System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36288 - **State**: PUBLISHED - **Published Date**: April 14, 2021 at 23:45 UTC - **Last Updated**: October 17, 2024 at 14:02 UTC - **Reserved Date**: March 31, 2021 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description The issue navigation and search view in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.1 allows remote attackers to inject arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnerability caused by parameter pollution. ### Affected Products **Atlassian - Jira Server** Affected versions: - unspecified (Status: affected) - 8.6.0 (Status: affected) - unspecified (Status: affected) - 8.14.0 (Status: affected) - unspecified (Status: affected) **Atlassian - Jira Data Center** Affected versions: - unspecified (Status: affected) - 8.6.0 (Status: affected) - unspecified (Status: affected) - 8.14.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/JRASERVER-72115)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41775 - **State**: PUBLISHED - **Published Date**: December 03, 2024 at 17:13 UTC - **Last Updated**: December 03, 2024 at 17:55 UTC - **Reserved Date**: July 22, 2024 at 12:02 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Cognos Controller 11.0.0 and 11.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-327: Security Weakness ### Affected Products **IBM - Cognos Controller** Affected versions: - 11.0.0, 11.0.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7177220)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28296 - **State**: REJECTED - **Published Date**: January 22, 2021 at 19:44 UTC - **Last Updated**: January 22, 2021 at 19:44 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: Mend ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26579, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26579 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26579 - **State**: PUBLISHED - **Published Date**: December 16, 2022 at 00:00 UTC - **Last Updated**: October 27, 2024 at 14:47 UTC - **Reserved Date**: March 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow a root privileged attacker to install unsigned packages. The attacker must have shell access to the device and gain root privileges in order to exploit this vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c) 2. [](https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26579.md) 3. [](https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2032 - **State**: PUBLISHED - **Published Date**: March 20, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 09:58 UTC - **Reserved Date**: February 19, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Deadwood before 2.3.09, 3.x before 3.2.05, and as used in MaraDNS before 1.4.14 and 2.x before 2.0.09, allow remote attackers to cause a denial of service (out-of-bounds read and crash) by leveraging permission to perform recursive queries against Deadwood, related to missing input validation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [65595](http://www.securityfocus.com/bid/65595) 2. [[oss-security] 20140219 Re: CVE request: MaraDNS DoS due to incorrect bounds checking on certain strings](http://www.openwall.com/lists/oss-security/2014/02/19/15) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1066609) 4. [1029771](http://www.securitytracker.com/id/1029771) 5. [](http://samiam.org/blog/2014-02-12.html) 6. [maradns-cve20142032-dos(91204)](https://exchange.xforce.ibmcloud.com/vulnerabilities/91204)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23281, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23281 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23281 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 17:06 UTC - **Last Updated**: January 02, 2025 at 18:35 UTC - **Reserved Date**: January 15, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Common Log File System Driver Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Common Log File System Driver Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23281)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6110 - **State**: PUBLISHED - **Published Date**: November 17, 2024 at 10:22 UTC - **Last Updated**: December 05, 2024 at 20:30 UTC - **Reserved Date**: November 13, 2023 at 19:27 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in OpenStack. When a user tries to delete a non-existing access rule in it's scope, it deletes other existing access rules which are not associated with any application credentials. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-237: Security Weakness ### Affected Products **Red Hat - Red Hat OpenStack Platform 17.1 for RHEL 8** Affected versions: - 0:5.5.2-17.1.20230829213816.el8ost (Status: unaffected) **Red Hat - Red Hat OpenStack Platform 17.1 for RHEL 9** Affected versions: - 0:5.5.2-17.1.20230829210830.el9ost (Status: unaffected) **Red Hat - Red Hat OpenStack Platform 16.1** **Red Hat - Red Hat OpenStack Platform 16.2** **Red Hat - Red Hat OpenStack Platform 17.0** **Red Hat - Red Hat OpenStack Platform 18.0** ### References 1. [RHSA-2024:2737](https://access.redhat.com/errata/RHSA-2024:2737) 2. [RHSA-2024:2769](https://access.redhat.com/errata/RHSA-2024:2769) 3. [](https://access.redhat.com/security/cve/CVE-2023-6110) 4. [RHBZ#2212960](https://bugzilla.redhat.com/show_bug.cgi?id=2212960) 5. [](https://code.engineering.redhat.com/gerrit/gitweb?p=python-openstackclient.git;a=commit;h=7a7c364bdd7b2cd2b56e73724110710a68d58abf) 6. [](https://review.opendev.org/c/openstack/python-openstackclient/+/888697)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25535, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25535 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25535 - **State**: PUBLISHED - **Published Date**: March 26, 2025 at 00:00 UTC - **Last Updated**: March 27, 2025 at 14:12 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HTTP Response Manipulation in SCRIPT CASE v.1.0.002 Build7 allows a remote attacker to escalate privileges via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.besafebrasil.com.br/script-case-cve-2025-xx-xxxx/) 2. [](https://github.com/simalamuel/Research/tree/main/CVE-2025-25535)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7152 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 16, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3070 - **State**: PUBLISHED - **Published Date**: September 26, 2022 at 12:35 UTC - **Last Updated**: May 22, 2025 at 14:04 UTC - **Reserved Date**: August 31, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Generate PDF WordPress plugin before 3.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Generate PDF using Contact Form 7** Affected versions: - 3.6 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c) ### Credits - Anurag Bhoir
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42739 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 00:54 UTC - **Last Updated**: August 02, 2024 at 19:30 UTC - **Reserved Date**: September 13, 2023 at 07:40 UTC - **Assigned By**: Unisoc ### Vulnerability Description In engineermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15507, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15507 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15507 - **State**: REJECTED - **Published Date**: January 23, 2018 at 17:00 UTC - **Last Updated**: January 23, 2018 at 16:57 UTC - **Reserved Date**: October 17, 2017 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1328 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 01, 2024 at 17:11 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description linuxconf before 1.11.r11-rh3 on Red Hat Linux 5.1 allows local users to overwrite arbitrary files and gain root access via a symlink attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf) 2. [19980823 Security concerns in linuxconf shipped w/RedHat 5.1](http://marc.info/?l=bugtraq&m=90383955231511&w=2) 3. [6068](http://www.osvdb.org/6068) 4. [linuxconf-symlink-gain-privileges(7232)](http://www.iss.net/security_center/static/7232.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27508 - **State**: PUBLISHED - **Published Date**: March 05, 2025 at 21:32 UTC - **Last Updated**: March 07, 2025 at 18:02 UTC - **Reserved Date**: February 26, 2025 at 18:11 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-327: Security Weakness ### Affected Products **NationalSecurityAgency - emissary** Affected versions: - < 8.24.0 (Status: affected) ### References 1. [https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g](https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g) 2. [https://github.com/NationalSecurityAgency/emissary/commit/da3a81a8977577597ff2a944820a5ae4e9762368](https://github.com/NationalSecurityAgency/emissary/commit/da3a81a8977577597ff2a944820a5ae4e9762368)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0402 - **State**: PUBLISHED - **Published Date**: September 18, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:21 UTC - **Reserved Date**: May 24, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FreeBSD-SA-01:32](http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html) 2. [ipfilter-access-ports(6331)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6331) 3. [20010408 A fragmentation attack against IP Filter](http://marc.info/?l=bugtraq&m=98679734015538&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3913 - **State**: PUBLISHED - **Published Date**: November 30, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: November 30, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the domain alias management in Virtual Hosting Control System (VHCS) 2.4.6.2, related to "creating and deleting forwards for domain aliases," allows users to hijack the forwardings of other users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2005-2534](http://www.vupen.com/english/advisories/2005/2534) 2. [17704](http://secunia.com/advisories/17704) 3. [](http://vhcs.net/new/modules/news/article.php?storyid=17) 4. [21061](http://www.osvdb.org/21061)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40704, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40704 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40704 - **State**: PUBLISHED - **Published Date**: July 18, 2024 at 16:33 UTC - **Last Updated**: May 01, 2025 at 03:55 UTC - **Reserved Date**: August 21, 2023 at 22:12 UTC - **Assigned By**: icscert ### Vulnerability Description The product does not require unique and complex passwords to be created during installation. Using Philips's default password could jeopardize the PACS system if the password was hacked or leaked. An attacker could gain access to the database impacting system availability and data integrity. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-1392: Security Weakness ### Affected Products **Philips - Vue PACS** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01) 2. [](http://www.philips.com/productsecurity) ### Credits - TAS Health NZ and Camiel van Es reported these vulnerabilities to Philips.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18718 - **State**: PUBLISHED - **Published Date**: October 28, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 11:16 UTC - **Reserved Date**: October 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in gThumb through 3.6.2. There is a double-free vulnerability in the add_themes_from_dir method in dlg-contact-sheet.c because of two successive calls of g_free, each of which frees the same buffer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.gnome.org/GNOME/gthumb/issues/18) 2. [[debian-lts-announce] 20181105 [SECURITY] [DLA 1567-1] gthumb security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00002.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43748 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 22:04 UTC - **Last Updated**: December 11, 2024 at 16:23 UTC - **Reserved Date**: August 15, 2024 at 17:12 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43880, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43880 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43880 - **State**: PUBLISHED - **Published Date**: March 03, 2024 at 15:34 UTC - **Last Updated**: April 16, 2025 at 16:03 UTC - **Reserved Date**: October 26, 2022 at 15:46 UTC - **Assigned By**: ibm ### Vulnerability Description IBM QRadar WinCollect Agent 10.0 through 10.1.2 could allow a privileged user to cause a denial of service. IBM X-Force ID: 240151. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **IBM - QRadar WinCollect Agent ** Affected versions: - 10.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6980843) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/240151)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0697, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0697 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0697 - **State**: PUBLISHED - **Published Date**: April 15, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032136](http://www.securitytracker.com/id/1032136) 2. [20150414 Cisco TelePresence Collaboration Desk and Room Endpoints HTML Redirect Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=38350)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24544, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24544 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24544 - **State**: PUBLISHED - **Published Date**: April 15, 2022 at 19:04 UTC - **Last Updated**: January 02, 2025 at 18:51 UTC - **Reserved Date**: February 05, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Kerberos Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Kerberos Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24544)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2133 - **State**: PUBLISHED - **Published Date**: May 27, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 27, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain third-party packages for CVSup 16.1h, such as SuSE Linux, contain untrusted paths in the ELF RPATH fields of certain executables, which could allow local users to execute arbitrary code by causing cvsup to link against malicious libraries that are created in world-writable directories such as /usr/src/packages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cvsup-rpath-gain-privileges(14994)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14994) 2. [20040129 Security Announcement: untrusted ELF library path in some cvsup binary RPMs](http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0025.html) 3. [9523](http://www.securityfocus.com/bid/9523) 4. [20040129 Security Announcement: untrusted ELF library path in some cvsup binary RPMs](http://marc.info/?l=bugtraq&m=107539776002450&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25434 - **State**: PUBLISHED - **Published Date**: March 01, 2024 at 00:00 UTC - **Last Updated**: November 14, 2024 at 19:52 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in Pkp Ojs v3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Publicname parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/file/d/1MFuAyZukdJeA7HKz8o8pOKLJMjURTZCt/view?usp=sharing) 2. [](https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25434%20-%3E%20Stored%20XSS%20in%20input%20public%20name%20of%20the%20Component)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58104 - **State**: PUBLISHED - **Published Date**: March 25, 2025 at 17:37 UTC - **Last Updated**: March 26, 2025 at 03:55 UTC - **Reserved Date**: March 25, 2025 at 17:10 UTC - **Assigned By**: trendmicro ### Vulnerability Description A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **Trend Micro, Inc. - Trend Micro Apex One** Affected versions: - 2019 (14.0) (Status: affected) **Trend Micro, Inc. - Trend Micro Apex One as a Service** Affected versions: - SaaS (Status: affected) ### References 1. [](https://success.trendmicro.com/en-US/solution/KA-0018217)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9455 - **State**: PUBLISHED - **Published Date**: November 06, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:02 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In sdpu_extract_attr_seq of sdp_utils.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-78136677. ### Affected Products **Google Inc. - Android** Affected versions: - Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-08-01) 2. [1041432](http://www.securitytracker.com/id/1041432)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9124 - **State**: PUBLISHED - **Published Date**: October 08, 2024 at 16:23 UTC - **Last Updated**: November 21, 2024 at 16:55 UTC - **Reserved Date**: September 23, 2024 at 20:07 UTC - **Assigned By**: Rockwell ### Vulnerability Description A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 600T. If the device is overloaded with requests, it will become unavailable. The device may require a power cycle to recover it if it does not re-establish a connection after it stops receiving requests. ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **Rockwell Automation - Drives - PowerFlex 6000T** Affected versions: - 8.001 (Status: affected) - 8.002 (Status: affected) - 9.001 (Status: affected) ### References 1. [](https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1705.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11868, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11868 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11868 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 12:24 UTC - **Last Updated**: December 10, 2024 at 14:56 UTC - **Reserved Date**: November 27, 2024 at 15:10 UTC - **Assigned By**: Wordfence ### Vulnerability Description The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.7.3 via class-lp-rest-material-controller.php. This makes it possible for unauthenticated attackers to extract potentially sensitive paid course material. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **thimpress - LearnPress – WordPress LMS Plugin** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7bd43980-9193-4a63-adba-720dd1b11699?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3200780/learnpress) ### Credits - abrahack
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26478 - **State**: PUBLISHED - **Published Date**: March 02, 2023 at 17:46 UTC - **Last Updated**: March 05, 2025 at 20:49 UTC - **Reserved Date**: February 23, 2023 at 23:22 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XWiki Platform is a generic wiki platform. Starting in version 14.3-rc-1, `org.xwiki.store.script.TemporaryAttachmentsScriptService#uploadTemporaryAttachment` returns an instance of `com.xpn.xwiki.doc.XWikiAttachment`. This class is not supported to be exposed to users without the `programing` right. `com.xpn.xwiki.api.Attachment` should be used instead and takes case of checking the user's rights before performing dangerous operations. This has been patched in versions 14.9-rc-1 and 14.4.6. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-749: Security Weakness ### Affected Products **xwiki - xwiki-platform** Affected versions: - >= 14.3-rc-1, < 14.4.6 (Status: affected) - >= 14.5, < 14.9-rc-1 (Status: affected) ### References 1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8692-g6g9-gm5p](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8692-g6g9-gm5p) 2. [https://github.com/xwiki/xwiki-platform/commit/3c73c59e39b6436b1074d8834cf276916010014d](https://github.com/xwiki/xwiki-platform/commit/3c73c59e39b6436b1074d8834cf276916010014d) 3. [https://jira.xwiki.org/browse/XWIKI-20180](https://jira.xwiki.org/browse/XWIKI-20180)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36322, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36322 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36322 - **State**: PUBLISHED - **Published Date**: April 14, 2021 at 00:00 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: April 14, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454) 2. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6) 3. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html) 4. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html) 5. [DSA-5096](https://www.debian.org/security/2022/dsa-5096) 6. [](https://www.starwindsoftware.com/security/sw-20220816-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43981, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43981 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43981 - **State**: PUBLISHED - **Published Date**: October 05, 2023 at 00:00 UTC - **Last Updated**: September 19, 2024 at 19:22 UTC - **Reserved Date**: September 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Presto Changeo testsitecreator up to 1.1.1 was discovered to contain a deserialization vulnerability via the component delete_excluded_folder.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.friendsofpresta.org/modules/2023/10/03/testsitecreator.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0796 - **State**: PUBLISHED - **Published Date**: March 20, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:28 UTC - **Reserved Date**: March 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in HolaCMS 1.4.9-1 allows remote attackers to overwrite arbitrary files via a "holaDB/votes" followed by a .. (dot dot) in the vote_filename parameter, which bypasses the check by HolaCMS to ensure that the file is in the holaDB/votes directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.holacms.de/?content=changelog) 2. [14566](http://secunia.com/advisories/14566) 3. [20050315 Virginity Security Advisory 2005-002 : Hola CMS - Another File destruction and System access](http://marc.info/?l=bugtraq&m=111090966815089&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13855, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13855 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13855 - **State**: PUBLISHED - **Published Date**: February 20, 2025 at 09:21 UTC - **Last Updated**: February 20, 2025 at 15:14 UTC - **Reserved Date**: February 10, 2025 at 20:22 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Prime Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.1 via the pae_global_block shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract information from posts that are not public, including drafts, private, password protected, and restricted posts. This applies to posts created with Elementor only. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **rabmalin - Prime Addons for Elementor** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ac5012f2-3518-41c0-befe-597008f22152?source=cve) 2. [](https://wordpress.org/plugins/prime-addons-for-elementor/#developers) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24445 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 13:51 UTC - **Reserved Date**: January 23, 2023 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins. ### Affected Products **Jenkins Project - Jenkins OpenID Plugin** Affected versions: - unspecified (Status: affected) - next of 2.4 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2997)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27409 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 11:50 UTC - **Last Updated**: May 04, 2025 at 09:04 UTC - **Reserved Date**: February 25, 2024 at 13:47 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-edma: HDMA: Add sync read before starting the DMA transfer in remote setup The Linked list element and pointer are not stored in the same memory as the HDMA controller register. If the doorbell register is toggled before the full write of the linked list a race condition error will occur. In remote setup we can only use a readl to the memory to assure the full write has occurred. ### Affected Products **Linux - Linux** Affected versions: - e74c39573d35e9ac441090ff8183aa3dc2540649 (Status: affected) - e74c39573d35e9ac441090ff8183aa3dc2540649 (Status: affected) - e74c39573d35e9ac441090ff8183aa3dc2540649 (Status: affected) **Linux - Linux** Affected versions: - 6.5 (Status: affected) - 0 (Status: unaffected) - 6.6.21 (Status: unaffected) - 6.7.9 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/227ef58a9b0c372efba422e8886a8015a1509eba) 2. [](https://git.kernel.org/stable/c/17be6f5cb223f22e4733ed8fe8b2247cbb677716) 3. [](https://git.kernel.org/stable/c/712a92a48158e02155b4b6b21e03a817f78c9b7e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0503 - **State**: PUBLISHED - **Published Date**: January 20, 2011 at 18:00 UTC - **Last Updated**: August 06, 2024 at 21:58 UTC - **Reserved Date**: January 20, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in VaM Shop 1.6, 1.6.1, and probably earlier versions allows remote attackers to hijack the authentication of administrators for requests that (1) change user status via admin/customers.php or (2) change user permissions via admin/accounting.php. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [70431](http://osvdb.org/70431) 2. [42869](http://secunia.com/advisories/42869) 3. [](http://www.htbridge.ch/advisory/xsrf_csrf_in_vam_shop.html) 4. [20110111 XSRF (CSRF) in VaM Shop](http://www.securityfocus.com/archive/1/515613/100/0/threaded) 5. [15968](http://www.exploit-db.com/exploits/15968)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6972 - **State**: PUBLISHED - **Published Date**: October 16, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Kazakhstan Radio (aka com.wordbox.kazakhstanRadio) application 2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#751369](http://www.kb.cert.org/vuls/id/751369) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2850, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2850 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2850 - **State**: PUBLISHED - **Published Date**: July 25, 2023 at 11:13 UTC - **Last Updated**: October 15, 2024 at 19:05 UTC - **Reserved Date**: May 23, 2023 at 11:27 UTC - **Assigned By**: snyk ### Vulnerability Description NodeBB is affected by a Cross-Site WebSocket Hijacking vulnerability due to missing validation of the request origin. Exploitation of this vulnerability allows certain user information to be extracted by attacker. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N` ### Affected Products **NodeBB - NodeBB** Affected versions: - < 2.8.13 (Status: affected) - >= 3.0.0, < 3.1.3 (Status: affected) ### References 1. [](https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j) 2. [](https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359) 3. [](https://github.com/NodeBB/NodeBB/releases/tag/v3.1.3) ### Credits - Elliot Ward, Snyk
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3812 - **State**: PUBLISHED - **Published Date**: May 26, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 05:56 UTC - **Reserved Date**: May 07, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2017:0631](http://rhn.redhat.com/errata/RHSA-2017-0631.html) 2. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b) 3. [DSA-3277](http://www.debian.org/security/2015/dsa-3277) 4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html) 5. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088) 6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html) 7. [GLSA-201510-03](https://security.gentoo.org/glsa/201510-03) 8. [74637](http://www.securityfocus.com/bid/74637) 9. [](http://www.wireshark.org/security/wnpa-sec-2015-15.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40605, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40605 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40605 - **State**: PUBLISHED - **Published Date**: October 17, 2022 at 00:00 UTC - **Last Updated**: May 14, 2025 at 20:25 UTC - **Reserved Date**: September 12, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40606. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mitre/caldera/releases/tag/4.1.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18619 - **State**: PUBLISHED - **Published Date**: July 22, 2020 at 13:15 UTC - **Last Updated**: August 05, 2024 at 01:54 UTC - **Reserved Date**: October 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.synaptics.com/company/blog/) 2. [](https://www.synaptics.com/sites/default/files/fingerprint-driver-SGX-security-brief-2020-07-14.pdf) 3. [](https://www.syssec.wiwi.uni-due.de/en/research/research-projects/analysis-of-tee-software/) 4. [](https://support.lenovo.com/us/en/product_security/LEN-31372) 5. [](https://support.hp.com/hk-en/document/c06696568)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8358 - **State**: PUBLISHED - **Published Date**: February 13, 2017 at 22:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: September 28, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An issue was discovered in Smiths-Medical CADD-Solis Medication Safety Software, Version 1.0; 2.0; 3.0; and 3.1. The affected software does not verify the identities at communication endpoints, which may allow a man-in-the-middle attacker to gain access to the communication channel between endpoints. ### Affected Products **n/a - Smiths-Medical CADD-Solis Medication Safety Software through 3.1** Affected versions: - Smiths-Medical CADD-Solis Medication Safety Software through 3.1 (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-16-306-01) 2. [94630](http://www.securityfocus.com/bid/94630)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12747, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12747 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12747 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 17:39 UTC - **Last Updated**: June 02, 2025 at 14:22 UTC - **Reserved Date**: December 18, 2024 at 06:49 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation. ### CVSS Metrics - **CVSS Base Score**: 5.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Unknown - Unknown** Affected versions: - 0 (Status: affected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:3.1.3-21.el8_10 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:3.2.5-3.el9 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:3.2.5-3.el9 (Status: unaffected) **Red Hat - Red Hat Discovery 1.14** Affected versions: - sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 10** **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat OpenShift Container Platform 4** ### References 1. [RHSA-2025:2600](https://access.redhat.com/errata/RHSA-2025:2600) 2. [RHSA-2025:7050](https://access.redhat.com/errata/RHSA-2025:7050) 3. [RHSA-2025:8385](https://access.redhat.com/errata/RHSA-2025:8385) 4. [](https://access.redhat.com/security/cve/CVE-2024-12747) 5. [RHBZ#2332968](https://bugzilla.redhat.com/show_bug.cgi?id=2332968) 6. [](https://kb.cert.org/vuls/id/952657) ### Credits - Red Hat would like to thank Aleksei Gorban "loqpa" for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1884, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1884 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1884 - **State**: PUBLISHED - **Published Date**: June 07, 2005 at 04:00 UTC - **Last Updated**: September 17, 2024 at 00:42 UTC - **Reserved Date**: June 07, 2005 at 04:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the (1) rmdir or (2) mkdir commands in upload.php in YaPiG 0.92b, 0.93u and 0.94u allows remote attackers to create or delete arbitrary directories via a .. (dot dot) in the dir parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15600](http://secunia.com/advisories/15600/) 2. [17120](http://www.osvdb.org/17120) 3. [](http://secwatch.org/advisories/secwatch/20050530_yapig.txt) 4. [13877](http://www.securityfocus.com/bid/13877) 5. [1014103](http://securitytracker.com/id?1014103)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44127, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44127 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44127 - **State**: PUBLISHED - **Published Date**: September 16, 2024 at 23:22 UTC - **Last Updated**: September 18, 2024 at 18:10 UTC - **Reserved Date**: August 20, 2024 at 21:42 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed through improved state management. This issue is fixed in iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18. Private Browsing tabs may be accessed without authentication. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121246) 2. [](https://support.apple.com/en-us/121250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42693, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42693 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42693 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 00:54 UTC - **Last Updated**: August 02, 2024 at 19:23 UTC - **Reserved Date**: September 13, 2023 at 07:40 UTC - **Assigned By**: Unisoc ### Vulnerability Description In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2198 - **State**: PUBLISHED - **Published Date**: July 07, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 10:05 UTC - **Reserved Date**: February 25, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Unified Communications Domain Manager (CDM) in Unified CDM Platform Software before 4.4.2 has a hardcoded SSH private key, which makes it easier for remote attackers to obtain access to the support and root accounts by extracting this key from a binary file found in a different installation of the product, aka Bug ID CSCud41130. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59544](http://secunia.com/advisories/59544) 2. [68334](http://www.securityfocus.com/bid/68334) 3. [1030515](http://www.securitytracker.com/id/1030515) 4. [20140702 Multiple Vulnerabilities in Cisco Unified Communications Domain Manager](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140702-cucdm) 5. [20140702 Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in Cisco Unified Communications Domain Manager](http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=34689)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39417 - **State**: PUBLISHED - **Published Date**: August 14, 2024 at 11:57 UTC - **Last Updated**: August 14, 2024 at 14:13 UTC - **Reserved Date**: June 24, 2024 at 20:32 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Adobe - Adobe Commerce** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/magento/apsb24-61.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41917, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41917 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41917 - **State**: PUBLISHED - **Published Date**: November 15, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:37 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana. OpenSearch allows users to specify a local file when defining text analyzers to process data for text analysis. An issue in the implementation of this feature allows certain specially crafted queries to return a response containing the first line of text from arbitrary files. The list of potentially impacted files is limited to text files with read permissions allowed in the Java Security Manager policy configuration. OpenSearch version 1.3.7 and 2.4.0 contain a fix for this issue. Users are advised to upgrade. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **opensearch-project - OpenSearch** Affected versions: - < 1.3.7 (Status: affected) - >= 2.0.0, < 2.4.0 (Status: affected) ### References 1. [](https://github.com/opensearch-project/OpenSearch/security/advisories/GHSA-w3rx-m34v-wrqx) 2. [](https://github.com/opensearch-project/OpenSearch/commit/6d20423f5920745463b1abc5f1daf6a786c41aa0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3742 - **State**: PUBLISHED - **Published Date**: December 20, 2023 at 15:30 UTC - **Last Updated**: August 02, 2024 at 07:01 UTC - **Reserved Date**: July 18, 2023 at 01:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Insufficient policy enforcement in ADB in Google Chrome on ChromeOS prior to 114.0.5735.90 allowed a local attacker to bypass device policy restrictions via physical access to the device. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 114.0.5735.90 (Status: affected) ### References 1. [](https://bugs.chromium.org/p/chromium/issues/detail?id=1443292) 2. [](https://crbug.com/1443292)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7660 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Gent Magazine (aka com.magzter.thegentmagazine) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#347977](http://www.kb.cert.org/vuls/id/347977) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12368 - **State**: PUBLISHED - **Published Date**: November 30, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 18:36 UTC - **Reserved Date**: August 03, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A "Cisco WebEx Network Recording Player Remote Code Execution Vulnerability" exists in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) and WebEx Recording Format (WRF) files. A remote attacker could exploit this by providing a user with a malicious ARF or WRF file via email or URL and convincing the user to launch the file. Exploitation of this could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. Cisco Bug IDs: CSCve10584, CSCve10591, CSCve11503, CSCve10658, CSCve11507, CSCve10749, CSCve10744, CSCve11532, CSCve10762, CSCve10764, CSCve11538. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - Cisco WebEx Recording Format and Advanced Recording Format Players** Affected versions: - Cisco WebEx Recording Format and Advanced Recording Format Players (Status: affected) ### References 1. [102017](http://www.securityfocus.com/bid/102017) 2. [1039895](http://www.securitytracker.com/id/1039895) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0330 - **State**: PUBLISHED - **Published Date**: June 02, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: May 11, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands via a long file name string, aka the "File Access URL" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS99-049](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38466, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38466 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38466 - **State**: PUBLISHED - **Published Date**: September 04, 2023 at 01:16 UTC - **Last Updated**: October 02, 2024 at 14:12 UTC - **Reserved Date**: July 18, 2023 at 07:24 UTC - **Assigned By**: Unisoc ### Vulnerability Description In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android11/Android12 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10355 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 16:48 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 6u161 (Status: affected) - 7u151 (Status: affected) - 8u144 (Status: affected) - 9; Java SE Embedded: 8u144; JRockit: R28.3.15 (Status: affected) ### References 1. [RHSA-2017:3047](https://access.redhat.com/errata/RHSA-2017:3047) 2. [GLSA-201711-14](https://security.gentoo.org/glsa/201711-14) 3. [DSA-4015](https://www.debian.org/security/2017/dsa-4015) 4. [RHSA-2017:3267](https://access.redhat.com/errata/RHSA-2017:3267) 5. [RHSA-2017:2998](https://access.redhat.com/errata/RHSA-2017:2998) 6. [RHSA-2017:3268](https://access.redhat.com/errata/RHSA-2017:3268) 7. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 8. [RHSA-2017:3046](https://access.redhat.com/errata/RHSA-2017:3046) 9. [1039596](http://www.securitytracker.com/id/1039596) 10. [GLSA-201710-31](https://security.gentoo.org/glsa/201710-31) 11. [RHSA-2017:3264](https://access.redhat.com/errata/RHSA-2017:3264) 12. [DSA-4048](https://www.debian.org/security/2017/dsa-4048) 13. [RHSA-2017:3453](https://access.redhat.com/errata/RHSA-2017:3453) 14. [RHSA-2017:3392](https://access.redhat.com/errata/RHSA-2017:3392) 15. [[debian-lts-announce] 20171123 [SECURITY] [DLA 1187-1] openjdk-7 security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html) 16. [](https://security.netapp.com/advisory/ntap-20171019-0001/) 17. [101369](http://www.securityfocus.com/bid/101369) 18. [RHSA-2017:2999](https://access.redhat.com/errata/RHSA-2017:2999)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36389, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36389 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36389 - **State**: PUBLISHED - **Published Date**: October 14, 2021 at 18:27 UTC - **Last Updated**: August 04, 2024 at 00:54 UTC - **Reserved Date**: July 12, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html) 2. [](https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6) 3. [](https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md) 4. [20211019 Yellowfin < 9.6.1 Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2021/Oct/15) 5. [](https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21316, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21316 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21316 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:24 UTC - **Last Updated**: September 24, 2024 at 20:24 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - MySQL Cluster** Affected versions: - 7.4.34 and prior (Status: affected) - 7.5.24 and prior (Status: affected) - 7.6.20 and prior (Status: affected) - 8.0.27 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220121-0008/) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-101/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1282, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1282 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1282 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:11 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RealSystem G2 server stores the administrator password in cleartext in a world-readable configuration file, which allows local users to gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [realsystem-readable-conf-file(1542)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1542) 2. [19981210 RealSystem passwords](http://www.securityfocus.com/archive/1/11543)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18765 - **State**: PUBLISHED - **Published Date**: April 22, 2020 at 15:41 UTC - **Last Updated**: August 05, 2024 at 21:37 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by denial of service. This affects R6300v2 before 1.0.4.8, R6400 before 1.0.1.22, R6400v2 before 1.0.2.32, R6700 before 1.0.1.20, R6900 before 1.0.1.20, WNR3500Lv2 before 1.2.0.44, and WNR2000v2 before 1.2.0.8. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000051480/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2017-0648)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43289, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43289 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43289 - **State**: PUBLISHED - **Published Date**: April 14, 2022 at 12:55 UTC - **Last Updated**: August 04, 2024 at 03:55 UTC - **Reserved Date**: November 02, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into an arbitrary directory of a GoCD server, but does not control the filename. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.gocd.org/releases/#21-3-0) 2. [](https://github.com/gocd/gocd/commit/4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595) 3. [](https://github.com/gocd/gocd/commit/c22e0428164af25d3e91baabd3f538a41cadc82f) 4. [](https://blog.sonarsource.com/gocd-vulnerability-chain)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30056 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 00:00 UTC - **Last Updated**: January 28, 2025 at 19:55 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A session takeover vulnerability exists in FICO Origination Manager Decision Module 4.8.1 due to insufficient protection of the JSESSIONID cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://fico.com) 2. [](http://origination.com) 3. [](https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3717 - **State**: PUBLISHED - **Published Date**: January 29, 2020 at 18:51 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Magento versions 2.3.3 and earlier, 2.2.10 and earlier, 1.14.4.3 and earlier, and 1.9.4.3 and earlier have a path traversal vulnerability. Successful exploitation could lead to sensitive information disclosure. ### Affected Products **Adobe - Magento** Affected versions: - 2.3.3 and earlier (Status: affected) - 2.2.10 and earlier (Status: affected) - 1.14.4.3 and earlier (Status: affected) - 1.9.4.3 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/magento/apsb20-02.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7635 - **State**: PUBLISHED - **Published Date**: June 05, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description QNAP NAS application Proxy Server through version 1.2.0 does not utilize CSRF protections. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/nas-201806-01) 2. [1041025](http://www.securitytracker.com/id/1041025)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2755 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46571 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 19:44 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: January 26, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15365. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Bentley - View** Affected versions: - 10.16.0.80 (Status: affected) ### References 1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-158/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8595 - **State**: PUBLISHED - **Published Date**: November 19, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 13:25 UTC - **Reserved Date**: November 04, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201504-04](https://security.gentoo.org/glsa/201504-04) 2. [62672](http://secunia.com/advisories/62672) 3. [](http://support.citrix.com/article/CTX201794) 4. [](http://support.citrix.com/article/CTX200288) 5. [DSA-3140](http://www.debian.org/security/2015/dsa-3140) 6. [62537](http://secunia.com/advisories/62537) 7. [openSUSE-SU-2015:0226](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html) 8. [71151](http://www.securityfocus.com/bid/71151) 9. [](http://xenbits.xen.org/xsa/advisory-110.html) 10. [openSUSE-SU-2015:0256](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html) 11. [xen-cve20148595-priv-esc(98768)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4736, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4736 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4736 - **State**: PUBLISHED - **Published Date**: October 24, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 24, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in RPG.Board 0.8 Beta2 and earlier allows remote attackers to execute arbitrary SQL commands via the showtopic parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4483](http://securityreason.com/securityalert/4483) 2. [20080926 RPG.Board <= 0.0.8Beta2 Remote SQL Injection](http://marc.info/?l=bugtraq&m=122244414700901&w=2) 3. [rpgboard-index-sql-injection(45444)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45444) 4. [31417](http://www.securityfocus.com/bid/31417) 5. [6589](https://www.exploit-db.com/exploits/6589)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5608 - **State**: PUBLISHED - **Published Date**: January 28, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 15:04 UTC - **Reserved Date**: January 28, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the image upload function in Piwigo before 2.8.6 allows remote attackers to inject arbitrary web script or HTML via a crafted image filename. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Piwigo/Piwigo/issues/600) 2. [95848](http://www.securityfocus.com/bid/95848) 3. [](https://github.com/Piwigo/Piwigo/commit/6ec3f2d0fae0437f0c2cc8c475a26fb6aeb0d4cb) 4. [](http://piwigo.org/releases/2.8.6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0365 - **State**: PUBLISHED - **Published Date**: June 05, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:50 UTC - **Reserved Date**: May 30, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ICQLite 2003a creates the ICQ Lite directory with an ACE for "Full Control" privileges for Interactive Users, which allows local users to gain privileges as other users by replacing the executables with malicious programs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030529 ICQLite executable trojaning](http://marc.info/?l=bugtraq&m=105427404625027&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1656 - **State**: PUBLISHED - **Published Date**: May 16, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 16, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Xerox WorkCentre and WorkCentre Pro 232, 238, 245, 255, 265, 275; and WorkCentre 5632, 5638, 5645, 5655, 5665, 5675, 5687, 7655, 7656, and 7675 allows remote attackers to execute arbitrary commands via unknown attack vectors, aka "command injection vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.xerox.com/downloads/usa/en/c/cert_XRX09-02_v1.0.pdf) 2. [ADV-2009-1328](http://www.vupen.com/english/advisories/2009/1328) 3. [1022238](http://www.securitytracker.com/id?1022238) 4. [54457](http://osvdb.org/54457) 5. [workcentre-unspecified-cmd-execution(50558)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50558) 6. [35101](http://secunia.com/advisories/35101) 7. [34984](http://www.securityfocus.com/bid/34984)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0768 - **State**: PUBLISHED - **Published Date**: June 06, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 22:30 UTC - **Reserved Date**: December 16, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description PostgreSQL PL/Java after 9.0 does not honor access controls on large objects. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://tada.github.io/pljava/releasenotes.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37793 - **State**: PUBLISHED - **Published Date**: July 14, 2023 at 00:00 UTC - **Last Updated**: October 30, 2024 at 19:11 UTC - **Reserved Date**: July 10, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WAYOS FBM-291W 19.09.11V was discovered to contain a buffer overflow via the component /upgrade_filter.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PwnYouLin/IOT_vul/blob/main/wayos/2/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23888, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23888 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23888 - **State**: PUBLISHED - **Published Date**: March 26, 2021 at 09:30 UTC - **Last Updated**: August 03, 2024 at 19:14 UTC - **Reserved Date**: January 12, 2021 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Unvalidated client-side URL redirect vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 could cause an authenticated ePO user to load an untrusted site in an ePO iframe which could steal information from the authenticated user. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **McAfee,LLC - McAfee ePolicy Orchestrator (ePO)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10352)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34817 - **State**: PUBLISHED - **Published Date**: June 30, 2022 at 17:49 UTC - **Last Updated**: August 03, 2024 at 09:22 UTC - **Reserved Date**: June 29, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A cross-site request forgery (CSRF) vulnerability in Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier allows attackers to disable jobs. ### Affected Products **Jenkins project - Jenkins Failed Job Deactivator Plugin** Affected versions: - unspecified (Status: affected) - next of 1.2.1 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2061)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7006 - **State**: PUBLISHED - **Published Date**: February 12, 2007 at 23:00 UTC - **Last Updated**: September 16, 2024 at 17:43 UTC - **Reserved Date**: February 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in upload/admin/team.php in Robin de Graff Somery 0.4.4 allows remote attackers to execute arbitrary PHP code via a URL in the checkauth parameter. NOTE: CVE disputes this vulnerability because the checkauth parameter is only used in conditionals ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.root-security.org/danger/Somery.txt) 2. [20060613 REMOTE FILE INCLUSION ( ALL )](http://archives.neohapsis.com/archives/bugtraq/2006-06/0242.html) 3. [](http://packetstorm.linuxsecurity.com/0606-exploits/Somery.txt) 4. [20070212 CVE dispute - old Somery team.php RFI](http://www.attrition.org/pipermail/vim/2007-February/001305.html) 5. [27662](http://www.osvdb.org/27662) 6. [18412](http://www.securityfocus.com/bid/18412)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3529 - **State**: PUBLISHED - **Published Date**: April 10, 2024 at 01:00 UTC - **Last Updated**: August 01, 2024 at 20:12 UTC - **Reserved Date**: April 09, 2024 at 16:34 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Online Student Management System 1.0. It has been classified as problematic. This affects an unknown part of the file students_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259899. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Campcodes - Complete Online Student Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-259899 | Campcodes Complete Online Student Management System students_view.php cross site scripting](https://vuldb.com/?id.259899) 2. [VDB-259899 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259899) 3. [Submit #312520 | campcodes Complete Online Student Management System ≤1.0 XSS injection](https://vuldb.com/?submit.312520) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Student%20Management%20System/Complete%20Online%20Student%20Management%20System%20-%20vuln%202.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6138 - **State**: PUBLISHED - **Published Date**: January 11, 2019 at 17:00 UTC - **Last Updated**: August 04, 2024 at 20:16 UTC - **Reserved Date**: January 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue has been found in libIEC61850 v1.3.1. Memory_malloc and Memory_calloc in hal/memory/lib_memory.c have memory leaks when called from mms/iso_mms/common/mms_value.c, server/mms_mapping/mms_mapping.c, and server/mms_mapping/mms_sv.c (via common/string_utilities.c), as demonstrated by iec61850_9_2_LE_example.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mz-automation/libiec61850/issues/103)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51545, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51545 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51545 - **State**: PUBLISHED - **Published Date**: December 29, 2023 at 12:48 UTC - **Last Updated**: August 02, 2024 at 22:40 UTC - **Reserved Date**: December 20, 2023 at 19:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF), Deserialization of Untrusted Data vulnerability in ThemeHigh Job Manager & Career – Manage job board listings, and recruitments.This issue affects Job Manager & Career – Manage job board listings, and recruitments: from n/a through 1.4.4. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) - CWE-502: Deserialization of Untrusted Data ### Affected Products **ThemeHigh - Job Manager & Career – Manage job board listings, and recruitments** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/job-manager-career/wordpress-job-manager-career-plugin-1-4-4-cross-site-request-forgery-csrf-to-php-object-injection-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2166 - **State**: PUBLISHED - **Published Date**: April 22, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in administration/user/lib/group.inc.php in OpenSurveyPilot (osp) 1.2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the cfgPathToProjectAdmin parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://osp.cvs.sourceforge.net/osp/osp12/administration/user/lib/group.inc.php?revision=1.1.1.1&view=markup) 2. [ADV-2007-1460](http://www.vupen.com/english/advisories/2007/1460) 3. [24915](http://secunia.com/advisories/24915) 4. [23563](http://www.securityfocus.com/bid/23563) 5. [osp-groupinc-file-include(33749)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33749) 6. [35022](http://osvdb.org/35022) 7. [3765](https://www.exploit-db.com/exploits/3765)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36881, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36881 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36881 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 17:08 UTC - **Last Updated**: January 01, 2025 at 01:59 UTC - **Reserved Date**: June 27, 2023 at 20:28 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure Apache Ambari Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 4.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Microsoft - Azure HDInsight** Affected versions: - 1.0 (Status: affected) ### References 1. [Azure Apache Ambari Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36881)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3058 - **State**: PUBLISHED - **Published Date**: July 18, 2018 at 13:00 UTC - **Last Updated**: October 02, 2024 at 19:54 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.5.60 and prior (Status: affected) - 5.6.40 and prior (Status: affected) - 5.7.22 and prior (Status: affected) ### References 1. [DSA-4341](https://www.debian.org/security/2018/dsa-4341) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) 3. [USN-3725-1](https://usn.ubuntu.com/3725-1/) 4. [1041294](http://www.securitytracker.com/id/1041294) 5. [RHSA-2018:3655](https://access.redhat.com/errata/RHSA-2018:3655) 6. [[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html) 7. [USN-3725-2](https://usn.ubuntu.com/3725-2/) 8. [](https://security.netapp.com/advisory/ntap-20180726-0002/) 9. [[debian-lts-announce] 20180831 [SECURITY] [DLA 1488-1] mariadb-10.0 security update](https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html) 10. [104766](http://www.securityfocus.com/bid/104766) 11. [RHSA-2019:1258](https://access.redhat.com/errata/RHSA-2019:1258) 12. [RHSA-2019:2327](https://access.redhat.com/errata/RHSA-2019:2327)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0944 - **State**: PUBLISHED - **Published Date**: May 13, 2009 at 15:14 UTC - **Last Updated**: August 07, 2024 at 04:57 UTC - **Reserved Date**: March 18, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT3549) 2. [35074](http://secunia.com/advisories/35074) 3. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html) 4. [34939](http://www.securityfocus.com/bid/34939) 5. [34926](http://www.securityfocus.com/bid/34926) 6. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html) 7. [1022215](http://www.securitytracker.com/id?1022215) 8. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0838 - **State**: PUBLISHED - **Published Date**: September 11, 2020 at 17:08 UTC - **Last Updated**: November 18, 2024 at 16:25 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description <p>An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p> <p>To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.</p> <p>The security update addresses the vulnerability by correcting how NTFS checks access.</p> ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0838)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15442 - **State**: REJECTED - **Published Date**: May 27, 2021 at 20:13 UTC - **Last Updated**: May 27, 2021 at 20:13 UTC - **Reserved Date**: June 30, 2020 at 00:00 UTC - **Assigned By**: openEuler ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5824, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5824 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5824 - **State**: PUBLISHED - **Published Date**: January 02, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 11:04 UTC - **Reserved Date**: January 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33273](http://secunia.com/advisories/33273) 2. [SUSE-SR:2009:003](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html) 3. [ADV-2009-0005](http://www.vupen.com/english/advisories/2009/0005) 4. [](http://musicpd.org/mantis/view.php?id=1915) 5. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205) 6. [33066](http://www.securityfocus.com/bid/33066) 7. [USN-912-1](http://www.ubuntu.com/usn/USN-912-1) 8. [[oss-security] 20081230 CVE id request: audiofile](http://openwall.com/lists/oss-security/2008/12/30/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35705 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 15:47 UTC - **Last Updated**: April 23, 2025 at 16:58 UTC - **Reserved Date**: July 12, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Bridge** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb22-49.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48235 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 01:20 UTC - **Last Updated**: January 28, 2025 at 20:37 UTC - **Reserved Date**: January 09, 2023 at 11:51 UTC - **Assigned By**: Unisoc ### Vulnerability Description In MP3 encoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10229, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10229 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10229 - **State**: PUBLISHED - **Published Date**: December 31, 2019 at 14:25 UTC - **Last Updated**: August 04, 2024 at 22:17 UTC - **Reserved Date**: March 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in MailStore Server (and Service Provider Edition) 9.x through 11.x before 11.2.2. When the directory service (for synchronizing and authenticating users) is set to Generic LDAP, an attacker is able to login as an existing user with an arbitrary password on the second login attempt. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://help.mailstore.com/security/MAILSTORE-SA-2019-01.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52509 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 17:37 UTC - **Last Updated**: November 15, 2024 at 18:11 UTC - **Reserved Date**: November 11, 2024 at 18:49 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This allowed users to send them the files to themselves and then downloading it from their mail clients. It is recommended that the Nextcloud Mail is upgraded to 2.2.10, 3.6.2 or 3.7.2. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **nextcloud - security-advisories** Affected versions: - >=2.2.0, < 2.2.10 (Status: affected) - >= 3.6.0, < 3.6.2 (Status: affected) - >= 3.7.0, < 3.7.2 (Status: affected) ### References 1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862) 2. [https://github.com/nextcloud/mail/pull/9592](https://github.com/nextcloud/mail/pull/9592) 3. [https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b](https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b) 4. [https://hackerone.com/reports/1878255](https://hackerone.com/reports/1878255)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27062, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27062 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27062 - **State**: PUBLISHED - **Published Date**: March 11, 2021 at 15:49 UTC - **Last Updated**: August 03, 2024 at 20:40 UTC - **Reserved Date**: February 10, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description HEVC Video Extensions Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - HEVC Video Extensions** Affected versions: - N/A (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27062)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12387 - **State**: PUBLISHED - **Published Date**: May 26, 2020 at 17:04 UTC - **Last Updated**: August 04, 2024 at 11:56 UTC - **Reserved Date**: April 28, 2020 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. ### Affected Products **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2020-18/) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-16/) 3. [](https://www.mozilla.org/security/advisories/mfsa2020-17/) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1545345) 5. [USN-4373-1](https://usn.ubuntu.com/4373-1/) 6. [](https://security.gentoo.org/glsa/202005-03) 7. [](https://security.gentoo.org/glsa/202005-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12214, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12214 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12214 - **State**: PUBLISHED - **Published Date**: May 20, 2019 at 15:05 UTC - **Last Updated**: August 04, 2024 at 23:17 UTC - **Reserved Date**: May 20, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50534 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:32 UTC - **Last Updated**: November 19, 2024 at 20:25 UTC - **Reserved Date**: October 24, 2024 at 07:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Syed Umair Hussain Shah World Prayer Time allows Stored XSS.This issue affects World Prayer Time: from n/a through 2.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Syed Umair Hussain Shah - World Prayer Time** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/world-prayer-time/wordpress-world-prayer-time-plugin-2-0-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1514 - **State**: PUBLISHED - **Published Date**: February 28, 2024 at 08:33 UTC - **Last Updated**: August 01, 2024 at 18:40 UTC - **Reserved Date**: February 14, 2024 at 21:16 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP eCommerce plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'cart_contents' parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **justinsainton - WP eCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0ba5da2b-6944-4243-a4f2-0f887abf7a66?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-e-commerce/trunk/wpsc-components/marketplace-core-v1/library/Sputnik.php#L334) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28834 - **State**: PUBLISHED - **Published Date**: September 11, 2023 at 13:06 UTC - **Last Updated**: February 27, 2025 at 20:56 UTC - **Reserved Date**: April 08, 2022 at 16:06 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe InCopy versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - InCopy** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/incopy/apsb22-28.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4474 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 06:40 UTC - **Last Updated**: May 13, 2025 at 13:16 UTC - **Reserved Date**: May 08, 2025 at 19:57 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the fed_admin_setting_form_function() function in versions 1.0 to 2.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the plugin’s 'register' role setting to make new user registrations default to the administrator role, leading to an elevation of privileges to that of an administrator. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **vinoth06 - Frontend Dashboard** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/fb61159a-e501-4c55-a384-b6049e0f0bc8?source=cve) 2. [](https://wordpress.org/plugins/frontend-dashboard/#developers) 3. [](https://plugins.trac.wordpress.org/browser/frontend-dashboard/tags/2.2.7/includes/admin/request/admin.php#L26) 4. [](https://plugins.trac.wordpress.org/browser/frontend-dashboard/tags/2.2.7/includes/admin/request/tabs/login.php#L14) 5. [](https://plugins.trac.wordpress.org/changeset/3290623/) ### Credits - Kenneth Dunn
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49244, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49244 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49244 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:53 UTC - **Last Updated**: June 06, 2025 at 16:06 UTC - **Reserved Date**: June 04, 2025 at 09:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vova Shortcodes Ultimate allows Stored XSS. This issue affects Shortcodes Ultimate: from n/a through 7.3.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Vova - Shortcodes Ultimate** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/shortcodes-ultimate/vulnerability/wordpress-shortcodes-ultimate-7-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - muhammad yudha (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0556 - **State**: PUBLISHED - **Published Date**: May 03, 2012 at 18:17 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: January 11, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0555, and CVE-2012-0557. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660640) 2. [1026949](http://www.securitytracker.com/id?1026949) 3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html) 4. [53087](http://www.securityfocus.com/bid/53087) 5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1065, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1065 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1065 - **State**: PUBLISHED - **Published Date**: March 02, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 03:51 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c. ### Affected Products **n/a - Linux kernel 4.15.0-rc9** Affected versions: - Linux kernel 4.15.0-rc9 (Status: affected) ### References 1. [1040446](http://www.securitytracker.com/id/1040446) 2. [USN-3654-1](https://usn.ubuntu.com/3654-1/) 3. [DSA-4188](https://www.debian.org/security/2018/dsa-4188) 4. [RHSA-2018:2948](https://access.redhat.com/errata/RHSA-2018:2948) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1547824) 6. [USN-3654-2](https://usn.ubuntu.com/3654-2/) 7. [](http://lists.openwall.net/netdev/2018/01/27/46) 8. [USN-3656-1](https://usn.ubuntu.com/3656-1/) 9. [](http://patchwork.ozlabs.org/patch/870355/) 10. [](https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8) 11. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3847 - **State**: PUBLISHED - **Published Date**: August 05, 2016 at 20:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The NVIDIA media driver in Android before 2016-08-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28871433. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-08-01.html) 2. [92231](http://www.securityfocus.com/bid/92231) 3. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4561)