System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2979 - **State**: PUBLISHED - **Published Date**: October 19, 2009 at 22:00 UTC - **Last Updated**: August 07, 2024 at 06:07 UTC - **Reserved Date**: August 27, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a denial of service via a crafted document. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36638](http://www.securityfocus.com/bid/36638) 2. [TA09-286B](http://www.us-cert.gov/cas/techalerts/TA09-286B.html) 3. [1023007](http://securitytracker.com/id?1023007) 4. [](http://www.adobe.com/support/security/bulletins/apsb09-15.html) 5. [oval:org.mitre.oval:def:6280](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6280) 6. [ADV-2009-2898](http://www.vupen.com/english/advisories/2009/2898)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20634 - **State**: PUBLISHED - **Published Date**: March 20, 2019 at 18:35 UTC - **Last Updated**: August 05, 2024 at 12:05 UTC - **Reserved Date**: December 31, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP Scripts Mall Advance B2B Script 2.1.4 allows remote attackers to cause a denial of service (changed Page structure) via JavaScript code in the First Name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gkaim.com/cve-2018-20634-vikas-chaudhary/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6927 - **State**: PUBLISHED - **Published Date**: March 01, 2018 at 22:00 UTC - **Last Updated**: September 17, 2024 at 00:51 UTC - **Reserved Date**: March 16, 2017 at 00:00 UTC - **Assigned By**: drupal ### Vulnerability Description Drupal 8.4.x versions before 8.4.5 and Drupal 7.x versions before 7.57 has a Drupal.checkPlain() JavaScript function which is used to escape potentially dangerous text before outputting it to HTML (as JavaScript output does not typically go through Twig autoescaping). This function does not correctly handle all methods of injecting malicious HTML, leading to a cross-site scripting vulnerability under certain circumstances. The PHP functions which Drupal provides for HTML escaping are not affected. ### Affected Products **Drupal.org - Drupal Core** Affected versions: - 8.4.x versions before 8.4.5 and Drupal 7.x versions before 7.57 (Status: affected) ### References 1. [DSA-4123](https://www.debian.org/security/2018/dsa-4123) 2. [[debian-lts-announce] 20180228 [SECURITY] [DLA 1295-1] drupal7 security update](https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html) 3. [103138](http://www.securityfocus.com/bid/103138) 4. [](https://www.drupal.org/sa-core-2018-001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2805 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 30, 2024 at 14:47 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 7u251, 8u241, 11.0.6, 14 (Status: affected) - Java SE Embedded: 8u241 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 2. [](https://security.netapp.com/advisory/ntap-20200416-0004/) 3. [DSA-4662](https://www.debian.org/security/2020/dsa-4662) 4. [USN-4337-1](https://usn.ubuntu.com/4337-1/) 5. [[debian-lts-announce] 20200429 [SECURITY] [DLA 2193-1] openjdk-7 security update](https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html) 6. [DSA-4668](https://www.debian.org/security/2020/dsa-4668) 7. [FEDORA-2020-5386fe3bbb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/) 8. [FEDORA-2020-21ca991b3b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/) 9. [FEDORA-2020-a60ad9d4ec](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/) 10. [openSUSE-SU-2020:0757](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html) 11. [openSUSE-SU-2020:0800](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html) 12. [GLSA-202006-22](https://security.gentoo.org/glsa/202006-22) 13. [openSUSE-SU-2020:0841](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html) 14. [GLSA-202209-15](https://security.gentoo.org/glsa/202209-15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48807 - **State**: PUBLISHED - **Published Date**: October 30, 2024 at 00:00 UTC - **Last Updated**: October 31, 2024 at 15:04 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting vulnerability in PHPGurukul Doctor Appointment Management System v.1.0 allows a local attacker to execute arbitrary code via the search parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://phpgurukul.com/doctor-appointment-management-system-using-php-and-mysql/) 2. [](https://medium.com/%40KrishnaChaganti/cross-site-scripting-xss-in-appointment-management-system-cve-2024-48807-0f7523be9fa2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10640 - **State**: PUBLISHED - **Published Date**: February 24, 2022 at 18:50 UTC - **Last Updated**: April 16, 2025 at 16:44 UTC - **Reserved Date**: March 16, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **Emerson - OpenEnterprise SCADA Software** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-20-140-02) ### Credits - Roman Lozko of Kaspersky reported these vulnerabilities to Emerson.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29277, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29277 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29277 - **State**: PUBLISHED - **Published Date**: May 11, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 19:02 UTC - **Reserved Date**: April 04, 2023 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Substance3D - Painter** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2204 - **State**: PUBLISHED - **Published Date**: May 05, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:43 UTC - **Reserved Date**: May 04, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the topic deletion functionality (post_delete function in func_mod.php) for Invision Power Board 2.1.5 allows remote authenticated moderators to execute arbitrary SQL commands via the selectedpids parameter, which bypasses an integer value check when the $id variable is an array. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17837](http://www.securityfocus.com/bid/17837) 2. [invision-func_mod-sql-injection(26190)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26190) 3. [551](http://securityreason.com/securityalert/551) 4. [](http://forums.invisionpower.com/index.php?showtopic=214248&view=getnewpo) 5. [ADV-2006-1605](http://www.vupen.com/english/advisories/2006/1605) 6. [20060428 Invision Power Board v2.1.5 Remote SQL Injection](http://www.securityfocus.com/archive/1/432591/100/0/threaded) 7. [20060504 Re: Invision Power Board v2.1.5 Remote SQL Injection](http://www.securityfocus.com/archive/1/432948/30/0/threaded) 8. [19901](http://secunia.com/advisories/19901)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27598, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27598 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27598 - **State**: PUBLISHED - **Published Date**: April 13, 2021 at 18:38 UTC - **Last Updated**: August 03, 2024 at 21:26 UTC - **Reserved Date**: February 23, 2021 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver AS JAVA (Customer Usage Provisioning Servlet), versions - 7.31, 7.40, 7.50, allows an attacker to read some statistical data like product version, traffic, timestamp etc. because of missing authorization check in the servlet. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **SAP SE - SAP NetWeaver AS for JAVA (Customer Usage Provisioning Servlet)** Affected versions: - < 7.31 (Status: affected) - < 7.40 (Status: affected) - < 7.50 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/3027937) 2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=573801649)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22260, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22260 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22260 - **State**: PUBLISHED - **Published Date**: November 04, 2021 at 23:10 UTC - **Last Updated**: August 03, 2024 at 18:37 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description A stored Cross-Site Scripting vulnerability in the DataDog integration in all versions of GitLab CE/EE starting from 13.7 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to execute arbitrary JavaScript code on the victim's behalf ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=13.7, <14.0.9 (Status: affected) - >=14.1, <14.1.4 (Status: affected) - >=14.2, <14.2.2 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/336614) 2. [](https://hackerone.com/reports/1257383) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22260.json) ### Credits - Thanks shells3c for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2091 - **State**: PUBLISHED - **Published Date**: June 17, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 19:26 UTC - **Reserved Date**: April 04, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple buffer overflows in FlightGear 2.6 and earlier and SimGear 2.6 and earlier allow user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long string in a rotor tag of an aircraft xml model to the Rotor::getValueforFGSet function in src/FDM/YASim/Rotor.cpp or (2) a crafted UDP packet to the SGSocketUDP::read function in simgear/simgear/simgear/io/sg_socket_udp.cxx. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [48780](http://secunia.com/advisories/48780) 2. [FEDORA-2012-8615](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082017.html) 3. [[oss-security] 20120410 Re: CVE Request: FlightGear and Simgear Multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2012/04/10/13) 4. [FEDORA-2012-8650](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082002.html) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=811617) 6. [GLSA-201603-12](https://security.gentoo.org/glsa/201603-12) 7. [[Flightgear-devel] 20120320 Re: Flightgear and Simgear multiple format string vulnerabilities](http://sourceforge.net/mailarchive/message.php?msg_id=29012174) 8. [FEDORA-2012-8647](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081997.html) 9. [[Flightgear-devel] 20120309 Flightgear and Simgear multiple format string vulnerabilities](http://sourceforge.net/mailarchive/message.php?msg_id=28957051)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-53082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-53082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-53082 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 15:55 UTC - **Last Updated**: May 04, 2025 at 07:49 UTC - **Reserved Date**: May 02, 2025 at 15:51 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: vp_vdpa: fix the crash in hot unplug with vp_vdpa While unplugging the vp_vdpa device, it triggers a kernel panic The root cause is: vdpa_mgmtdev_unregister() will accesses modern devices which will cause a use after free. So need to change the sequence in vp_vdpa_remove [ 195.003359] BUG: unable to handle page fault for address: ff4e8beb80199014 [ 195.004012] #PF: supervisor read access in kernel mode [ 195.004486] #PF: error_code(0x0000) - not-present page [ 195.004960] PGD 100000067 P4D 1001b6067 PUD 1001b7067 PMD 1001b8067 PTE 0 [ 195.005578] Oops: 0000 1 PREEMPT SMP PTI [ 195.005968] CPU: 13 PID: 164 Comm: kworker/u56:10 Kdump: loaded Not tainted 5.14.0-252.el9.x86_64 #1 [ 195.006792] Hardware name: Red Hat KVM/RHEL, BIOS edk2-20221207gitfff6d81270b5-2.el9 unknown [ 195.007556] Workqueue: kacpi_hotplug acpi_hotplug_work_fn [ 195.008059] RIP: 0010:ioread8+0x31/0x80 [ 195.008418] Code: 77 28 48 81 ff 00 00 01 00 76 0b 89 fa ec 0f b6 c0 c3 cc cc cc cc 8b 15 ad 72 93 01 b8 ff 00 00 00 85 d2 75 0f c3 cc cc cc cc <8a> 07 0f b6 c0 c3 cc cc cc cc 83 ea 01 48 83 ec 08 48 89 fe 48 c7 [ 195.010104] RSP: 0018:ff4e8beb8067bab8 EFLAGS: 00010292 [ 195.010584] RAX: ffffffffc05834a0 RBX: ffffffffc05843c0 RCX: ff4e8beb8067bae0 [ 195.011233] RDX: ff1bcbd580f88000 RSI: 0000000000000246 RDI: ff4e8beb80199014 [ 195.011881] RBP: ff1bcbd587e39000 R08: ffffffff916fa2d0 R09: ff4e8beb8067ba68 [ 195.012527] R10: 000000000000001c R11: 0000000000000000 R12: ff1bcbd5a3de9120 [ 195.013179] R13: ffffffffc062d000 R14: 0000000000000080 R15: ff1bcbe402bc7805 [ 195.013826] FS: 0000000000000000(0000) GS:ff1bcbe402740000(0000) knlGS:0000000000000000 [ 195.014564] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 195.015093] CR2: ff4e8beb80199014 CR3: 0000000107dea002 CR4: 0000000000771ee0 [ 195.015741] PKRU: 55555554 [ 195.016001] Call Trace: [ 195.016233] <TASK> [ 195.016434] vp_modern_get_status+0x12/0x20 [ 195.016823] vp_vdpa_reset+0x1b/0x50 [vp_vdpa] [ 195.017238] virtio_vdpa_reset+0x3c/0x48 [virtio_vdpa] [ 195.017709] remove_vq_common+0x1f/0x3a0 [virtio_net] [ 195.018178] virtnet_remove+0x5d/0x70 [virtio_net] [ 195.018618] virtio_dev_remove+0x3d/0x90 [ 195.018986] device_release_driver_internal+0x1aa/0x230 [ 195.019466] bus_remove_device+0xd8/0x150 [ 195.019841] device_del+0x18b/0x3f0 [ 195.020167] ? kernfs_find_ns+0x35/0xd0 [ 195.020526] device_unregister+0x13/0x60 [ 195.020894] unregister_virtio_device+0x11/0x20 [ 195.021311] device_release_driver_internal+0x1aa/0x230 [ 195.021790] bus_remove_device+0xd8/0x150 [ 195.022162] device_del+0x18b/0x3f0 [ 195.022487] device_unregister+0x13/0x60 [ 195.022852] ? vdpa_dev_remove+0x30/0x30 [vdpa] [ 195.023270] vp_vdpa_dev_del+0x12/0x20 [vp_vdpa] [ 195.023694] vdpa_match_remove+0x2b/0x40 [vdpa] [ 195.024115] bus_for_each_dev+0x78/0xc0 [ 195.024471] vdpa_mgmtdev_unregister+0x65/0x80 [vdpa] [ 195.024937] vp_vdpa_remove+0x23/0x40 [vp_vdpa] [ 195.025353] pci_device_remove+0x36/0xa0 [ 195.025719] device_release_driver_internal+0x1aa/0x230 [ 195.026201] pci_stop_bus_device+0x6c/0x90 [ 195.026580] pci_stop_and_remove_bus_device+0xe/0x20 [ 195.027039] disable_slot+0x49/0x90 [ 195.027366] acpiphp_disable_and_eject_slot+0x15/0x90 [ 195.027832] hotplug_event+0xea/0x210 [ 195.028171] ? hotplug_event+0x210/0x210 [ 195.028535] acpiphp_hotplug_notify+0x22/0x80 [ 195.028942] ? hotplug_event+0x210/0x210 [ 195.029303] acpi_device_hotplug+0x8a/0x1d0 [ 195.029690] acpi_hotplug_work_fn+0x1a/0x30 [ 195.030077] process_one_work+0x1e8/0x3c0 [ 195.030451] worker_thread+0x50/0x3b0 [ 195.030791] ? rescuer_thread+0x3a0/0x3a0 [ 195.031165] kthread+0xd9/0x100 [ 195.031459] ? kthread_complete_and_exit+0x20/0x20 [ 195.031899] ret_from_fork+0x22/0x30 [ 195.032233] </TASK> ### Affected Products **Linux - Linux** Affected versions: - ffbda8e9df10d1784d5427ec199e7d8308e3763f (Status: affected) - ffbda8e9df10d1784d5427ec199e7d8308e3763f (Status: affected) - ffbda8e9df10d1784d5427ec199e7d8308e3763f (Status: affected) **Linux - Linux** Affected versions: - 5.19 (Status: affected) - 0 (Status: unaffected) - 6.1.21 (Status: unaffected) - 6.2.8 (Status: unaffected) - 6.3 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/baafa2960731211837d8fc04ff3873ecb7440464) 2. [](https://git.kernel.org/stable/c/fa1f327f93c9a7310cce9d2fcda28b7af91f7437) 3. [](https://git.kernel.org/stable/c/aed8efddd39b3434c96718d39009285c52b1cafc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17016 - **State**: PUBLISHED - **Published Date**: January 08, 2020 at 21:27 UTC - **Last Updated**: August 05, 2024 at 01:24 UTC - **Reserved Date**: September 30, 2019 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description When pasting a &lt;style&gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72. ### Affected Products **Mozilla - Firefox ESR** Affected versions: - before 68.4 (Status: affected) **Mozilla - Firefox** Affected versions: - before 72 (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1599181) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-01/) 3. [](https://www.mozilla.org/security/advisories/mfsa2020-02/) 4. [20200109 [SECURITY] [DSA 4600-1] firefox-esr security update](https://seclists.org/bugtraq/2020/Jan/12) 5. [[debian-lts-announce] 20200109 [SECURITY] [DLA 2061-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html) 6. [DSA-4600](https://www.debian.org/security/2020/dsa-4600) 7. [USN-4234-1](https://usn.ubuntu.com/4234-1/) 8. [20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)](https://seclists.org/bugtraq/2020/Jan/18) 9. [RHSA-2020:0085](https://access.redhat.com/errata/RHSA-2020:0085) 10. [RHSA-2020:0086](https://access.redhat.com/errata/RHSA-2020:0086) 11. [](http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html) 12. [RHSA-2020:0111](https://access.redhat.com/errata/RHSA-2020:0111) 13. [openSUSE-SU-2020:0060](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html) 14. [RHSA-2020:0120](https://access.redhat.com/errata/RHSA-2020:0120) 15. [RHSA-2020:0123](https://access.redhat.com/errata/RHSA-2020:0123) 16. [RHSA-2020:0127](https://access.redhat.com/errata/RHSA-2020:0127) 17. [USN-4241-1](https://usn.ubuntu.com/4241-1/) 18. [DSA-4603](https://www.debian.org/security/2020/dsa-4603) 19. [20200120 [SECURITY] [DSA 4603-1] thunderbird security update](https://seclists.org/bugtraq/2020/Jan/26) 20. [[debian-lts-announce] 20200120 [SECURITY] [DLA 2071-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html) 21. [openSUSE-SU-2020:0094](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html) 22. [RHSA-2020:0292](https://access.redhat.com/errata/RHSA-2020:0292) 23. [RHSA-2020:0295](https://access.redhat.com/errata/RHSA-2020:0295) 24. [GLSA-202003-02](https://security.gentoo.org/glsa/202003-02) 25. [USN-4335-1](https://usn.ubuntu.com/4335-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31576 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 12:55 UTC - **Last Updated**: March 31, 2025 at 16:22 UTC - **Reserved Date**: March 31, 2025 at 10:05 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Gagan Deep Singh PostmarkApp Email Integrator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PostmarkApp Email Integrator: from n/a through 2.4. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Gagan Deep Singh - PostmarkApp Email Integrator** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/postmarkapp-email-integrator/vulnerability/wordpress-postmarkapp-email-integrator-plugin-2-4-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1676 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 11:00 UTC - **Last Updated**: February 25, 2025 at 13:53 UTC - **Reserved Date**: February 25, 2025 at 06:46 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. The manipulation of the argument file leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection - CWE-77: Security Weakness ### Affected Products **hzmanyun - Education and Training System** Affected versions: - 3.1.1 (Status: affected) ### References 1. [VDB-296731 | hzmanyun Education and Training System pdf2swf os command injection](https://vuldb.com/?id.296731) 2. [VDB-296731 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.296731) 3. [Submit #500507 | hzmanyun education and training system v3.1.1 RCE](https://vuldb.com/?submit.500507) 4. [](https://github.com/Rain1er/report/blob/main/nxb/rce1.md) ### Credits - 0xGeoffreyW (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4267 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:11 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6. ### Affected Products **n/a - iOS, tvOS, Safari, iTunes for Windows, iCloud for Windows** Affected versions: - Versions prior to: iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT208933) 2. [](https://support.apple.com/kb/HT208938) 3. [](https://support.apple.com/kb/HT208936) 4. [](https://support.apple.com/kb/HT208934) 5. [](https://support.apple.com/kb/HT208932)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0239 - **State**: PUBLISHED - **Published Date**: January 18, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 16:25 UTC - **Reserved Date**: January 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Simple Blog 2.1 allow remote attackers to inject arbitrary web script or HTML via (1) a comment to comments.asp and (2) possibly certain other fields in unspecified scripts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-0194](http://www.vupen.com/english/advisories/2006/0194) 2. [](http://www.hackerscenter.com/archive/view.asp?id=21926) 3. [16243](http://www.securityfocus.com/bid/16243) 4. [22448](http://www.osvdb.org/22448) 5. [simpleblog-comment-xss(24154)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24154) 6. [20060114 [HSC Security Group] Multiple SQL injection/XSS in SimpleBlog 2.1](http://www.securityfocus.com/archive/1/422102/100/0/threaded) 7. [18488](http://secunia.com/advisories/18488)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4716 - **State**: PUBLISHED - **Published Date**: May 10, 2024 at 13:00 UTC - **Last Updated**: August 01, 2024 at 20:47 UTC - **Reserved Date**: May 10, 2024 at 05:37 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in Campcodes Complete Web-Based School Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /model/update_exam.php. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263794 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-263794 | Campcodes Complete Web-Based School Management System update_exam.php cross site scripting](https://vuldb.com/?id.263794) 2. [VDB-263794 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263794) 3. [Submit #331882 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.331882) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2039.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0634 - **State**: PUBLISHED - **Published Date**: February 08, 2013 at 11:00 UTC - **Last Updated**: August 06, 2024 at 14:33 UTC - **Reserved Date**: December 18, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, as exploited in the wild in February 2013. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.adobe.com/support/security/bulletins/apsb13-04.html) 2. [RHSA-2013:0243](http://rhn.redhat.com/errata/RHSA-2013-0243.html) 3. [openSUSE-SU-2013:0279](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html) 4. [SUSE-SU-2013:0288](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html) 5. [openSUSE-SU-2013:0284](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00006.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1307 - **State**: PUBLISHED - **Published Date**: October 10, 2019 at 13:28 UTC - **Last Updated**: August 04, 2024 at 18:13 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366. ### Affected Products **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2016** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1703 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1703 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2019** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - ChakraCore** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10778 - **State**: PUBLISHED - **Published Date**: May 07, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 07:46 UTC - **Reserved Date**: May 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Read access violation in the III_dequantize_sample function in mpglibDBL/layer3.c in mp3gain through 1.5.2-r2 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, a different vulnerability than CVE-2017-9872 and CVE-2017-14409. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.google.com/document/d/11qVnW4frI-9PGRVkSOGb9IaF3ylzrc32bJXyO1OsfQM/edit)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48764 - **State**: PUBLISHED - **Published Date**: December 19, 2023 at 20:39 UTC - **Last Updated**: August 02, 2024 at 21:37 UTC - **Reserved Date**: November 18, 2023 at 22:10 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GuardGiant Brute Force Protection WordPress Brute Force Protection – Stop Brute Force Attacks.This issue affects WordPress Brute Force Protection – Stop Brute Force Attacks: from n/a through 2.2.5. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **GuardGiant Brute Force Protection - WordPress Brute Force Protection – Stop Brute Force Attacks** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/guardgiant/wordpress-wordpress-brute-force-protection-stop-brute-force-attacks-plugin-2-2-5-sql-injection-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27533 - **State**: PUBLISHED - **Published Date**: October 22, 2020 at 14:53 UTC - **Last Updated**: August 04, 2024 at 16:18 UTC - **Reserved Date**: October 21, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross Site Scripting (XSS) issue was discovered in the search feature of DedeCMS v.5.8 that allows malicious users to inject code into web pages, and other users will be affected when viewing web pages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/dedetech/issues/issues/16) 2. [](http://packetstormsecurity.com/files/159772/DedeCMS-5.8-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1926 - **State**: PUBLISHED - **Published Date**: April 29, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 15:20 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92543](http://osvdb.org/92543) 2. [SUSE-SU-2013:0851](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html) 3. [openSUSE-SU-2013:0897](http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html) 4. [icedtea-cve20131940-security-bypass(83642)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83642) 5. [MDVSA-2013:146](http://www.mandriva.com/security/advisories?name=MDVSA-2013:146) 6. [SUSE-SU-2013:1174](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html) 7. [53109](http://secunia.com/advisories/53109) 8. [](http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/34b6f60ae586) 9. [openSUSE-SU-2013:0826](http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html) 10. [openSUSE-SU-2013:0735](http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html) 11. [53117](http://secunia.com/advisories/53117) 12. [RHSA-2013:0753](http://rhn.redhat.com/errata/RHSA-2013-0753.html) 13. [openSUSE-SU-2013:0966](http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html) 14. [openSUSE-SU-2013:0893](http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html) 15. [](http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/25dd7c7ac39c) 16. [USN-1804-1](http://www.ubuntu.com/usn/USN-1804-1) 17. [](http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS) 18. [59281](http://www.securityfocus.com/bid/59281) 19. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123) 20. [openSUSE-SU-2013:0715](http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html) 21. [](https://bugzilla.redhat.com/show_bug.cgi?id=916774) 22. [[distro-pkg-dev] 20130417 IcedTea-Web 1.3.2 and 1.2.3 released!](http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5804 - **State**: PUBLISHED - **Published Date**: July 20, 2024 at 02:02 UTC - **Last Updated**: August 01, 2024 at 21:25 UTC - **Reserved Date**: June 10, 2024 at 16:40 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Conditional Fields for Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.13. This is due to missing or incorrect nonce validation on the wpcf7cf_admin_init function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **jules-colle - Conditional Fields for Contact Form 7** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/827c5dc2-3195-47d9-9e44-ca2043748eed?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/cf7-conditional-fields/trunk/wpcf7cf-options.php#L285) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3121497%40cf7-conditional-fields&new=3121497%40cf7-conditional-fields&sfp_email=&sfph_mail=) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4846 - **State**: PUBLISHED - **Published Date**: December 19, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 20:50 UTC - **Reserved Date**: September 06, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Lotus Notes 8.5.x before 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and SRAO8U3Q68. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [lotus-notes-httponly-info-disc(79535)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79535) 2. [](http://www.ibm.com/support/docview.wss?uid=swg21620361) 3. [](http://www.ibm.com/support/docview.wss?uid=swg21619604)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36218 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 07:53 UTC - **Last Updated**: October 07, 2024 at 13:23 UTC - **Reserved Date**: May 21, 2024 at 17:07 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3475 - **State**: PUBLISHED - **Published Date**: March 30, 2021 at 00:00 UTC - **Last Updated**: August 03, 2024 at 16:53 UTC - **Reserved Date**: March 29, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability. ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **n/a - OpenEXR** Affected versions: - OpenEXR 3.0.0-beta (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939144) 2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297) 3. [[debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html) 4. [GLSA-202107-27](https://security.gentoo.org/glsa/202107-27) 5. [[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3509 - **State**: PUBLISHED - **Published Date**: August 07, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 09:45 UTC - **Reserved Date**: August 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description LoveCMS 1.6.2 does not require administrative authentication for (1) addblock.php, (2) blocks.php, and (3) themes.php in system/admin/, which allows remote attackers to change the configuration or execute arbitrary PHP code via addition of blocks, and other vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6210](https://www.exploit-db.com/exploits/6210) 2. [31389](http://secunia.com/advisories/31389) 3. [6209](https://www.exploit-db.com/exploits/6209) 4. [lovecms-addblock-security-bypass(44226)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44226) 5. [30562](http://www.securityfocus.com/bid/30562) 6. [lovecms-addblock-code-execution(44227)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44227)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6515 - **State**: PUBLISHED - **Published Date**: July 22, 2020 at 16:16 UTC - **Last Updated**: August 04, 2024 at 09:02 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1082755) 3. [openSUSE-SU-2020:1061](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html) 4. [GLSA-202007-08](https://security.gentoo.org/glsa/202007-08) 5. [FEDORA-2020-bf684961d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/) 6. [FEDORA-2020-84d87cbd50](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/) 7. [openSUSE-SU-2020:1148](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html) 8. [openSUSE-SU-2020:1172](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html) 9. [openSUSE-SU-2020:1048](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html) 10. [DSA-4824](https://www.debian.org/security/2021/dsa-4824)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2437 - **State**: PUBLISHED - **Published Date**: April 02, 2017 at 01:36 UTC - **Last Updated**: August 05, 2024 at 13:55 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "IOFireWireAVC" component. It allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [97140](http://www.securityfocus.com/bid/97140) 2. [](https://support.apple.com/HT207615) 3. [1038138](http://www.securitytracker.com/id/1038138)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20365 - **State**: PUBLISHED - **Published Date**: January 08, 2020 at 16:27 UTC - **Last Updated**: August 05, 2024 at 02:39 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An XSS issue was discovered in Ignite Realtime Openfire 4.4.4 via search to the Users/Group search page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://issues.igniterealtime.org/browse/OF-1955) 2. [](https://github.com/igniterealtime/Openfire/pull/1561) 3. [](https://cybersecurityworks.com/zerodays/cve-2019-20365-openfire.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7839 - **State**: PUBLISHED - **Published Date**: August 15, 2024 at 21:00 UTC - **Last Updated**: August 16, 2024 at 16:04 UTC - **Reserved Date**: August 15, 2024 at 14:46 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in itsourcecode Billing System 1.0. This affects an unknown part of the file addbill.php. The manipulation of the argument owners_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **itsourcecode - Billing System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-274743 | itsourcecode Billing System addbill.php sql injection](https://vuldb.com/?id.274743) 2. [VDB-274743 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.274743) 3. [Submit #391531 | Itsourcecode Billing System V1.0 SQL Injection](https://vuldb.com/?submit.391531) 4. [](https://github.com/ppp-src/a/issues/2) ### Credits - wudongG (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34225 - **State**: PUBLISHED - **Published Date**: May 13, 2024 at 17:46 UTC - **Last Updated**: February 13, 2025 at 15:53 UTC - **Reserved Date**: May 02, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting vulnerability in php-lms/admin/?page=system_info in Computer Laboratory Management System using PHP and MySQL 1.0 allow remote attackers to inject arbitrary web script or HTML via the name, shortname parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/dovankha/CVE-2024-34225)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2959 - **State**: PUBLISHED - **Published Date**: March 30, 2025 at 20:31 UTC - **Last Updated**: March 31, 2025 at 14:29 UTC - **Reserved Date**: March 29, 2025 at 19:51 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in TRENDnet TEW-410APB 1.3.06b. It has been rated as problematic. Affected by this issue is the function sub_4019A0 of the file /usr/sbin/httpd of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference - CWE-404: Security Weakness ### Affected Products **TRENDnet - TEW-410APB** Affected versions: - 1.3.06b (Status: affected) ### References 1. [VDB-302012 | TRENDnet TEW-410APB HTTP Request httpd sub_4019A0 null pointer dereference](https://vuldb.com/?id.302012) 2. [VDB-302012 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.302012) 3. [Submit #521725 | TRENDnet wi-fi access point firmware_tew_410apbplus_1.3.06b NULL Pointer Dereference](https://vuldb.com/?submit.521725) 4. [](https://docs.google.com/document/d/1PcJZQ364MQxz1eUt6PLnWIQYTLNuJ5_3/edit#heading=h.gjdgxs) 5. [](https://drive.google.com/file/d/1idRNkvFHyh5vOxw2VIs2wcwdVOVLuqkG/view?usp=drive_link) ### Credits - zhongwei gu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32591, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32591 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32591 - **State**: PUBLISHED - **Published Date**: August 25, 2023 at 08:57 UTC - **Last Updated**: September 24, 2024 at 19:26 UTC - **Reserved Date**: May 10, 2023 at 09:25 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Cloud Primero B.V DBargain plugin <= 3.0.0 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cloud Primero B.V - DBargain** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/d-bargain/wordpress-dbargain-plugin-3-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Mahesh Nagabhairava (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1448 - **State**: PUBLISHED - **Published Date**: April 29, 2021 at 17:30 UTC - **Last Updated**: November 08, 2024 at 23:24 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected device that is running in multi-instance mode. This vulnerability is due to insufficient validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - n/a (Status: affected) ### References 1. [20210428 Cisco Firepower Threat Defense Software Command Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinj-vWY5wqZT)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4454 - **State**: PUBLISHED - **Published Date**: December 29, 2009 at 22:00 UTC - **Last Updated**: August 07, 2024 at 07:01 UTC - **Reserved Date**: December 29, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description vccleaner in VideoCache 1.9.2 allows local users with Squid proxy user privileges to overwrite arbitrary files via a symlink attack on /var/log/videocache/vccleaner.log. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20091216 VideoCache 1.9.2 vccleaner root vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0366.html) 2. [20091216 VideoCache 1.9.2 vccleaner root vulnerability](http://www.securityfocus.com/archive/1/508507/100/0/threaded) 3. [videocache-vccleaner-symlink(54916)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54916) 4. [37733](http://secunia.com/advisories/37733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11952 - **State**: PUBLISHED - **Published Date**: July 14, 2020 at 13:01 UTC - **Last Updated**: August 04, 2024 at 11:42 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. Attackers can bypass the CLI menu. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4528 - **State**: PUBLISHED - **Published Date**: October 06, 2020 at 15:45 UTC - **Last Updated**: September 16, 2024 at 16:28 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM MQ Appliance (IBM DataPower Gateway 10.0.0.0 and 2018.4.1.0 through 2018.4.1.12) could allow a local user, under special conditions, to obtain highly sensitive information from log files. IBM X-Force ID: 182658. ### Affected Products **IBM - DataPower Gateway** Affected versions: - 2018.4.1.0 (Status: affected) - 2018.4.1.12 (Status: affected) - 10.0.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6333033) 2. [ibm-mq-cve20204528-info-disc (182658)](https://exchange.xforce.ibmcloud.com/vulnerabilities/182658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0007 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:35 UTC - **Reserved Date**: January 09, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CGI.pl in Bugzilla before 2.14.1, when using LDAP, allows remote attackers to obtain an anonymous bind to the LDAP server via a request that does not include a password, which causes a null password to be sent to the LDAP server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2002:001](http://rhn.redhat.com/errata/RHSA-2002-001.html) 2. [20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older](http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html) 3. [](http://www.bugzilla.org/security2_14_1.html) 4. [](http://bugzilla.mozilla.org/show_bug.cgi?id=54901) 5. [bugzilla-ldap-auth-bypass(7812)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7812) 6. [3792](http://www.securityfocus.com/bid/3792)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1534 - **State**: PUBLISHED - **Published Date**: March 28, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 08:24 UTC - **Reserved Date**: March 28, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in PowerPHPBoard 1.00b allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) settings[footer] parameter to footer.inc.php and the (2) settings[header] parameter to header.inc.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [powerphpboard-footerheader-file-include(41403)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41403) 2. [3782](http://securityreason.com/securityalert/3782) 3. [5303](https://www.exploit-db.com/exploits/5303) 4. [20080324 [DSECRG-08-021] Multiple LFI in PowerPHPBoard 1.00b](http://www.securityfocus.com/archive/1/490011/100/0/threaded) 5. [28421](http://www.securityfocus.com/bid/28421) 6. [ADV-2008-0992](http://www.vupen.com/english/advisories/2008/0992/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0292 - **State**: PUBLISHED - **Published Date**: August 30, 2016 at 17:00 UTC - **Last Updated**: August 05, 2024 at 22:15 UTC - **Reserved Date**: December 08, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description WebReports in IBM BigFix Platform (formerly Tivoli Endpoint Manager) 9.x before 9.5.2 allows local users to discover the cleartext system password by reading a report. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21985907)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37269, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37269 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37269 - **State**: PUBLISHED - **Published Date**: July 07, 2023 at 21:19 UTC - **Last Updated**: February 13, 2025 at 16:56 UTC - **Reserved Date**: June 29, 2023 at 19:35 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Users with the `backend.manage_branding` permission can upload SVGs as the application logo. Prior to version 1.2.3, SVG uploads were not sanitized, which could have allowed a stored cross-site scripting (XSS) attack. To exploit the vulnerability, an attacker would already need to have developer or super user level permissions in Winter CMS. This means they would already have extensive access and control within the system. Additionally, to execute the XSS, the attacker would need to convince the victim to directly visit the URL of the maliciously uploaded SVG, and the application would have to be using local storage where uploaded files are served under the same domain as the application itself instead of a CDN. This is because all SVGs in Winter CMS are rendered through an `img` tag, which prevents any payloads from being executed directly. These two factors significantly limit the potential harm of this vulnerability. This issue has been patched in v1.2.3 through the inclusion of full support for SVG uploads and automatic sanitization of uploaded SVG files. As a workaround, one may apply the patches manually. ### CVSS Metrics - **CVSS Base Score**: 2/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wintercms - winter** Affected versions: - < 1.2.3 (Status: affected) ### References 1. [https://github.com/wintercms/winter/security/advisories/GHSA-wjw2-4j7j-6gc3](https://github.com/wintercms/winter/security/advisories/GHSA-wjw2-4j7j-6gc3) 2. [https://github.com/wintercms/storm/commit/186d85d8fea2cae43afc807d39f68553c24e56be](https://github.com/wintercms/storm/commit/186d85d8fea2cae43afc807d39f68553c24e56be) 3. [https://github.com/wintercms/winter/commit/fa50b4c7489b67ea80072f8ac9fe5294fce1df1c](https://github.com/wintercms/winter/commit/fa50b4c7489b67ea80072f8ac9fe5294fce1df1c) 4. [https://github.com/wintercms/winter/releases/tag/v1.2.3](https://github.com/wintercms/winter/releases/tag/v1.2.3) 5. [](http://packetstormsecurity.com/files/173520/WinterCMS-1.2.2-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26129 - **State**: PUBLISHED - **Published Date**: March 03, 2022 at 17:24 UTC - **Last Updated**: February 13, 2025 at 16:32 UTC - **Reserved Date**: February 25, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - FRRouting** Affected versions: - through 8.1.0 (Status: affected) ### References 1. [](https://github.com/FRRouting/frr/issues/10503) 2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12692 - **State**: PUBLISHED - **Published Date**: September 01, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 18:43 UTC - **Reserved Date**: August 08, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3681-1](https://usn.ubuntu.com/3681-1/) 2. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07) 3. [](https://github.com/ImageMagick/ImageMagick/issues/653) 4. [[debian-lts-announce] 20190514 [SECURITY] [DLA 1785-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html) 5. [[debian-lts-announce] 20200907 [SECURITY] [DLA 2366-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20955 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 25, 2025 at 16:34 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In onPrepareOptionsMenu of AppInfoDashboardFragment.java, there is a possible way to bypass admin restrictions and uninstall applications for all users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258653813 ### Affected Products **n/a - Android** Affected versions: - Android-11 Android-12 Android-12L Android-13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2023-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23919 - **State**: PUBLISHED - **Published Date**: November 13, 2024 at 21:06 UTC - **Last Updated**: November 14, 2024 at 19:46 UTC - **Reserved Date**: March 13, 2024 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper buffer restrictions in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-92: Security Weakness ### Affected Products **n/a - Intel(R) Graphics software** Affected versions: - See references (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01132.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01132.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4813 - **State**: PUBLISHED - **Published Date**: December 14, 2011 at 00:00 UTC - **Last Updated**: September 16, 2024 at 18:43 UTC - **Reserved Date**: December 13, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in clientarea.php in WHMCompleteSolution (WHMCS) 3.x.x allows remote attackers to read arbitrary files via an invalid action and a ../ (dot dot slash) in the templatefile parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18081](http://www.exploit-db.com/exploits/18081)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1973 - **State**: PUBLISHED - **Published Date**: July 22, 2010 at 01:00 UTC - **Last Updated**: September 16, 2024 at 16:12 UTC - **Reserved Date**: May 19, 2010 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in the Auditing subsystem in HP OpenVMS 8.3, 8.2, 7.3-2, and earlier on the ALPHA platform, and 8.3-1H1, 8.3, 8.2-1, and earlier on the Itanium platform, allows local users to gain privileges or obtain sensitive information via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBOV02539](http://marc.info/?l=bugtraq&m=127905660900687&w=2) 2. [1024190](http://securitytracker.com/id?1024190) 3. [SSRT090267](http://marc.info/?l=bugtraq&m=127905660900687&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6540 - **State**: PUBLISHED - **Published Date**: January 03, 2024 at 21:01 UTC - **Last Updated**: August 02, 2024 at 08:35 UTC - **Reserved Date**: December 05, 2023 at 23:58 UTC - **Assigned By**: lenovo ### Vulnerability Description A vulnerability was reported in the Lenovo Browser Mobile and Lenovo Browser HD Apps for Android that could allow an attacker to craft a payload that could result in the disclosure of sensitive information. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Lenovo - Lenovo Browser Mobile** Affected versions: - (Status: affected) **Lenovo - Lenovo Browser HD** Affected versions: - (Status: affected) ### References 1. [](https://iknow.lenovo.com.cn/detail/419251) ### Credits - Lenovo thanks CNVD for reporting this vulnerability
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25165, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25165 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25165 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 13:30 UTC - **Last Updated**: March 03, 2025 at 17:35 UTC - **Reserved Date**: February 03, 2025 at 13:35 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Staff Directory Plugin: Company Directory allows Stored XSS. This issue affects Staff Directory Plugin: Company Directory: from n/a through 4.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **NotFound - Staff Directory Plugin: Company Directory** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/staff-directory-pro/vulnerability/wordpress-staff-directory-plugin-company-directory-plugin-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2462 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: March 13, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3420 - **State**: PUBLISHED - **Published Date**: October 31, 2022 at 00:00 UTC - **Last Updated**: May 06, 2025 at 20:09 UTC - **Reserved Date**: October 07, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Official Integration for Billingo WordPress plugin before 3.4.0 does not sanitise and escape some of its settings, which could allow high privilege users with a role as low as Shop Manager to perform Stored Cross-Site Scripting attacks. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Official Integration for Billingo** Affected versions: - 3.4.0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/ce5fac6e-8da1-4042-9cf8-7988613f92a5) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7502 - **State**: PUBLISHED - **Published Date**: April 11, 2016 at 21:00 UTC - **Last Updated**: August 06, 2024 at 07:51 UTC - **Reserved Date**: September 29, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 and CloudForms 4.0 Management Engine (CFME) 5.5.0 do not properly encrypt data in the backend PostgreSQL database, which might allow local users to obtain sensitive data and consequently gain privileges by leveraging access to (1) database exports or (2) log files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2015:2551](https://access.redhat.com/errata/RHSA-2015:2551) 2. [RHSA-2015:2620](http://rhn.redhat.com/errata/RHSA-2015-2620.html) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1283019)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21924 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 20:18 UTC - **Last Updated**: February 11, 2025 at 20:52 UTC - **Reserved Date**: January 03, 2024 at 16:43 UTC - **Assigned By**: AMD ### Vulnerability Description SMM callout vulnerability within the AmdPlatformRasSspSmm driver could allow a ring 0 attacker to modify boot services handlers, potentially resulting in arbitrary code execution. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-250: Security Weakness ### Affected Products **AMD - AMD EPYC™ 7002 Processors** Affected versions: - Rome PI 1.0.0.K (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors** Affected versions: - ChagallWSPI-sWRX8 1.0.0.9 (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors** Affected versions: - CastlePeakWSPI-sWRX8 1.0.0.E (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 5000WX- Series Desktop Processors** Affected versions: - ChagallWSPI-sWRX8 1.0.0.9 (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors** Affected versions: - StormPeakPI-SP6 1.1.0.0h (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors** Affected versions: - StormPeakPI-SP6 1.0.0.1j (Status: unaffected) **AMD - AMD EPYC™ Embedded 7002 Processors** Affected versions: - EmbRomePI-SP3 1.0.0.D (Status: unaffected) ### References 1. [](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7028.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18348, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18348 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18348 - **State**: PUBLISHED - **Published Date**: December 11, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 11:08 UTC - **Reserved Date**: October 15, 2018 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html) 2. [RHSA-2018:3803](https://access.redhat.com/errata/RHSA-2018:3803) 3. [DSA-4352](https://www.debian.org/security/2018/dsa-4352) 4. [106084](http://www.securityfocus.com/bid/106084) 5. [](https://crbug.com/881659) 6. [GLSA-201908-18](https://security.gentoo.org/glsa/201908-18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10280, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10280 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10280 - **State**: PUBLISHED - **Published Date**: October 23, 2024 at 13:31 UTC - **Last Updated**: October 23, 2024 at 17:41 UTC - **Reserved Date**: October 23, 2024 at 06:02 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Tenda - AC6** Affected versions: - 20241022 (Status: affected) **Tenda - AC7** Affected versions: - 20241022 (Status: affected) **Tenda - AC8** Affected versions: - 20241022 (Status: affected) **Tenda - AC9** Affected versions: - 20241022 (Status: affected) **Tenda - AC10** Affected versions: - 20241022 (Status: affected) **Tenda - AC10U** Affected versions: - 20241022 (Status: affected) **Tenda - AC15** Affected versions: - 20241022 (Status: affected) **Tenda - AC18** Affected versions: - 20241022 (Status: affected) **Tenda - AC500** Affected versions: - 20241022 (Status: affected) **Tenda - AC1206** Affected versions: - 20241022 (Status: affected) ### References 1. [VDB-281555 | Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference](https://vuldb.com/?id.281555) 2. [VDB-281555 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.281555) 3. [Submit #426417 | Tenda AC8v4 V16.03.34.06 NULL Pointer Dereference](https://vuldb.com/?submit.426417) 4. [](https://github.com/JohenanLi/router_vuls/blob/main/websReadEvent/websReadEvent.md) 5. [](https://www.tenda.com.cn/) ### Credits - minipython (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40354 - **State**: PUBLISHED - **Published Date**: August 14, 2023 at 00:00 UTC - **Last Updated**: October 09, 2024 at 14:52 UTC - **Reserved Date**: August 14, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in MariaDB MaxScale before 23.02.3. A user enters an encrypted password on a "maxctrl create service" command line, but this password is then stored in cleartext in the resulting .cnf file under /var/lib/maxscale/maxscale.cnf.d. The fixed versions are 2.5.28, 6.4.9, 22.08.8, and 23.02.3. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jira.mariadb.org/browse/MXS-4681)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27158 - **State**: PUBLISHED - **Published Date**: March 11, 2025 at 18:10 UTC - **Last Updated**: March 12, 2025 at 13:08 UTC - **Reserved Date**: February 19, 2025 at 22:28 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-824: Security Weakness ### Affected Products **Adobe - Acrobat Reader** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb25-14.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0052 - **State**: PUBLISHED - **Published Date**: February 02, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:06 UTC - **Reserved Date**: February 01, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IBM DB2 Universal Database version 6.1 allows users to cause a denial of service via a malformed query. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ibm-db2-dos(5664)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5664) 2. [2067](http://www.securityfocus.com/bid/2067) 3. [20001205 IBM DB2 SQL DOS](http://www.securityfocus.com/archive/1/149207)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15157 - **State**: REJECTED - **Published Date**: November 05, 2020 at 22:30 UTC - **Last Updated**: November 05, 2020 at 22:30 UTC - **Reserved Date**: October 08, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1285 - **State**: PUBLISHED - **Published Date**: April 14, 2023 at 02:17 UTC - **Last Updated**: February 06, 2025 at 20:57 UTC - **Reserved Date**: March 09, 2023 at 08:05 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-364: Security Weakness ### Affected Products **Mitsubishi Electric India - GC-ENET-COM** Affected versions: - SN:16XXXXXXXXX (Status: affected) ### References 1. [](https://mitsubishielectric.in/fa/cnc-pdf/DoS_in_Ethernet_Communication_Extension_Unit_GC_ENET_COM_of_GOC35_Series.pdf) 2. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8825 - **State**: PUBLISHED - **Published Date**: October 27, 2020 at 19:51 UTC - **Last Updated**: August 04, 2024 at 21:31 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 10.7, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, iCloud for Windows 7.14, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT210634) 2. [](https://support.apple.com/en-us/HT210722) 3. [](https://support.apple.com/en-us/HT210606) 4. [](https://support.apple.com/en-us/HT210635) 5. [](https://support.apple.com/en-us/HT210636) 6. [](https://support.apple.com/en-us/HT210637)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24114, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24114 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24114 - **State**: PUBLISHED - **Published Date**: February 04, 2022 at 22:29 UTC - **Last Updated**: September 17, 2024 at 03:07 UTC - **Reserved Date**: January 28, 2022 at 00:00 UTC - **Assigned By**: Acronis ### Vulnerability Description Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287 ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Acronis - Acronis Cyber Protect Home Office** Affected versions: - unspecified (Status: affected) **Acronis - Acronis True Image 2021** Affected versions: - unspecified (Status: affected) ### References 1. [](https://security-advisory.acronis.com/advisories/SEC-3316) ### Credits - @vkas-afk (https://hackerone.com/vkas-afk)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43318 - **State**: PUBLISHED - **Published Date**: August 18, 2024 at 14:15 UTC - **Last Updated**: August 19, 2024 at 13:39 UTC - **Reserved Date**: August 09, 2024 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E2Pdf.Com allows Stored XSS.This issue affects e2pdf: from n/a through 1.25.05. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **E2Pdf.com - e2pdf** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/e2pdf/wordpress-e2pdf-export-to-pdf-tool-for-wordpress-plugin-1-25-05-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2251 - **State**: PUBLISHED - **Published Date**: July 13, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:22 UTC - **Reserved Date**: July 13, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in secure.php in PHPSecurePages (phpSP) 0.28beta and earlier allows remote attackers to execute arbitrary code via the cfgProgDir parameter, a variant of CVE-2001-1468. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [phpsecurepages-secure-file-include(29263)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29263) 2. [15994](http://secunia.com/advisories/15994) 3. [1014410](http://securitytracker.com/id?1014410) 4. [2452](https://www.exploit-db.com/exploits/2452) 5. [14201](http://www.securityfocus.com/bid/14201)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37961, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37961 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37961 - **State**: PUBLISHED - **Published Date**: October 08, 2021 at 21:30 UTC - **Last Updated**: August 04, 2024 at 01:30 UTC - **Reserved Date**: August 03, 2021 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html) 2. [](https://crbug.com/1228557) 3. [FEDORA-2021-ab09a05562](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/) 4. [FEDORA-2021-591b3a2af0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/) 5. [DSA-5046](https://www.debian.org/security/2022/dsa-5046)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9737 - **State**: PUBLISHED - **Published Date**: March 13, 2019 at 02:00 UTC - **Last Updated**: August 04, 2024 at 22:01 UTC - **Reserved Date**: March 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Editor.md 1.5.0 has DOM-based XSS via vectors involving the '<EMBED SRC="data:image/svg+xml' substring. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pandao/editor.md/issues/662)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21647 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 09:14 UTC - **Last Updated**: August 02, 2024 at 09:44 UTC - **Reserved Date**: December 07, 2022 at 02:58 UTC - **Assigned By**: qualcomm ### Vulnerability Description Information disclosure in Bluetooth when an GATT packet is received due to improper input validation. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - QCA6390 (Status: affected) - QCA6391 (Status: affected) - QCA6426 (Status: affected) - QCA6436 (Status: affected) - QCA6574AU (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCC5100 (Status: affected) - QCN9074 (Status: affected) - QCS410 (Status: affected) - QCS610 (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD865 5G (Status: affected) - SD870 (Status: affected) - SDX55M (Status: affected) - SDXR2 5G (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9380 (Status: affected) - WCN3660B (Status: affected) - WCN3680B (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN6850 (Status: affected) - WCN6851 (Status: affected) - WCN6855 (Status: affected) - WCN6856 (Status: affected) - WCN7850 (Status: affected) - WCN7851 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5199 - **State**: PUBLISHED - **Published Date**: September 06, 2012 at 10:00 UTC - **Last Updated**: September 16, 2024 at 23:15 UTC - **Reserved Date**: September 06, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in PhotoImpact X3 13.00.0000.0 allows local users to gain privileges via a Trojan horse bwsconst.dll file in the current working directory, as demonstrated by a directory that contains a .ufp or .ufo file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [41258](http://secunia.com/advisories/41258)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13980 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:41 UTC - **Reserved Date**: August 30, 2017 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45407 - **State**: PUBLISHED - **Published Date**: December 22, 2022 at 00:00 UTC - **Last Updated**: April 15, 2025 at 14:45 UTC - **Reserved Date**: November 14, 2022 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description If an attacker loaded a font using <code>FontFace()</code> on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. This vulnerability affects Firefox < 107. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2022-47/) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1793314)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38137 - **State**: PUBLISHED - **Published Date**: November 08, 2022 at 18:32 UTC - **Last Updated**: February 20, 2025 at 19:55 UTC - **Reserved Date**: September 08, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Analytify plugin <= 4.2.2 on WordPress. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Analytify - Analytify (WordPress plugin)** Affected versions: - <= 4.2.2 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-analytify/wordpress-analytify-plugin-4-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) 2. [](https://wordpress.org/plugins/wp-analytify/) ### Credits - Vulnerability discovered by Muhammad Daffa (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0661 - **State**: PUBLISHED - **Published Date**: February 18, 2010 at 17:19 UTC - **Last Updated**: August 07, 2024 at 00:59 UTC - **Reserved Date**: February 18, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome before 4.0.249.78, allows remote attackers to bypass the Same Origin Policy via vectors involving the window.open method. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html) 2. [43068](http://secunia.com/advisories/43068) 3. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212) 4. [1023506](http://securitytracker.com/id?1023506) 5. [](http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs) 6. [](http://code.google.com/p/chromium/issues/detail?id=30660) 7. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html) 8. [](http://flock.com/security/) 9. [](https://bugs.webkit.org/show_bug.cgi?id=32647) 10. [](http://trac.webkit.org/changeset/52401) 11. [oval:org.mitre.oval:def:14482](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10604 - **State**: PUBLISHED - **Published Date**: June 01, 2018 at 18:00 UTC - **Last Updated**: September 17, 2024 at 02:47 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description dalek-browser-chrome is Google Chrome bindings for DalekJS. dalek-browser-chrome downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ### Weakness Classification (CWE) - CWE-311: Security Weakness ### Affected Products **HackerOne - dalek-browser-chrome node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/199)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11114, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11114 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11114 - **State**: PUBLISHED - **Published Date**: July 31, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 17:57 UTC - **Reserved Date**: July 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://seclists.org/fulldisclosure/2017/Jul/76)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1171 - **State**: PUBLISHED - **Published Date**: May 07, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:45 UTC - **Reserved Date**: December 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in cgiforum.pl script in CGIForum 1.0 allows remote attackers to ready arbitrary files via a .. (dot dot) attack in the "thesection" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1963](http://www.securityfocus.com/bid/1963) 2. [cgiforum-view-files(5553)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5553) 3. [20001120 CGIForum 1.0 Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2000-11/0263.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25967, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25967 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25967 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 06:44 UTC - **Last Updated**: August 01, 2024 at 23:52 UTC - **Reserved Date**: February 13, 2024 at 05:34 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains an execution with unnecessary privileges vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-250: Security Weakness ### Affected Products **Dell - PowerScale OneFS** Affected versions: - 8.2.x (Status: affected) - 9.4.0.0 (Status: affected) - 9.5.0.0 (Status: affected) - 9.6.0.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000224860/dsa-2024-163-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44317, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44317 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44317 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 11:03 UTC - **Last Updated**: January 14, 2025 at 10:28 UTC - **Reserved Date**: September 28, 2023 at 16:18 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-349: Security Weakness ### Affected Products **Siemens - RUGGEDCOM RM1224 LTE(4G) EU** Affected versions: - 0 (Status: affected) **Siemens - RUGGEDCOM RM1224 LTE(4G) NAM** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M804PB** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M812-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M812-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M816-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M816-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M826-2 SHDSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M874-2** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M874-3** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-3** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-3 (ROK)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-4** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-4 (EU)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-4 (NAM)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE MUM853-1 (EU)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE MUM856-1 (EU)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE MUM856-1 (RoW)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE S615 EEC LAN-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE S615 LAN-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAB762-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM763-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM763-1 (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM763-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 EEC** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 EEC (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 EEC (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUB762-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUB762-1 iFeatures** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM766-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM766-1 (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM766-1 (USA)** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf) 3. [](https://cert-portal.siemens.com/productcert/html/ssa-699386.html) 4. [](https://cert-portal.siemens.com/productcert/html/ssa-068047.html) 5. [](https://cert-portal.siemens.com/productcert/html/ssa-602936.html) 6. [](https://cert-portal.siemens.com/productcert/html/ssa-690517.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32630 - **State**: PUBLISHED - **Published Date**: May 20, 2021 at 16:45 UTC - **Last Updated**: August 03, 2024 at 23:25 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.0.4, there is an authenticated RCE via .phar file upload. A php web shell can be uploaded via the Documents & Files upload feature. Someone with upload permissions could rename the php shell with a .phar extension, visit the file, triggering the payload for a reverse/bind shell. This can be mitigated by excluding a .phar file extension to be uploaded (like you did with .php .phtml .php5 etc). The vulnerability is patched in version 4.0.4. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Admidio - admidio** Affected versions: - < 4.0.4 (Status: affected) ### References 1. [](https://github.com/Admidio/admidio/security/advisories/GHSA-xpqj-67r8-25j2) 2. [](https://github.com/Admidio/admidio/issues/994) 3. [](https://github.com/Admidio/admidio/releases/tag/v4.0.4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4284 - **State**: PUBLISHED - **Published Date**: July 22, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The Concurrent Data Management Replication process in Cisco IOS XR 5.3.0 on ASR 9000 devices allows remote attackers to cause a denial of service (BGP process reload) via malformed BGPv4 packets, aka Bug ID CSCur70670. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75980](http://www.securityfocus.com/bid/75980) 2. [20150721 Cisco IOS XR Concurrent Data Management Replication Process BGP Process Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40067) 3. [1033017](http://www.securitytracker.com/id/1033017)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13506, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13506 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13506 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 11:10 UTC - **Last Updated**: February 12, 2025 at 19:36 UTC - **Reserved Date**: January 17, 2025 at 13:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the display_name profile parameter in all versions up to, and including, 2.8.97 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **paoltaia - GeoDirectory – WP Business Directory Plugin and Classified Listings Directory** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d0d9ba14-c0c9-426e-927e-9139a0882f0d?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/geodirectory/tags/2.8.97/includes/admin/class-geodir-admin-post-view.php#L317) 3. [](https://plugins.trac.wordpress.org/changeset/3225839) ### Credits - Tim Coen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45366 - **State**: PUBLISHED - **Published Date**: September 18, 2024 at 05:20 UTC - **Last Updated**: November 05, 2024 at 21:19 UTC - **Reserved Date**: September 04, 2024 at 08:54 UTC - **Assigned By**: jpcert ### Vulnerability Description Welcart e-Commerce prior to 2.11.2 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the user's web browser. ### Affected Products **Welcart Inc. - Welcart e-Commerce** Affected versions: - prior to 2.11.2 (Status: affected) ### References 1. [](https://www.welcart.com/archives/22581.html) 2. [](https://jvn.jp/en/jp/JVN19766555/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9119 - **State**: PUBLISHED - **Published Date**: January 30, 2017 at 22:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: October 30, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://moinmo.in/SecurityFixes) 2. [94501](http://www.securityfocus.com/bid/94501) 3. [USN-3137-1](http://www.ubuntu.com/usn/USN-3137-1) 4. [DSA-3715](http://www.debian.org/security/2016/dsa-3715)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38656 - **State**: PUBLISHED - **Published Date**: November 13, 2024 at 01:54 UTC - **Last Updated**: December 01, 2024 at 18:25 UTC - **Reserved Date**: June 19, 2024 at 01:04 UTC - **Assigned By**: hackerone ### Vulnerability Description Argument injection in Ivanti Connect Secure before version 22.7R2.2 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution. ### Affected Products **Ivanti - Connect Secure** Affected versions: - 22.7R2.2 (Status: affected) - 9.1R18.9 (Status: affected) **Ivanti - Policy Secure** Affected versions: - 22.7R1.2 (Status: affected) ### References 1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2503 - **State**: PUBLISHED - **Published Date**: June 05, 2023 at 13:38 UTC - **Last Updated**: January 08, 2025 at 17:07 UTC - **Reserved Date**: May 03, 2023 at 15:15 UTC - **Assigned By**: WPScan ### Vulnerability Description The 10Web Social Post Feed WordPress plugin before 1.2.9 does not sanitise and escape some parameter before outputting it back in a page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - 10Web Social Post Feed** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/07b1caf1-d00b-4075-b71a-0516d5604286) ### Credits - Erwan LR (WPScan) - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21126 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 17:10 UTC - **Last Updated**: February 12, 2025 at 20:51 UTC - **Reserved Date**: December 04, 2024 at 17:19 UTC - **Assigned By**: adobe ### Vulnerability Description InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an Improper Input Validation vulnerability that could result in an application denial-of-service condition. An attacker could exploit this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Adobe - InDesign Desktop** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/indesign/apsb25-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6421 - **State**: PUBLISHED - **Published Date**: September 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 16, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://linux.oracle.com/errata/ELSA-2014-1676) 2. [61933](http://secunia.com/advisories/61933) 3. [openSUSE-SU-2014:1249](http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html) 4. [RHSA-2014:1677](http://rhn.redhat.com/errata/RHSA-2014-1677.html) 5. [RHSA-2014:1676](http://rhn.redhat.com/errata/RHSA-2014-1676.html) 6. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920) 7. [SUSE-SU-2014:1221](http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html) 8. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984) 9. [60280](http://secunia.com/advisories/60280) 10. [](http://linux.oracle.com/errata/ELSA-2014-1677) 11. [](http://www.wireshark.org/security/wnpa-sec-2014-12.html) 12. [61929](http://secunia.com/advisories/61929)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13129 - **State**: PUBLISHED - **Published Date**: September 26, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 22, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in ZKTeco ZKTime Web 2.0.1.12280 allows remote authenticated users to hijack the authentication of administrators for requests that add administrators by leveraging lack of anti-CSRF tokens. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20170917 ZKTime_Web Software 2.0 - Cross Site Request Forgery](http://seclists.org/fulldisclosure/2017/Sep/38) 2. [20170918 ZKTime_Web Software 2.0 - Cross Site Request Forgery](http://seclists.org/bugtraq/2017/Sep/19)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0850, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0850 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0850 - **State**: PUBLISHED - **Published Date**: April 20, 2011 at 10:00 UTC - **Last Updated**: September 17, 2024 at 00:05 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle PeopleSoft Enterprise CRM 8.9 Bundle #41 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Order Capture. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9781 - **State**: PUBLISHED - **Published Date**: June 21, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1) 2. [](https://www.tenable.com/security/research/tra-2017-21)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39944 - **State**: PUBLISHED - **Published Date**: July 31, 2024 at 03:13 UTC - **Last Updated**: July 31, 2024 at 19:10 UTC - **Reserved Date**: July 05, 2024 at 03:08 UTC - **Assigned By**: dahua ### Vulnerability Description A vulnerability has been found in Dahua products.Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Dahua - IPC-HX8XXX and NVR4XXX** Affected versions: - IPC-HX8XXX and NVR4XXX Versions which Build time before 2024/2/2 (Status: affected) ### References 1. [](https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25604 - **State**: PUBLISHED - **Published Date**: October 10, 2023 at 16:49 UTC - **Last Updated**: September 18, 2024 at 19:37 UTC - **Reserved Date**: February 08, 2023 at 13:42 UTC - **Assigned By**: fortinet ### Vulnerability Description An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:X/RC:X` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Fortinet - FortiGuest** Affected versions: - 1.0.0 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-23-052](https://fortiguard.com/psirt/FG-IR-23-052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8893 - **State**: PUBLISHED - **Published Date**: July 02, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 16:48 UTC - **Reserved Date**: May 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description AeroAdmin 4.1 uses a function to copy data between two pointers where the size of the data copied is taken directly from a network packet. This can cause a buffer overflow and denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.tarlogic.com/advisories/Tarlogic-2017-001.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4622 - **State**: PUBLISHED - **Published Date**: December 30, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 03:51 UTC - **Reserved Date**: December 30, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in WebSEAL in IBM Tivoli Access Manager for e-business 6.1.1 before 6.1.1-TIV-AWS-FP0001 on AIX allows remote attackers to read arbitrary files via a %uff0e%uff0e (encoded dot dot) in a URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2010-3329](http://www.vupen.com/english/advisories/2010/3329) 2. [45582](http://www.securityfocus.com/bid/45582) 3. [](http://www-01.ibm.com/support/docview.wss?uid=swg24028829) 4. [1024927](http://securitytracker.com/id?1024927) 5. [70158](http://www.osvdb.org/70158) 6. [42727](http://secunia.com/advisories/42727) 7. [tivoli-ebusiness-unspecified-dir-traversal(64306)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64306)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1742 - **State**: PUBLISHED - **Published Date**: August 01, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 19, 2011 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC Data Protection Advisor before 5.8.1 places cleartext account credentials in the DPA configuration file in unspecified circumstances, which might allow local users to obtain sensitive information by reading this file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20110726 ESA-2011-021: EMC Data Protection Advisor sensitive information disclosure vulnerability](http://www.securityfocus.com/archive/1/519012/100/0/threaded) 2. [8318](http://securityreason.com/securityalert/8318)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26648, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26648 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26648 - **State**: PUBLISHED - **Published Date**: March 26, 2024 at 17:50 UTC - **Last Updated**: May 21, 2025 at 09:12 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() In edp_setup_replay(), 'struct dc *dc' & 'struct dmub_replay *replay' was dereferenced before the pointer 'link' & 'replay' NULL check. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check 'link' (see line 933) ### Affected Products **Linux - Linux** Affected versions: - c7ddc0a800bc9f681a18c3bdd9f06b61adfabc11 (Status: affected) - c7ddc0a800bc9f681a18c3bdd9f06b61adfabc11 (Status: affected) - c7ddc0a800bc9f681a18c3bdd9f06b61adfabc11 (Status: affected) **Linux - Linux** Affected versions: - 6.6 (Status: affected) - 0 (Status: unaffected) - 6.6.15 (Status: unaffected) - 6.7.3 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935) 2. [](https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7) 3. [](https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41444 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 03, 2024 at 14:41 UTC - **Reserved Date**: September 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted POST request to graphs_new.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/enferas/9079535112e4f4ff2c1d2ce1c099d4c2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19458 - **State**: PUBLISHED - **Published Date**: December 03, 2019 at 19:03 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: November 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SALTO ProAccess SPACE 5.4.3.0 allows Directory Traversal in the Data Export feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html) 2. [](https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/)