisories/53105)
2. [](http://wordpress.org/extend/plugins/wp-photo-album-plus/changelog/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2767
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 22:31 UTC
- **Last Updated**: October 15, 2024 at 18:58 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - BI Publisher (formerly XML Publisher)**
Affected versions:
- 11.1.1.9.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56356
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 14:11 UTC
- **Last Updated**: December 20, 2024 at 17:35 UTC
- **Reserved Date**: December 20, 2024 at 14:04 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains TeamCity before 2024.12 insecure XMLParser configuration could lead to potential XXE attack
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N`
### Affected Products
**JetBrains - TeamCity**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37926
- **State**: PUBLISHED
- **Published Date**: November 28, 2023 at 01:37 UTC
- **Last Updated**: August 02, 2024 at 17:23 UTC
- **Reserved Date**: July 11, 2023 at 01:52 UTC
- **Assigned By**: Zyxel
### Vulnerability Description
A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to cause denial-of-service (DoS) conditions by executing the CLI command to dump system logs on an affected device.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Zyxel - ATP series firmware**
Affected versions:
- versions 4.32 through 5.37 (Status: affected)
**Zyxel - USG FLEX series firmware**
Affected versions:
- versions 4.50 through 5.37 (Status: affected)
**Zyxel - USG FLEX 50(W) series firmware**
Affected versions:
- versions 4.16 through 5.37 (Status: affected)
**Zyxel - USG20(W)-VPN series firmware**
Affected versions:
- versions 4.16 through 5.37 (Status: affected)
**Zyxel - VPN series firmware**
Affected versions:
- versions 4.30 through 5.37 (Status: affected)
### References
1. [](https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14476
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 16:50 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: August 01, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdRem NetCrunch 10.6.0.4587 has a Server-Side Request Forgery (SSRF) vulnerability in the NetCrunch server. Every user can trick the server into performing SMB requests to other systems.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.adremsoft.com/support/)
2. [](https://compass-security.com/fileadmin/Research/Advisories/2020-10_CSNC-2019-011_AdRem_NetCrunch_Server-Side_Request_Forgery_SSRF.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4983
- **State**: PUBLISHED
- **Published Date**: November 06, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: November 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
scilab-bin 4.1.2 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/SciLink#####1, (b) /tmp/SciLink#####2, (c) /tmp/SciLink#####3, (d) /tmp/*.#####, (e) /tmp/*.#####.res, (f) /tmp/*.#####.err, and (g) /tmp/*.#####.diff temporary files, related to the (1) scilink, (2) scidoc, and (3) scidem scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire](http://www.openwall.com/lists/oss-security/2008/10/30/2)
2. [30968](http://www.securityfocus.com/bid/30968)
3. [](https://bugs.gentoo.org/show_bug.cgi?id=235770)
4. [](http://uvw.ru/report.lenny.txt)
5. [](http://bugs.debian.org/496414)
6. [](http://dev.gentoo.org/~rbu/security/debiantemp/scilab-bin)
7. [scilabbin-multiple-symlink(44883)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44883)
8. [33630](http://secunia.com/advisories/33630)
9. [GLSA-200901-14](http://security.gentoo.org/glsa/glsa-200901-14.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3875
- **State**: PUBLISHED
- **Published Date**: June 12, 2019 at 13:51 UTC
- **Last Updated**: August 04, 2024 at 19:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
### Weakness Classification (CWE)
- CWE-345: Security Weakness
- CWE-295: Security Weakness
### Affected Products
**Red Hat - keycloak**
Affected versions:
- 6.0.2 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875)
2. [108748](http://www.securityfocus.com/bid/108748) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35678
- **State**: PUBLISHED
- **Published Date**: June 08, 2024 at 15:57 UTC
- **Last Updated**: August 02, 2024 at 03:14 UTC
- **Reserved Date**: May 17, 2024 at 10:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.This issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**BestWebSoft - Contact Form to DB by BestWebSoft**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-2-sql-injection-vulnerability?_s_id=cve)
### Credits
- Do Truong Giang (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40313
- **State**: PUBLISHED
- **Published Date**: December 06, 2021 at 20:22 UTC
- **Last Updated**: August 04, 2024 at 02:27 UTC
- **Reserved Date**: August 30, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Piwigo v11.5 was discovered to contain a SQL injection vulnerability via the parameter pwg_token in /admin/batch_manager_global.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Piwigo/Piwigo/issues/1469) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5009
- **State**: PUBLISHED
- **Published Date**: October 12, 2010 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 02:42 UTC
- **Reserved Date**: October 12, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Double free vulnerability in OpenConnect before 1.40 might allow remote AnyConnect SSL VPN servers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted DTLS Cipher option during a reconnect operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.infradead.org/openconnect.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0015
- **State**: REJECTED
- **Last Updated**: May 16, 2023 at 00:00 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4137
- **State**: PUBLISHED
- **Published Date**: June 16, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 00:17 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036117](http://www.securitytracker.com/id/1036117)
2. [MS16-083](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083)
3. [openSUSE-SU-2016:1625](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html)
4. [RHSA-2016:1238](https://access.redhat.com/errata/RHSA-2016:1238)
5. [40089](https://www.exploit-db.com/exploits/40089/)
6. [openSUSE-SU-2016:1621](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html)
7. [SUSE-SU-2016:1613](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html)
8. [](https://helpx.adobe.com/security/products/flash-player/apsb16-18.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0169
- **State**: PUBLISHED
- **Published Date**: June 03, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Plugin/passwordauth.pm (aka the passwordauth plugin) in ikiwiki 1.34 through 2.47 allows remote attackers to bypass authentication, and login to any account for which an OpenID identity is configured and a password is not configured, by specifying an empty password during the login sequence.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30468](http://secunia.com/advisories/30468)
2. [ADV-2008-1710](http://www.vupen.com/english/advisories/2008/1710)
3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483770)
4. [[oss-security] 20080531 Re: CVE id request: ikiwiki](http://www.openwall.com/lists/oss-security/2008/05/31/3)
5. [ikiwiki-openid-passwordauth-auth-bypass(42798)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42798)
6. [](http://ikiwiki.info/news/version_2.48/index.html)
7. [29479](http://www.securityfocus.com/bid/29479)
8. [](http://ikiwiki.info/security/#index33h2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1057
- **State**: REJECTED
- **Last Updated**: February 22, 2023 at 00:00 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13318
- **State**: PUBLISHED
- **Published Date**: November 26, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
System command injection in User.create method in Buffalo TS5600D1206 version 3.61-0.10 allows attackers to execute system commands via the "name" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.securityevaluators.com/buffalo-terastation-ts5600d1206-nas-cve-disclosure-ab5d159f036d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5691
- **State**: PUBLISHED
- **Published Date**: December 19, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the Phoenician Casino FlashAX ActiveX control 1.0.0.7 allows remote attackers to execute arbitrary code via a long argument to the SetID method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4795](http://securityreason.com/securityalert/4795)
2. [32901](http://www.securityfocus.com/bid/32901)
3. [phoenician-flashax-bo(47448)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47448)
4. [7505](https://www.exploit-db.com/exploits/7505) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36634
- **State**: PUBLISHED
- **Published Date**: September 13, 2023 at 12:29 UTC
- **Last Updated**: September 24, 2024 at 19:59 UTC
- **Reserved Date**: June 25, 2023 at 18:03 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to list and delete arbitrary files and directory via specially crafted command arguments.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-73: Security Weakness
### Affected Products
**Fortinet - FortiAP-U**
Affected versions:
- 7.0.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
- 5.4.3 (Status: affected)
- 5.4.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-23-123](https://fortiguard.com/psirt/FG-IR-23-123) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30180
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 11:26 UTC
- **Last Updated**: August 08, 2024 at 19:21 UTC
- **Reserved Date**: March 25, 2024 at 04:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Easy Social Feed allows Stored XSS.This issue affects Easy Social Feed: from n/a through 6.5.3.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Easy Social Feed - Easy Social Feed**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/easy-facebook-likebox/wordpress-easy-social-feed-plugin-6-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11325
- **State**: PUBLISHED
- **Published Date**: May 22, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Joomla! Core before 3.8.8. The web install application would autofill password fields after either a form validation error or navigating to a previous install step, and display the plaintext password for the administrator account at the confirmation screen.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [104278](http://www.securityfocus.com/bid/104278)
2. [](https://developer.joomla.org/security-centre/732-20180504-core-installer-leaks-plain-text-password-to-local-user.html)
3. [1040966](http://www.securitytracker.com/id/1040966) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49339
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 21:14 UTC
- **Reserved Date**: November 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ellucian.com/solutions/ellucian-banner)
2. [](https://github.com/3zizme/CVE-2023-49339/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6792
- **State**: PUBLISHED
- **Published Date**: September 07, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 15:41 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the batch provisioning feature in Cisco Prime Collaboration Provisioning Tool could allow an authenticated, remote attacker to overwrite system files as root. The vulnerability is due to lack of input validation of the parameters in BatchFileName and Directory. An attacker could exploit this vulnerability by manipulating the parameters of the batch action file function. Cisco Bug IDs: CSCvd61766.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Cisco Prime Collaboration Provisioning Tool**
Affected versions:
- Cisco Prime Collaboration Provisioning Tool (Status: affected)
### References
1. [1039279](http://www.securitytracker.com/id/1039279)
2. [100666](http://www.securityfocus.com/bid/100666)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-pcpt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28949
- **State**: PUBLISHED
- **Published Date**: April 05, 2024 at 08:14 UTC
- **Last Updated**: September 03, 2024 at 18:35 UTC
- **Reserved Date**: April 03, 2024 at 10:03 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 9.5.0 (Status: affected)
- 9.4.0 (Status: affected)
- 9.3.0 (Status: affected)
- 8.1.0 (Status: affected)
- 9.6.0 (Status: unaffected)
- 9.5.2 (Status: unaffected)
- 9.4.4 (Status: unaffected)
- 9.3.3 (Status: unaffected)
- 8.1.11 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- vultza (vultza) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20881
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 12:54 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 74.0.8 allows self stored XSS on the Security Questions login page (SEC-446).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/74+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34609
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 19:04 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered flexjson thru 3.3 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/flexjson/bugs/48/)
2. [](https://sourceforge.net/p/flexjson/bugs/49/)
3. [](https://sourceforge.net/p/flexjson/bugs/50/)
4. [](https://sourceforge.net/p/flexjson/bugs/51/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28681
- **State**: PUBLISHED
- **Published Date**: July 18, 2022 at 18:42 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 05, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deletePages method. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16825.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.2.1.53537 (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-772/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9432, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9432
- **State**: PUBLISHED
- **Published Date**: December 31, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 13:47 UTC
- **Reserved Date**: December 31, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in templates/2k11/admin/overview.inc.tpl in Serendipity before 2.0-rc2 allow remote attackers to inject arbitrary web script or HTML via a blog comment in the QUERY_STRING to serendipity/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/129709/CMS-Serendipity-2.0-rc1-Cross-Site-Scripting.html)
2. [serendipity-index-xss(99464)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99464)
3. [20141223 Stored XSS Vulnerability in CMS Serendipity v.2.0-rc1](http://www.securityfocus.com/archive/1/534315/100/0/threaded)
4. [](http://blog.s9y.org/archives/259-Serendipity-2.0-rc2-released.html)
5. [](http://sroesemann.blogspot.de/2014/12/bericht-zu-sroeadv-2014-02.html)
6. [20141223 Stored XSS Vulnerability in CMS Serendipity v.2.0-rc1](http://seclists.org/fulldisclosure/2014/Dec/108)
7. [](https://github.com/s9y/Serendipity/commit/36cde3030aaa27a46bf94086e062dfe56b60230b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1848
- **State**: PUBLISHED
- **Published Date**: June 20, 2019 at 02:55 UTC
- **Last Updated**: November 20, 2024 at 17:17 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, adjacent attacker to bypass authentication and access critical internal services. The vulnerability is due to insufficient access restriction to ports necessary for system operation. An attacker could exploit this vulnerability by connecting an unauthorized network device to the subnet designated for cluster services. A successful exploit could allow an attacker to reach internal services that are not hardened for external access.
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**Cisco - Cisco Digital Network Architecture Center (DNA Center)**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190619 Cisco DNA Center Authentication Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-dnac-bypass)
2. [108837](http://www.securityfocus.com/bid/108837) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0976
- **State**: PUBLISHED
- **Published Date**: March 03, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in scan_lang_insert.php in Boris Herbiniere-Seve SPiD 1.3.1 allows remote attackers to read arbitrary files via the lang parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [spid-scanlanginsert-file-include(24955)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24955)
2. [ADV-2006-0766](http://www.vupen.com/english/advisories/2006/0766)
3. [](http://www.nsag.ru/vuln/955.html)
4. [16822](http://www.securityfocus.com/bid/16822)
5. [19033](http://secunia.com/advisories/19033)
6. [20060225 NSA Group Security Advisory NSAG-¹201-25.02.2006 Vulnerability SPiD v1.3.1](http://www.securityfocus.com/archive/1/426073/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4928
- **State**: PUBLISHED
- **Published Date**: May 19, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe InDesign versions 13.0 and below have an exploitable Memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
### Affected Products
**n/a - InDesign 13.0 and below**
Affected versions:
- InDesign 13.0 and below (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/indesign/apsb18-11.html)
2. [103714](http://www.securityfocus.com/bid/103714) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37645
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 03:57 UTC
- **Reserved Date**: June 10, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formSysLog .
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSysLog/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5816
- **State**: PUBLISHED
- **Published Date**: November 05, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dialog.php in CONTENTCustomizer 3.1mp and earlier allows remote attackers to obtain sensitive author credentials by making a request with an editauthor action, then reading the value of the newlocalpassword password input field in the HTML source of the resulting page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26291](http://www.securityfocus.com/bid/26291)
2. [27440](http://secunia.com/advisories/27440)
3. [](http://packetstorm.linuxsecurity.com/0710-exploits/contentcustom-disclose.txt)
4. [39150](http://osvdb.org/39150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2028
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:39 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.21 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html)
2. [](https://security.netapp.com/advisory/ntap-20210219-0003/)
3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7148
- **State**: PUBLISHED
- **Published Date**: October 19, 2020 at 17:37 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 16, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A deployselectsoftware expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
### Affected Products
**n/a - HPE Intelligent Management Center (iMC)**
Affected versions:
- Prior to iMC PLAT 7.3 (E0705P07) (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2154
- **State**: PUBLISHED
- **Published Date**: June 03, 2009 at 20:35 UTC
- **Last Updated**: August 07, 2024 at 08:49 UTC
- **Reserved Date**: May 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 provides an INSTALL_JAR (aka sqlj.install_jar) procedure, which allows remote authenticated users to create or overwrite arbitrary files via unspecified calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT)
2. [IZ22143](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22143)
3. [db2-installjar-priv-escalation(51105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51105)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21318189)
5. [35409](http://www.securityfocus.com/bid/35409)
6. [48147](http://osvdb.org/48147)
7. [IZ22142](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22142)
8. [IZ21983](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ21983)
9. [31787](http://secunia.com/advisories/31787) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0377
- **State**: PUBLISHED
- **Published Date**: October 14, 2020 at 13:06 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In gatt_process_read_by_type_rsp of gatt_cl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158833854
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.1 Android-9 Android-10 Android-11 Android-8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38421
- **State**: PUBLISHED
- **Published Date**: December 20, 2021 at 20:08 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 10, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds read, which may allow an attacker to read sensitive information from other memory locations or cause a crash.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
** Fuji Electric - V-Server Lite**
Affected versions:
- unspecified (Status: affected)
** Fuji Electric - Tellus Lite V-Simulator**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01)
### Credits
- kimiya, working with Trend Micro’s Zero Day Initiative, and Michael Heinzl reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4255
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1335
- **State**: PUBLISHED
- **Published Date**: February 19, 2016 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The SSH implementation in Cisco StarOS before 19.3.M0.62771 and 20.x before 20.0.M0.62768 on ASR 5000 devices mishandles a multi-user public-key authentication configuration, which allows remote authenticated users to gain privileges by establishing a connection from an endpoint that was previously used for an administrator's connection, aka Bug ID CSCux22492.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160218 Cisco ASR 5000 Series StarOS SSH Subsystem Privilege Escalation Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-asr)
2. [1035062](http://www.securitytracker.com/id/1035062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45111
- **State**: PUBLISHED
- **Published Date**: April 25, 2023 at 18:33 UTC
- **Last Updated**: August 04, 2024 at 04:39 UTC
- **Reserved Date**: December 27, 2021 at 06:14 UTC
- **Assigned By**: odoo
### Vulnerability Description
Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to trigger the creation of demonstration data, including user accounts with known credentials.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Odoo - Odoo Community**
Affected versions:
- 0 (Status: affected)
**Odoo - Odoo Enterprise**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/odoo/odoo/issues/107683)
2. [](https://www.debian.org/security/2023/dsa-5399)
### Credits
- Nils Hamerlinck
- Yenthe Van Ginneken |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10966
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 17:52 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
In GE Aestiva and Aespire versions 7100 and 7900, a vulnerability exists where serial devices are connected via an added unsecured terminal server to a TCP/IP network configuration, which could allow an attacker to remotely modify device configuration and silence alarms.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**GE - Aestiva and Aespire**
Affected versions:
- versions 7100 (Status: affected)
- versions 7900 (Status: affected)
### References
1. [109102](http://www.securityfocus.com/bid/109102)
2. [](https://www.us-cert.gov/ics/advisories/icsma-19-190-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0493
- **State**: PUBLISHED
- **Published Date**: January 30, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
fpx.dll 3.9.8.0 in the FlashPix plugin for IrfanView 4.10 allows remote attackers to execute arbitrary code via a crafted FlashPix (.FPX) file, which triggers heap corruption. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4998](https://www.exploit-db.com/exploits/4998)
2. [irfanview-flashpix-bo(40012)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40012)
3. [ADV-2008-0318](http://www.vupen.com/english/advisories/2008/0318)
4. [27479](http://www.securityfocus.com/bid/27479)
5. [28688](http://secunia.com/advisories/28688) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0881
- **State**: PUBLISHED
- **Published Date**: February 23, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via crafted data in the Matroska container format.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:16473](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16473)
2. [](http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html)
3. [](https://code.google.com/p/chromium/issues/detail?id=167069)
4. [openSUSE-SU-2013:0454](http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3590
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:09 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 2.1.5 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
### Affected Products
**Oracle Corporation - MySQL Connectors**
Affected versions:
- 2.1.5 and earlier (Status: affected)
### References
1. [1038287](http://www.securitytracker.com/id/1038287)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
3. [97840](http://www.securityfocus.com/bid/97840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6268
- **State**: PUBLISHED
- **Published Date**: September 22, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 18:08 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a value passed from a user to the driver is not correctly validated and used as the index to an array which may lead to denial of service or possible escalation of privileges.
### Affected Products
**Nvidia Corporation - GPU Display Driver**
Affected versions:
- All (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4544)
2. [101007](http://www.securityfocus.com/bid/101007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2236
- **State**: PUBLISHED
- **Published Date**: June 27, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in yad-admin/login.php in Your Article Directory allows remote attackers to execute arbitrary SQL commands via the txtAdminEmail parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35059](http://www.securityfocus.com/bid/35059)
2. [35192](http://secunia.com/advisories/35192)
3. [8761](http://www.exploit-db.com/exploits/8761)
4. [yourarticledirectory-login-sql-injection(50669)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50669) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3308
- **State**: PUBLISHED
- **Published Date**: August 09, 2016 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3309, CVE-2016-3310, and CVE-2016-3311.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/55-AA/CVE-2016-3308)
2. [MS16-098](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-098)
3. [92295](http://www.securityfocus.com/bid/92295)
4. [1036572](http://www.securitytracker.com/id/1036572) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32447
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 07:56 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 12, 2024 at 14:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in AWP Classifieds Team AWP Classifieds.This issue affects AWP Classifieds: from n/a through 4.3.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**AWP Classifieds Team - AWP Classifieds**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/another-wordpress-classifieds-plugin/wordpress-awp-classifieds-plugin-4-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Peng Zhou (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55983
- **State**: PUBLISHED
- **Published Date**: December 18, 2024 at 11:38 UTC
- **Last Updated**: December 18, 2024 at 16:28 UTC
- **Reserved Date**: December 14, 2024 at 19:41 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Derek Hamilton PowerFormBuilder allows SQL Injection.This issue affects PowerFormBuilder: from n/a through 1.0.6.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Derek Hamilton - PowerFormBuilder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/power-forms-builder/vulnerability/wordpress-powerformbuilder-plugin-1-0-6-sql-injection-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36365
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 19:06 UTC
- **Last Updated**: February 20, 2025 at 20:05 UTC
- **Reserved Date**: August 09, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Multiple Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in WHA Crossword plugin <= 1.1.10 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WHA - WHA Crossword (WordPress plugin)**
Affected versions:
- <= 1.1.10 (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wha-crossword/wordpress-wha-crossword-plugin-1-1-10-multiple-authenticated-stored-cross-site-scripting-xss-vulnerabilities)
2. [](https://wordpress.org/plugins/wha-crossword/)
### Credits
- Vulnerability discovered by Vlad Vector (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8842
- **State**: PUBLISHED
- **Published Date**: April 20, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: April 08, 2016 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/systemd/systemd/commit/afae249efa4774c6676738ac5de6aeb4daf4889f)
2. [[oss-security] 20160408 Re: CVE Request: systemd / journald created world readable journal files](http://www.openwall.com/lists/oss-security/2016/04/08/15)
3. [[oss-security] 20160408 CVE Request: systemd / journald created world readable journal files](http://www.openwall.com/lists/oss-security/2016/04/08/14)
4. [openSUSE-SU-2016:1414](http://lists.opensuse.org/opensuse-updates/2016-05/msg00109.html)
5. [openSUSE-SU-2016:1101](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00044.html)
6. [](https://bugzilla.suse.com/show_bug.cgi?id=972612) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13649
- **State**: PUBLISHED
- **Published Date**: October 24, 2019 at 14:54 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow externalPort OS Command Injection (issue 1 of 5).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pastebin.com/yAxBFe05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1793
- **State**: PUBLISHED
- **Published Date**: December 10, 2019 at 13:17 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
openstack-utils openstack-db has insecure password creation
### Affected Products
**openstack-utils - openstack-db program**
Affected versions:
- through 2013-02-28 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1793)
2. [](https://access.redhat.com/security/cve/cve-2013-1793) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24402
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 10:06 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an `order_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - WP iCommerce – the first interactive ecommerce for wordpress**
Affected versions:
- 1.1.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7840e664-907f-42d1-950d-8c919032b707)
2. [](https://codevigilant.com/disclosure/2021/wp-plugin-wp-icommerce/)
### Credits
- Syed Sheeraz Ali of Codevigilant |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4466
- **State**: PUBLISHED
- **Published Date**: August 31, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: August 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Joomla! before 1.0.11 does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to have an unspecified impact. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in Joomla!.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-3408](http://www.vupen.com/english/advisories/2006/3408)
2. [](http://www.joomla.org/content/view/1841/78/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0149
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 04:04 UTC
- **Last Updated**: March 27, 2025 at 20:03 UTC
- **Reserved Date**: December 02, 2023 at 00:43 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**NVIDIA - NVIDIA GPU Display Driver, vGPU software**
Affected versions:
- R535, R550 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5614) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52125
- **State**: PUBLISHED
- **Published Date**: January 05, 2024 at 11:13 UTC
- **Last Updated**: May 23, 2025 at 16:03 UTC
- **Reserved Date**: December 28, 2023 at 11:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webvitaly iframe allows Stored XSS.This issue affects iframe: from n/a through 4.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**webvitaly - iframe**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/iframe/wordpress-iframe-plugin-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5558
- **State**: REJECTED
- **Published Date**: December 23, 2019 at 20:41 UTC
- **Last Updated**: December 23, 2019 at 20:41 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1506
- **State**: PUBLISHED
- **Published Date**: March 19, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in PORTAL.wwv_main.render_warning_screen in the Oracle Portal 10g allows remote attackers to inject arbitrary web script or HTML via the (1) p_oldurl and (2) p_newurl parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070316 Oracle Portal PORTAL.wwv_main.render_warning_screen XSS](http://www.securityfocus.com/archive/1/463012/100/0/threaded)
2. [2463](http://securityreason.com/securityalert/2463)
3. [oracleportal-portalwarning-xss(33028)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33028)
4. [34299](http://osvdb.org/34299)
5. [22999](http://www.securityfocus.com/bid/22999) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5029
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 14:31 UTC
- **Last Updated**: May 21, 2025 at 14:40 UTC
- **Reserved Date**: May 21, 2025 at 10:04 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Kingdee Cloud Galaxy Private Cloud BBC System up to 9.0 Patch April 2025 and classified as critical. Affected by this vulnerability is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file fileUpload/deleteFileAction.jhtml of the component File Handler. The manipulation of the argument filePath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Kingdee - Cloud Galaxy Private Cloud BBC System**
Affected versions:
- 9.0 Patch April 2025 (Status: affected)
### References
1. [VDB-309847 | Kingdee Cloud Galaxy Private Cloud BBC System File deleteFileAction.jhtml path traversal](https://vuldb.com/?id.309847)
2. [VDB-309847 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309847)
3. [Submit #570956 | Kingdee Cloud-Starry-Sky Enterprise Edition V8.2 Arbitrary File Deletion Vulnerability](https://vuldb.com/?submit.570956)
4. [](https://wx.mail.qq.com/s?k=nFbp0U0gSX0QVechIO)
5. [](https://vip.kingdee.com/knowledge/708656434111770368)
6. [](https://vip.kingdee.com/school/detail/713028702245944320?productLineId=1&lang=zh-CN)
### Credits
- caichaoxiong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0438
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:43 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco Umbrella**
Affected versions:
- n/a (Status: affected)
### References
1. [20180905 Cisco Umbrella Enterprise Roaming Client Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-file-read)
2. [105286](http://www.securityfocus.com/bid/105286)
3. [45339](https://www.exploit-db.com/exploits/45339/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21269
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 03:42 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/OpenRC/openrc/issues/201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16022
- **State**: PUBLISHED
- **Published Date**: January 08, 2021 at 17:51 UTC
- **Last Updated**: August 04, 2024 at 13:37 UTC
- **Reserved Date**: July 27, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in networking in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially bypass firewall controls via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html)
2. [](https://crbug.com/1145680) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2174
- **State**: PUBLISHED
- **Published Date**: March 06, 2024 at 18:34 UTC
- **Last Updated**: February 13, 2025 at 17:33 UTC
- **Reserved Date**: March 04, 2024 at 18:31 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 122.0.6261.111 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html)
2. [](https://issues.chromium.org/issues/325866363)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6056
- **State**: PUBLISHED
- **Published Date**: January 27, 2020 at 14:01 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: October 09, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OSSIM before 4.3.3.1 has tele_compress.php path traversal vulnerability
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tenable.com/plugins/nessus/76122) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3136
- **State**: PUBLISHED
- **Published Date**: August 30, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2012:1231](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html)
2. [SSRT100970](http://marc.info/?l=bugtraq&m=135109152819176&w=2)
3. [](http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html)
4. [RHSA-2012:1225](http://rhn.redhat.com/errata/RHSA-2012-1225.html)
5. [51044](http://secunia.com/advisories/51044)
6. [HPSBUX02824](http://marc.info/?l=bugtraq&m=135109152819176&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2405
- **State**: PUBLISHED
- **Published Date**: April 10, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an attacker to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting.
### Affected Products
**SAP SE - SAP Solution Manager**
Affected versions:
- 7.10 (Status: affected)
- 7.20 (Status: affected)
### References
1. [103703](http://www.securityfocus.com/bid/103703)
2. [](https://blogs.sap.com/2018/04/10/sap-security-patch-day-april-2018/)
3. [](https://launchpad.support.sap.com/#/notes/2372688) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34358
- **State**: PUBLISHED
- **Published Date**: July 13, 2022 at 16:40 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: June 23, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 230516.
### Affected Products
**IBM - i**
Affected versions:
- 7.2 (Status: affected)
- 7.3 (Status: affected)
- 7.4 (Status: affected)
- 7.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6603131)
2. [ibm-i-cve202234358-xss (230516)](https://exchange.xforce.ibmcloud.com/vulnerabilities/230516) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49668
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:42 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events
of_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
This function only calls of_node_put() in normal path,
missing it in error paths.
Add missing of_node_put() to avoid refcount leak.
### Affected Products
**Linux - Linux**
Affected versions:
- f262f28c147051e7aa6daaf4fb5996833ffadff4 (Status: affected)
- f262f28c147051e7aa6daaf4fb5996833ffadff4 (Status: affected)
- f262f28c147051e7aa6daaf4fb5996833ffadff4 (Status: affected)
- f262f28c147051e7aa6daaf4fb5996833ffadff4 (Status: affected)
- f262f28c147051e7aa6daaf4fb5996833ffadff4 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.0 (Status: affected)
- 0 (Status: unaffected)
- 5.4.204 (Status: unaffected)
- 5.10.129 (Status: unaffected)
- 5.15.53 (Status: unaffected)
- 5.18.10 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bdecd912e99acfd61507f1720d3f4eed1b3418d8)
2. [](https://git.kernel.org/stable/c/e65027fdebbacd40595e96ef7b5d2418f71bddf2)
3. [](https://git.kernel.org/stable/c/01121e39ef537289926ae6f5374dce92c796d863)
4. [](https://git.kernel.org/stable/c/194781229d4cbc804b8ded13156eb8addce87d6c)
5. [](https://git.kernel.org/stable/c/f44b799603a9b5d2e375b0b2d54dd0b791eddfc2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11674
- **State**: PUBLISHED
- **Published Date**: October 22, 2019 at 14:42 UTC
- **Last Updated**: August 04, 2024 at 23:03 UTC
- **Reserved Date**: May 01, 2019 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4. The vulnerability could exploit invalid certificate validation and may result in a man-in-the-middle attack.
### Affected Products
**n/a - Self Service Password Reset (SSPR) versions prior to 4.4.0.4**
Affected versions:
- All versions prior to 4.4.0.4. (Status: affected)
### References
1. [](https://www.netiq.com/documentation/self-service-password-reset-44/release-notes-sspr-44-p4/data/release-notes-sspr-44-p4.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53154
- **State**: PUBLISHED
- **Published Date**: December 24, 2024 at 11:28 UTC
- **Last Updated**: May 04, 2025 at 09:54 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
clk: clk-apple-nco: Add NULL check in applnco_probe
Add NULL check in applnco_probe, to handle kernel NULL pointer
dereference error.
### Affected Products
**Linux - Linux**
Affected versions:
- 6641057d5dba87338780cf3e0d0ae8389ef1125c (Status: affected)
- 6641057d5dba87338780cf3e0d0ae8389ef1125c (Status: affected)
- 6641057d5dba87338780cf3e0d0ae8389ef1125c (Status: affected)
- 6641057d5dba87338780cf3e0d0ae8389ef1125c (Status: affected)
- 6641057d5dba87338780cf3e0d0ae8389ef1125c (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9a5905b725739af6a105f9e564e7c80d69969d2b)
2. [](https://git.kernel.org/stable/c/72ea9a7e9e260aa39f9d1c9254cf92adfb05c4f5)
3. [](https://git.kernel.org/stable/c/066c14619e8379c1bafbbf8196fd38eac303472b)
4. [](https://git.kernel.org/stable/c/534e02f83889ccef5fe6beb46e773ab9d4ae1655)
5. [](https://git.kernel.org/stable/c/969c765e2b508cca9099d246c010a1e48dcfd089) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39090
- **State**: PUBLISHED
- **Published Date**: December 06, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 14:48 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1599588060988411006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9855
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 16:17 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Catalina 10.15.5. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8817
- **State**: PUBLISHED
- **Published Date**: December 16, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 18, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges.
### Affected Products
**Nvidia Corporation - Quadro, NVS, GeForce, GRID and Tesla**
Affected versions:
- All (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4257)
2. [95059](http://www.securityfocus.com/bid/95059) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25018
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 00:00 UTC
- **Last Updated**: February 19, 2025 at 15:51 UTC
- **Reserved Date**: February 02, 2023 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
RIFARTEK IOT Wall transportation function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can inject JavaScript to perform reflected XSS (Reflected Cross-site scripting) attack.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Rifartek - IOT Wall**
Affected versions:
- 22 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1553
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in aspWebAlbum allows remote attackers to execute arbitrary SQL statements via (1) the username field on the login page or (2) the cat parameter to album.asp. NOTE: it was later reported that vector 1 affects aspWebAlbum 3.2, and the vector involves the txtUserName parameter in a processlogin action to album.asp, as reachable from the login action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11246](http://www.securityfocus.com/bid/11246)
2. [31649](http://secunia.com/advisories/31649)
3. [30996](http://www.securityfocus.com/bid/30996)
4. [aspwebalbum-album-sql-injection(44877)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44877)
5. [20040923 aspWebCalendar /aspWebAlbum: SQL injection](http://marc.info/?l=bugtraq&m=109604910025090&w=2)
6. [6420](https://www.exploit-db.com/exploits/6420)
7. [6357](https://www.exploit-db.com/exploits/6357)
8. [47913](http://osvdb.org/47913)
9. [47914](http://osvdb.org/47914)
10. [aspwebalbum-image-file-upload(44876)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44876)
11. [aspwebalbum-sql-injection(17507)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17507) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28873
- **State**: PUBLISHED
- **Published Date**: March 17, 2021 at 12:31 UTC
- **Last Updated**: August 04, 2024 at 16:40 UTC
- **Reserved Date**: November 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Fluxbb 1.5.11 is affected by a denial of service (DoS) vulnerability by sending an extremely long password via the user login form. When a long password is sent, the password hashing process will result in CPU and memory exhaustion on the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://fluxbb.com)
2. [](https://www.acunetix.com/vulnerabilities/web/long-password-denial-of-service/#:~:text=By%20sending%20a%20very%20long%2Ca%20vulnerable%20password%20hashing%20implementation) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26054
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:52 UTC
- **Last Updated**: October 07, 2024 at 13:36 UTC
- **Reserved Date**: February 14, 2024 at 17:37 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4433
- **State**: PUBLISHED
- **Published Date**: December 21, 2005 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in search.php in Esselbach Storyteller CMS 1.8 allows remote attackers to inject arbitrary web script or HTML via the query parameter, which is used by the Search field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18130](http://secunia.com/advisories/18130)
2. [21787](http://www.osvdb.org/21787)
3. [ADV-2005-2985](http://www.vupen.com/english/advisories/2005/2985)
4. [15945](http://www.securityfocus.com/bid/15945)
5. [](http://pridels0.blogspot.com/2005/12/esselbach-storyteller-cms-xss-vuln.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12827
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 11, 2017 at 00:00 UTC
- **Assigned By**: airbus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41258
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 13:48 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to insufficient input validation, SAP Financial Consolidation - version 1010, allows an authenticated attacker to inject malicious script when running a common query in the Web Administration Console. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality, integrity and availability of the application.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SAP SE - SAP Financial Consolidation**
Affected versions:
- = 1010 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3260708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19244
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 19:32 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348)
2. [USN-4205-1](https://usn.ubuntu.com/4205-1/)
3. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3163
- **State**: PUBLISHED
- **Published Date**: October 23, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 16, 2011 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP MFP Digital Sending Software 4.9x through 4.91.21 allows local users to obtain sensitive workflow-metadata information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT100647](http://marc.info/?l=bugtraq&m=131914362310845&w=2)
2. [8479](http://securityreason.com/securityalert/8479)
3. [50297](http://www.securityfocus.com/bid/50297)
4. [HPSBPI02711](http://marc.info/?l=bugtraq&m=131914362310845&w=2)
5. [46532](http://secunia.com/advisories/46532) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8690
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Microsoft Store)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210346)
2. [](https://support.apple.com/HT210348)
3. [](https://support.apple.com/HT210351)
4. [](https://support.apple.com/HT210355)
5. [](https://support.apple.com/HT210356)
6. [](https://support.apple.com/HT210357)
7. [](https://support.apple.com/HT210358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22815
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 15:39 UTC
- **Last Updated**: January 10, 2025 at 20:44 UTC
- **Reserved Date**: January 07, 2025 at 21:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins LLC Button Block allows Stored XSS.This issue affects Button Block: from n/a through 1.1.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bPlugins LLC - Button Block**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/button-block/vulnerability/wordpress-button-block-plugin-1-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Khalid Yusuf (Patchstack Alliance) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.