System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0544, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0544 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0544 - **State**: PUBLISHED - **Published Date**: February 12, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 04:40 UTC - **Reserved Date**: February 12, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MDVSA-2009:050](http://www.mandriva.com/security/advisories?name=MDVSA-2009:050) 2. [pycrypto-arc2module-bo(48617)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48617) 3. [](http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git%3Ba=commitdiff%3Bh=d1c4875e1f220652fe7ff8358f56dee3b2aba31b) 4. [MDVSA-2009:049](http://www.mandriva.com/security/advisories?name=MDVSA-2009:049) 5. [[oss-security] 20090207 CVE Request: pycrypto](http://www.openwall.com/lists/oss-security/2009/02/07/1) 6. [35065](http://secunia.com/advisories/35065) 7. [](http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git%3Ba=commitdiff%3Bh=fd73731dfad451a81056fbb01e09aa78ab82eb5d) 8. [34199](http://secunia.com/advisories/34199) 9. [33674](http://www.securityfocus.com/bid/33674) 10. [SUSE-SR:2009:010](http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html) 11. [[oss-security] 20090212 Re: CVE Request: pycrypto](http://www.openwall.com/lists/oss-security/2009/02/12/5) 12. [GLSA-200903-11](http://www.gentoo.org/security/en/glsa/glsa-200903-11.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5424, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5424 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5424 - **State**: PUBLISHED - **Published Date**: December 11, 2008 at 15:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 11, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The MimeOleClearDirtyTree function in InetComm.dll in Microsoft Outlook Express 6.00.2900.5512 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote attackers to cause a denial of service (infinite loop) via a large e-mail message, a related issue to CVE-2006-1173. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro) 2. [4721](http://securityreason.com/securityalert/4721) 3. [32702](http://www.securityfocus.com/bid/32702) 4. [20081208 DoS attacks on MIME-capable software via complex MIME emails](http://www.securityfocus.com/archive/1/499038/100/0/threaded) 5. [20081209 Re: DoS attacks on MIME-capable software via complex MIME emails](http://www.securityfocus.com/archive/1/499045/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0438 - **State**: PUBLISHED - **Published Date**: November 10, 2020 at 12:51 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In the AIBinder_Class constructor of ibinder.cpp, there is a possible arbitrary code execution due to uninitialized data. This could lead to local escalation of privilege if a process were using libbinder_ndk in a vulnerable way with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-161812320 ### Affected Products **n/a - Android** Affected versions: - Android-11 Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-11-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15842 - **State**: PUBLISHED - **Published Date**: July 20, 2020 at 01:06 UTC - **Last Updated**: August 04, 2024 at 13:30 UTC - **Reserved Date**: July 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Liferay Portal before 7.3.0, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17, and 7.2 before fix pack 5, allows man-in-the-middle attackers to execute arbitrary code via crafted serialized payloads, because of insecure deserialization. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119317427) 2. [](https://issues.liferay.com/browse/LPE-16963)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16655 - **State**: PUBLISHED - **Published Date**: September 07, 2018 at 05:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gxlcms 1.0 has XSS via the PATH_INFO to gx/lib/ThinkPHP/Tpl/ThinkException.tpl.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lengjibo.github.io/gxlcms/) 2. [](https://github.com/lengjibo/lengjibo.github.io/blob/master/gxlcms/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4382 - **State**: PUBLISHED - **Published Date**: September 21, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 29, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HPE Performance Center 11.52, 12.00, 12.01, 12.20, and 12.50 allows remote attackers to bypass intended access restrictions via unspecified vectors, related to a "remote user validation failure" issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1036770](http://www.securitytracker.com/id/1036770) 2. [92915](http://www.securityfocus.com/bid/92915) 3. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05269356)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1002020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1002020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1002020 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 22:00 UTC - **Reserved Date**: September 14, 2017 at 00:00 UTC - **Assigned By**: larry_cashdollar ### Vulnerability Description Vulnerability in wordpress plugin surveys v1.01.8, The code in survey_form.php does not sanitize the action variable before placing it inside of an SQL query. ### Affected Products **Binny V A - surveys** Affected versions: - unspecified (Status: affected) ### References 1. [](https://wpvulndb.com/vulnerabilities/8833) 2. [](http://www.vapidlabs.com/advisory.php?v=193) 3. [](https://wordpress.org/plugins/surveys/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33379 - **State**: PUBLISHED - **Published Date**: August 04, 2023 at 00:00 UTC - **Last Updated**: October 17, 2024 at 15:16 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Connected IO v2.1.0 and prior has a misconfiguration in their MQTT broker used for management and device communication, which allows devices to connect to the broker and issue commands to other device, impersonating Connected IO management platform and sending commands to all of Connected IO's devices. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.connectedio.com/products/routers) 2. [](https://claroty.com/team82/disclosure-dashboard/cve-2023-33379)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14750 - **State**: PUBLISHED - **Published Date**: November 01, 2020 at 23:50 UTC - **Last Updated**: September 26, 2024 at 18:40 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - WebLogic Server** Affected versions: - 10.3.6.0.0 (Status: affected) - 12.1.3.0.0 (Status: affected) - 12.2.1.3.0 (Status: affected) - 12.2.1.4.0 (Status: affected) - 14.1.1.0.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/alert-cve-2020-14750.html) 2. [](http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3679, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3679 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3679 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 6. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3274 - **State**: PUBLISHED - **Published Date**: June 19, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Apple Safari 3.0 and 3.0.1 on Windows XP SP2 allows attackers to cause a denial of service (application crash) via JavaScript that sets the document.location variable, as demonstrated by an empty value of document.location. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38863](http://osvdb.org/38863) 2. [2810](http://securityreason.com/securityalert/2810) 3. [20070616 Local Denial of Service in Safari](http://www.securityfocus.com/archive/1/471542/100/0/threaded) 4. [apple-safari-documentlocation-dos(34912)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34912)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6719, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6719 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6719 - **State**: PUBLISHED - **Published Date**: March 06, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 17:46 UTC - **Reserved Date**: November 08, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description delivery.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the testconn_host parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ibm-tealeaf-cve20136719-rce(89228)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89228) 2. [32546](http://www.exploit-db.com/exploits/32546) 3. [](https://tealeaf.support.ibmcloud.com/FileManagement/Download/19eb90ffb8334b398684b4350edc4b7a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26370 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 18:25 UTC - **Last Updated**: September 16, 2024 at 22:20 UTC - **Reserved Date**: January 29, 2021 at 00:00 UTC - **Assigned By**: AMD ### Vulnerability Description Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **AMD - 2nd Gen AMD EPYC™** Affected versions: - unspecified (Status: affected) **AMD - 3rd Gen AMD EPYC™** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6181 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49127, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49127 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49127 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:55 UTC - **Last Updated**: May 04, 2025 at 08:30 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ref_tracker: implement use-after-free detection Whenever ref_tracker_dir_init() is called, mark the struct ref_tracker_dir as dead. Test the dead status from ref_tracker_alloc() and ref_tracker_free() This should detect buggy dev_put()/dev_hold() happening too late in netdevice dismantle process. ### Affected Products **Linux - Linux** Affected versions: - 4e66934eaadc83b27ada8d42b60894018f3bfabf (Status: affected) - 4e66934eaadc83b27ada8d42b60894018f3bfabf (Status: affected) **Linux - Linux** Affected versions: - 5.17 (Status: affected) - 0 (Status: unaffected) - 5.17.3 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/3743c9de303fa36c2e2ca2522ab280c52bcafbd2) 2. [](https://git.kernel.org/stable/c/e3ececfe668facd87d920b608349a32607060e66)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17947 - **State**: PUBLISHED - **Published Date**: October 03, 2018 at 08:00 UTC - **Last Updated**: September 17, 2024 at 00:15 UTC - **Reserved Date**: October 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Snazzy Maps plugin before 1.1.5 for WordPress has XSS via the text or tab parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://seclists.org/bugtraq/2018/Jul/72) 2. [](https://wordpress.org/plugins/snazzy-maps/#developers) 3. [](http://www.defensecode.com/advisories/DC-2018-05-006_WordPress_Snazzy_Maps_Plugin_Advisory.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34417 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 11:50 UTC - **Last Updated**: February 26, 2025 at 15:32 UTC - **Reserved Date**: June 23, 2022 at 18:55 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Dell - PowerEdge Platform** Affected versions: - 14G,15G (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51626, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51626 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51626 - **State**: PUBLISHED - **Published Date**: November 04, 2024 at 14:09 UTC - **Last Updated**: November 04, 2024 at 15:40 UTC - **Reserved Date**: October 30, 2024 at 15:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Mansur Ahamed - Woocommerce Quote Calculator** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13106 - **State**: PUBLISHED - **Published Date**: August 06, 2019 at 19:05 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: June 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/u-boot/u-boot/commits/master) 2. [](https://lists.denx.de/pipermail/u-boot/2019-July/375516.html) 3. [](https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75) 4. [openSUSE-SU-2019:2233](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html) 5. [openSUSE-SU-2019:2235](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13095 - **State**: PUBLISHED - **Published Date**: June 30, 2020 at 16:33 UTC - **Last Updated**: August 04, 2024 at 12:11 UTC - **Reserved Date**: May 15, 2020 at 00:00 UTC - **Assigned By**: obdev ### Vulnerability Description Little Snitch version 4.5.1 and older changed ownership of a directory path controlled by the user. This allowed the user to escalate to root by linking the path to a directory containing code executed by root. ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **n/a - Little Snitch** Affected versions: - up to 4.5.1 (Status: affected) ### References 1. [](https://obdev.at/cve/2020-13095-t46oXJJOwz.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1644, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1644 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1644 - **State**: PUBLISHED - **Published Date**: August 28, 2012 at 16:00 UTC - **Last Updated**: August 06, 2024 at 19:01 UTC - **Reserved Date**: March 12, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Organic Groups (OG) Vocabulary module 6.x-1.x before 6.x-1.2 for Drupal allows remote authenticated users with certain administrator permissions to modify the vocabularies of other groups via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://drupal.org/node/1441086) 2. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1) 3. [](http://drupalcode.org/project/og_vocab.git/commitdiff/cd8de08) 4. [ogvocabulary-title-xss(53902)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53902) 5. [79336](http://www.osvdb.org/79336) 6. [](https://drupal.org/node/1441450) 7. [48020](http://secunia.com/advisories/48020)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0377 - **State**: PUBLISHED - **Published Date**: July 18, 2018 at 23:00 UTC - **Last Updated**: November 29, 2024 at 14:51 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could allow an unauthenticated, remote attacker to directly connect to the OSGi interface. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by directly connecting to the OSGi interface. An exploit could allow the attacker to access or change any files that are accessible by the OSGi process. Cisco Bug IDs: CSCvh18017. ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **n/a - Cisco Policy Suite unknown** Affected versions: - Cisco Policy Suite unknown (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-ps-osgi-unauth-access) 2. [104850](http://www.securityfocus.com/bid/104850)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5766 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 13:00 UTC - **Last Updated**: June 06, 2025 at 13:36 UTC - **Reserved Date**: June 05, 2025 at 22:05 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Laundry System 1.0. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) - CWE-862: Missing Authorization ### Affected Products **code-projects - Laundry System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-311308 | code-projects Laundry System cross-site request forgery](https://vuldb.com/?id.311308) 2. [VDB-311308 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.311308) 3. [Submit #590851 | code-projects Laundry System 1.0 Cross-Site Request Forgery](https://vuldb.com/?submit.590851) 4. [](https://github.com/tuooo/CVE/issues/7) 5. [](https://code-projects.org/) ### Credits - DS_Leo (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1249 - **State**: PUBLISHED - **Published Date**: March 03, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MoveSortedContentAction in C1 Financial Services Contelligent 9.1.4 does not check "the additional environment security configuration," which allows remote attackers with write permissions to reorder components. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [contelligent-sortedcontent-security-bypass(32775)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32775) 2. [22785](http://www.securityfocus.com/bid/22785) 3. [ADV-2007-0814](http://www.vupen.com/english/advisories/2007/0814) 4. [](http://www.contelligent.com/contell/cms/c1web/contelligent/site/contelligent/changelog.html?fromRelease=9.1.4) 5. [24364](http://secunia.com/advisories/24364) 6. [33497](http://osvdb.org/33497)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46971, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46971 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46971 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 18:47 UTC - **Last Updated**: May 04, 2025 at 07:01 UTC - **Reserved Date**: February 27, 2024 at 18:42 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix unconditional security_locked_down() call Currently, the lockdown state is queried unconditionally, even though its result is used only if the PERF_SAMPLE_REGS_INTR bit is set in attr.sample_type. While that doesn't matter in case of the Lockdown LSM, it causes trouble with the SELinux's lockdown hook implementation. SELinux implements the locked_down hook with a check whether the current task's type has the corresponding "lockdown" class permission ("integrity" or "confidentiality") allowed in the policy. This means that calling the hook when the access control decision would be ignored generates a bogus permission check and audit record. Fix this by checking sample_type first and only calling the hook when its result would be honored. ### Affected Products **Linux - Linux** Affected versions: - b0c8fdc7fdb77586c3d1937050925b960743306e (Status: affected) - b0c8fdc7fdb77586c3d1937050925b960743306e (Status: affected) - b0c8fdc7fdb77586c3d1937050925b960743306e (Status: affected) - b0c8fdc7fdb77586c3d1937050925b960743306e (Status: affected) - b0c8fdc7fdb77586c3d1937050925b960743306e (Status: affected) **Linux - Linux** Affected versions: - 5.4 (Status: affected) - 0 (Status: unaffected) - 5.4.117 (Status: unaffected) - 5.10.35 (Status: unaffected) - 5.11.19 (Status: unaffected) - 5.12.2 (Status: unaffected) - 5.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ff) 2. [](https://git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1ce) 3. [](https://git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895e) 4. [](https://git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1) 5. [](https://git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4724, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4724 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4724 - **State**: PUBLISHED - **Published Date**: June 06, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: June 29, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DDSN Interactive cm3 Acora CMS 6.0.6/1a, 6.0.2/1a, 5.5.7/12b, 5.5.0/1b-p1, and possibly other versions, does not include the HTTPOnly flag in a Set-Cookie header for an unspecified cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.digitalsec.net/stuff/explt+advs/CM3.AcoraCMS.v6.txt) 2. [96664](http://osvdb.org/96664)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5217 - **State**: PUBLISHED - **Published Date**: June 04, 2019 at 18:35 UTC - **Last Updated**: August 04, 2024 at 19:47 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is an information disclosure vulnerability on Mate 9 Pro Huawei smartphones versions earlier than LON-AL00B9.0.1.150 (C00E61R1P8T8). An attacker could view the photos after a series of operations without unlocking the screen lock. Successful exploit could cause an information disclosure condition. ### Affected Products **Huawei - Mate 9 Pro** Affected versions: - Versions earlier than LON-AL00B9.0.1.150(C00E61R1P8T8) (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190417-01-smartphone-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0606, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0606 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0606 - **State**: PUBLISHED - **Published Date**: January 22, 2024 at 18:23 UTC - **Last Updated**: August 01, 2024 at 18:11 UTC - **Reserved Date**: January 16, 2024 at 16:14 UTC - **Assigned By**: mozilla ### Vulnerability Description An attacker could execute unauthorized script on a legitimate site through UXSS using window.open() by opening a javascript URI leading to unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122. ### Affected Products **Mozilla - Focus for iOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1855030) 2. [](https://www.mozilla.org/security/advisories/mfsa2024-03/) ### Credits - James Lee
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4329, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4329 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4329 - **State**: PUBLISHED - **Published Date**: August 24, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in Shadows Rising RPG (Pre-Alpha) 0.0.5b and earlier allow remote attackers to execute arbitrary PHP code via a URL in the CONFIG[gameroot] parameter to (1) core/includes/security.inc.php, (2) core/includes/smarty.inc.php, (3) qcms/includes/smarty.inc.php or (4) qlib/smarty.inc.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [shadowsrising-configgameroot-file-include(28478)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28478) 2. [28282](http://www.osvdb.org/28282) 3. [28283](http://www.osvdb.org/28283) 4. [2229](https://www.exploit-db.com/exploits/2229) 5. [20060823 source VERIFY of Shadows Rising RPG file include](http://www.attrition.org/pipermail/vim/2006-August/000986.html) 6. [19608](http://www.securityfocus.com/bid/19608)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8995 - **State**: PUBLISHED - **Published Date**: November 20, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 13:33 UTC - **Reserved Date**: November 19, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in Maarch LetterBox 2.8 allows remote attackers to execute arbitrary SQL commands via the UserId cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [maarch-letterbox-index-sec-bypass(98775)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98775) 2. [](http://packetstormsecurity.com/files/129135/Maarch-LetterBox-2.8-Insecure-Cookie-Handling.html) 3. [114772](http://www.osvdb.org/114772)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38866 - **State**: PUBLISHED - **Published Date**: August 15, 2023 at 00:00 UTC - **Last Updated**: October 09, 2024 at 13:08 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_415588. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter interface and display_name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22092 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 21:03 UTC - **Last Updated**: February 13, 2025 at 16:43 UTC - **Reserved Date**: December 17, 2022 at 19:26 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - * (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html) 2. [](https://security.netapp.com/advisory/ntap-20231027-0009/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29085, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29085 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29085 - **State**: PUBLISHED - **Published Date**: June 23, 2021 at 09:55 UTC - **Last Updated**: September 16, 2024 at 21:08 UTC - **Reserved Date**: March 23, 2021 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in file sharing management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **Synology - DiskStation Manager (DSM)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.synology.com/security/advisory/Synology_SA_20_26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8236 - **State**: PUBLISHED - **Published Date**: November 26, 2024 at 13:56 UTC - **Last Updated**: November 26, 2024 at 14:28 UTC - **Reserved Date**: August 27, 2024 at 16:06 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Elementor Website Builder – More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter of the Icon widget in all versions up to, and including, 3.25.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **elemntor - Elementor Website Builder – More than Just a Page Builder** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b1305be5-8267-475f-b962-62e3930116e1?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/elementor/tags/3.23.4/includes/widgets/icon.php#L489) 3. [](https://plugins.trac.wordpress.org/changeset/3192020/) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-40566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-40566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-40566 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 09:38 UTC - **Last Updated**: May 13, 2025 at 18:47 UTC - **Reserved Date**: April 16, 2025 at 08:20 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions < V4.1 Update 3), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1). Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **Siemens - SIMATIC PCS neo V4.1** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC PCS neo V5.0** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-339086.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25757 - **State**: PUBLISHED - **Published Date**: August 11, 2023 at 02:37 UTC - **Last Updated**: October 10, 2024 at 17:49 UTC - **Reserved Date**: March 04, 2023 at 04:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper access control in some Intel(R) Unison(TM) software before version 10.12 may allow a privileged user to potentially enable escalation of privilege via network access. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **n/a - Intel(R) Unison(TM) software** Affected versions: - before version 10.12 (Status: affected) ### References 1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00897.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00897.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1089, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1089 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1089 - **State**: PUBLISHED - **Published Date**: March 24, 2010 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:02 UTC - **Reserved Date**: March 24, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in vedi_faq.php in PHP Trouble Ticket 2.2 allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/1003-exploits/phptroubleticket-sql.txt) 2. [38763](http://secunia.com/advisories/38763)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1484 - **State**: PUBLISHED - **Published Date**: May 11, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 11, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Golden FTP server pro 2.52 allows remote attackers to read arbitrary files via a "\.." (backward slash dot dot) with a leading '"' (double quote) in the GET command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [13479](http://www.securityfocus.com/bid/13479) 2. [goldenftp-dotdot-directory-traversal(20668)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20668) 3. [20050504 Golden Ftp Server Pro - Directory Traversal Vuln](http://marc.info/?l=bugtraq&m=111530871716145&w=2) 4. [15175](http://secunia.com/advisories/15175)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39817 - **State**: PUBLISHED - **Published Date**: August 06, 2024 at 04:54 UTC - **Last Updated**: March 18, 2025 at 20:49 UTC - **Reserved Date**: July 26, 2024 at 04:55 UTC - **Assigned By**: jpcert ### Vulnerability Description Insertion of sensitive information into sent data issue exists in Cybozu Office 10.0.0 to 10.8.6, which may allow a user who can login to the product to view data that the user does not have access by conducting 'search' under certain conditions in Custom App. ### Affected Products **Cybozu, Inc. - Cybozu Office** Affected versions: - 10.0.0 to 10.8.6 (Status: affected) ### References 1. [](https://jvn.jp/en/jp/JVN29845579/) 2. [](https://kb.cybozu.support/?product=office&v=&fv=10.8.7&t=%E8%84%86%E5%BC%B1%E6%80%A7&s=)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41517 - **State**: PUBLISHED - **Published Date**: October 06, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 12:42 UTC - **Reserved Date**: September 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain a stack overflow in the lang parameter in the setLanguageCfg function ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://brief-nymphea-813.notion.site/TOTOLink-NR1800X-f97f2b9552c04eaf85fce31bccbfcf04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-19498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-19498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-19498 - **State**: PUBLISHED - **Published Date**: July 21, 2021 at 17:20 UTC - **Last Updated**: August 04, 2024 at 14:08 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Floating point exception in function Fraction in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impacts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/strukturag/libheif/issues/139) 2. [](https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4771, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4771 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4771 - **State**: PUBLISHED - **Published Date**: March 23, 2011 at 21:00 UTC - **Last Updated**: September 17, 2024 at 03:17 UTC - **Reserved Date**: March 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability to viewforum.php in S-CMS 2.5 allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15588](http://www.exploit-db.com/exploits/15588) 2. [42323](http://secunia.com/advisories/42323) 3. [44994](http://www.securityfocus.com/bid/44994)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38705 - **State**: PUBLISHED - **Published Date**: July 20, 2024 at 07:30 UTC - **Last Updated**: August 02, 2024 at 04:19 UTC - **Reserved Date**: June 19, 2024 at 11:16 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows Stored XSS.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.4. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ElementInvader - ElementInvader Addons for Elementor** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Michael (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16782 - **State**: PUBLISHED - **Published Date**: November 10, 2017 at 23:00 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/home-assistant/home-assistant-polymer/pull/514)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22039 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 22:37 UTC - **Last Updated**: January 02, 2025 at 19:25 UTC - **Reserved Date**: December 16, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Network File System Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Network File System Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22039)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45235 - **State**: PUBLISHED - **Published Date**: August 24, 2024 at 00:00 UTC - **Last Updated**: August 26, 2024 at 16:32 UTC - **Reserved Date**: August 24, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://nicmx.github.io/FORT-validator/CVE.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43581, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43581 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43581 - **State**: PUBLISHED - **Published Date**: November 08, 2023 at 22:25 UTC - **Last Updated**: September 04, 2024 at 18:02 UTC - **Reserved Date**: September 19, 2023 at 19:57 UTC - **Assigned By**: lenovo ### Vulnerability Description A buffer overflow was reported in the Update_WMI module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Lenovo - Desktop BIOS** Affected versions: - various (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-141775) ### Credits - Lenovo thanks Zichuan Li (@Ri7erLi) from Indiana University Bloomington for reporting this vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13455 - **State**: PUBLISHED - **Published Date**: February 21, 2025 at 11:09 UTC - **Last Updated**: February 21, 2025 at 13:27 UTC - **Reserved Date**: January 16, 2025 at 14:52 UTC - **Assigned By**: Wordfence ### Vulnerability Description The igumbi Online Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'igumbi_calendar' shortcode in all versions up to, and including, 1.40 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **smtm - igumbi Online Booking** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b21f9cfa-8113-42bc-a9dc-4d891bd9821b?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3243431%40igumbi-online-booking&new=3243431%40igumbi-online-booking&sfp_email=&sfph_mail=) ### Credits - SOPROBRO
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24845 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 09:20 UTC - **Last Updated**: December 04, 2024 at 15:09 UTC - **Reserved Date**: January 31, 2023 at 15:35 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-684: Security Weakness ### Affected Products **Siemens - RUGGEDCOM i800** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i800NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i801** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i801NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i802** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i802NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i803** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM i803NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM M2100** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM M2100F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM M2100NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM M2200** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM M2200F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM M2200NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM M969** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM M969F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM M969NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RMC30** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RMC30NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RMC8388 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RMC8388 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RMC8388NC V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RMC8388NC V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RP110** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RP110NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS1600** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS1600F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS1600FNC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS1600NC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS1600T** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS1600TNC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS400** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS400F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS400NC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS401** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS401NC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS416** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS416NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416NCv2 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416NCv2 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS416P** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416PF** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS416PNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416PNCv2 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416PNCv2 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS416Pv2 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416Pv2 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS416v2 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS416v2 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS8000** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000A** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000ANC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000H** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000HNC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000NC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000T** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS8000TNC** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS900** Affected versions: - All versions < V4.3.8 except for switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900** Affected versions: - All versions with switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900 (32M) V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900 (32M) V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS900F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS900G** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900G (32M) V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900G (32M) V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS900GF** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS900GNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900GNC(32M) V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900GNC(32M) V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS900GP** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900GPF** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS900GPNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900L** Affected versions: - All versions < V4.3.8 except for switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900L** Affected versions: - All versions with switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900LNC** Affected versions: - All versions < V4.3.8 except for switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900LNC** Affected versions: - All versions with switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900M-GETS-C01** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900M-GETS-XX** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900M-STND-C01** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900M-STND-XX** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900MNC-GETS-C01** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900MNC-GETS-XX** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900MNC-STND-XX** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900MNC-STND-XX-C01** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900NC** Affected versions: - All versions < V4.3.8 except for switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900NC** Affected versions: - All versions with switch chip M88E6083 (Status: affected) **Siemens - RUGGEDCOM RS900NC(32M) V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS900NC(32M) V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RS900W** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS910** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS910L** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS910LNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS910NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS910W** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS920L** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS920LNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS920W** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS930L** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS930LNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS930W** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS940G** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS940GF** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RS940GNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS969** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RS969NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2100** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2100 (32M) V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2100 (32M) V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2100F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RSG2100NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2100NC(32M) V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2100NC(32M) V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2100P** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2100PF** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RSG2100PNC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2200** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2200F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RSG2200NC** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2288 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2288 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2288NC V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2288NC V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2300 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2300 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2300F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RSG2300NC V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2300NC V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2300P V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2300P V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2300PF** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RSG2300PNC V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2300PNC V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2488 V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2488 V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG2488F** Affected versions: - All versions (Status: affected) **Siemens - RUGGEDCOM RSG2488NC V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG2488NC V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG907R** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG908C** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG909R** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG910C** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG920P V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG920P V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSG920PNC V4.X** Affected versions: - All versions < V4.3.8 (Status: affected) **Siemens - RUGGEDCOM RSG920PNC V5.X** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSL910** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RSL910NC** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RST2228** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RST2228P** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RST916C** Affected versions: - All versions < V5.8.0 (Status: affected) **Siemens - RUGGEDCOM RST916P** Affected versions: - All versions < V5.8.0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-908185.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0903, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0903 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0903 - **State**: PUBLISHED - **Published Date**: February 07, 2011 at 20:19 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 07, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in AR Web Content Manager (AWCM) 2.2 allow remote attackers to read arbitrary files and possibly have other unspecified impact via a .. (dot dot) in the (1) awcm_theme or (2) awcm_lang cookie to (a) index.php or (b) header.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [46017](http://www.securityfocus.com/bid/46017) 2. [awcm-theme-file-include(64980)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64980) 3. [16049](http://www.exploit-db.com/exploits/16049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27809 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 22:16 UTC - **Last Updated**: March 13, 2025 at 17:34 UTC - **Reserved Date**: February 26, 2024 at 15:32 UTC - **Assigned By**: apple ### Vulnerability Description A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214084) 2. [](https://support.apple.com/kb/HT214084)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46279, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46279 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46279 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 08:15 UTC - **Last Updated**: February 13, 2025 at 17:14 UTC - **Reserved Date**: October 20, 2023 at 06:54 UTC - **Assigned By**: apache ### Vulnerability Description Deserialization of Untrusted Data vulnerability in Apache Dubbo.This issue only affects Apache Dubbo 3.1.5. Users are recommended to upgrade to the latest version, which fixes the issue. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Apache Software Foundation - Apache Dubbo** Affected versions: - 3.1.5 (Status: affected) ### References 1. [](https://lists.apache.org/thread/zw53nxrkrfswmk9n3sfwxmcj7x030nmo) 2. [](http://www.openwall.com/lists/oss-security/2023/12/15/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6572 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.0.4, 12.0.5, 12.0.6, 12.1.1, 12.1.2, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality and integrity via unknown vectors related to List of Values. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) 2. [1031579](http://www.securitytracker.com/id/1031579)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2450, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2450 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2450 - **State**: PUBLISHED - **Published Date**: June 09, 2023 at 05:33 UTC - **Last Updated**: November 23, 2024 at 13:18 UTC - **Reserved Date**: May 01, 2023 at 14:58 UTC - **Assigned By**: Wordfence ### Vulnerability Description The FiboSearch - AJAX Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.23.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **damian-gora - FiboSearch – Ajax Search for WooCommerce** Affected versions: - 1.23.0 (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/880573d8-6dad-4a1b-a5db-33e1dc243062?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/ajax-search-for-woocommerce/tags/1.23.0/includes/Helpers.php#L1229) 3. [](https://plugins.trac.wordpress.org/changeset?old_path=%2Fajax-search-for-woocommerce%2Ftags%2F1.23.0&old=2917453&new_path=%2Fajax-search-for-woocommerce%2Ftags%2F1.24.0&new=2917453&sfp_email=&sfph_mail=) ### Credits - Ivan Kuzymchak
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3412 - **State**: PUBLISHED - **Published Date**: May 16, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:47 UTC - **Reserved Date**: April 24, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2015:1187](http://rhn.redhat.com/errata/RHSA-2015-1187.html) 2. [1032709](http://www.securitytracker.com/id/1032709) 3. [RHSA-2015:1186](http://rhn.redhat.com/errata/RHSA-2015-1186.html) 4. [](https://bugs.php.net/bug.php?id=69353) 5. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html) 6. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=4435b9142ff9813845d5c97ab29a5d637bedb257) 7. [](http://php.net/ChangeLog-5.php) 8. [RHSA-2015:1135](http://rhn.redhat.com/errata/RHSA-2015-1135.html) 9. [75250](http://www.securityfocus.com/bid/75250) 10. [RHSA-2015:1218](http://rhn.redhat.com/errata/RHSA-2015-1218.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44244, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44244 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44244 - **State**: PUBLISHED - **Published Date**: October 02, 2023 at 08:58 UTC - **Last Updated**: September 20, 2024 at 15:32 UTC - **Reserved Date**: September 27, 2023 at 07:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.44 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **FooPlugins - FooGallery** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve) ### Credits - FearZzZz (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11047, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11047 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11047 - **State**: PUBLISHED - **Published Date**: December 05, 2017 at 17:00 UTC - **Last Updated**: September 17, 2024 at 00:55 UTC - **Reserved Date**: July 07, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in a graphics driver ioctl handler, the lack of copy_from_user() function calls may result in writes to kernel memory. ### Affected Products **Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2017-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1022, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1022 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1022 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 24, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1698](http://www.securityfocus.com/bid/1698) 2. [cisco-pix-smtp-filtering(5277)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5277) 3. [20001005 Cisco Secure PIX Firewall Mailguard Vulnerability](http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml) 4. [20000920 Re: Cisco PIX Firewall (smtp content filtering hack) - Version 4.2(1) not exploitable](http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html) 5. [20000919 Cisco PIX Firewall (smtp content filtering hack)](http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20004 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 19:55 UTC - **Last Updated**: August 03, 2024 at 01:55 UTC - **Reserved Date**: October 06, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In checkSlicePermission of SliceManagerService.java, it is possible to access any slice URI due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-179699767 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 Android-12 Android-12L (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2022-05-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5395, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5395 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5395 - **State**: PUBLISHED - **Published Date**: April 17, 2024 at 16:37 UTC - **Last Updated**: August 02, 2024 at 07:59 UTC - **Reserved Date**: October 04, 2023 at 17:50 UTC - **Assigned By**: Honeywell ### Vulnerability Description Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Honeywell - Experion Server** Affected versions: - 520.2 (Status: affected) - 510.1 (Status: affected) - 520.1 (Status: affected) - 511.1 (Status: affected) **Honeywell - Experion Server** Affected versions: - 520.2 (Status: affected) - 511.1 (Status: affected) - 520.1 (Status: affected) **Honeywell - Experion Server** Affected versions: - 520.2 (Status: affected) - 520.1 (Status: affected) - 520.2 TCU4 HFR2 (Status: affected) ### References 1. [](https://process.honeywell.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0190 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:27 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [00167](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/167)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47208, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47208 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47208 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 08:43 UTC - **Last Updated**: November 19, 2024 at 14:59 UTC - **Reserved Date**: September 21, 2024 at 11:29 UTC - **Assigned By**: apache ### Vulnerability Description Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.17. Users are recommended to upgrade to version 18.12.17, which fixes the issue. ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) - CWE-94: Code Injection ### Affected Products **Apache Software Foundation - Apache OFBiz** Affected versions: - 0 (Status: affected) ### References 1. [](https://ofbiz.apache.org/download.html) 2. [](https://ofbiz.apache.org/security.html) 3. [](https://issues.apache.org/jira/browse/OFBIZ-13158) 4. [](https://lists.apache.org/thread/022r19skfofhv3lzql33vowlrvqndh11) ### Credits - 孙相 (Sun Xiang)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32763 - **State**: PUBLISHED - **Published Date**: July 20, 2021 at 16:50 UTC - **Last Updated**: August 03, 2024 at 23:33 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. The issue is fixed in OpenProject 11.3.3. As a workaround, one may install the patch manually. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **opf - openproject** Affected versions: - < 11.3.3 (Status: affected) ### References 1. [](https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f) 2. [](https://github.com/opf/openproject/pull/9447.patch)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11468 - **State**: PUBLISHED - **Published Date**: February 04, 2025 at 22:17 UTC - **Last Updated**: February 05, 2025 at 15:39 UTC - **Reserved Date**: November 19, 2024 at 21:12 UTC - **Assigned By**: Omnissa ### Vulnerability Description Omnissa Horizon Client for macOS contains a Local privilege escalation (LPE) Vulnerability due to a flaw in the installation process. Successful exploitation of this issue may allow attackers with user privileges to escalate their privileges to root on the system where the Horizon Client for macOS is installed. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Omnissa - Omnissa Horizon Client for MacOS** Affected versions: - Omnissa Horizon Client for macOS 2406 or earlier (Status: affected) ### References 1. [](https://static.omnissa.com/sites/default/files/OMSA-2024-0002.pdf) 2. [](https://www.omnissa.com/omnissa-security-response/) ### Credits - Omnissa would like to thank Max Keasley of WithSecure Consulting for reporting this issue to us.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46783 - **State**: PUBLISHED - **Published Date**: November 06, 2023 at 09:26 UTC - **Last Updated**: October 29, 2024 at 18:46 UTC - **Reserved Date**: October 26, 2023 at 12:23 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Bright Plugins Pre-Orders for WooCommerce plugin <= 1.2.13 versions. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Bright Plugins - Pre-Orders for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/pre-orders-for-woocommerce/wordpress-pre-orders-for-woocommerce-plugin-1-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Abu Hurayra (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9328 - **State**: PUBLISHED - **Published Date**: September 15, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 17:02 UTC - **Reserved Date**: May 31, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Shell metacharacter injection vulnerability in /usr/www/include/ajax/GetTest.php in TerraMaster TOS before 3.0.34 leads to remote code execution as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/hybriz/63bbe2d963e531357aca353c74dd1ad5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40037 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 04:33 UTC - **Reserved Date**: July 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userScore_deal.php?mudi=del ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pangchunyuhack/cms/blob/main/64/csrf.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6088 - **State**: PUBLISHED - **Published Date**: December 18, 2014 at 16:00 UTC - **Last Updated**: August 06, 2024 at 12:03 UTC - **Reserved Date**: September 02, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to obtain sensitive information by sniffing the network during use of the null SSL cipher. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21684475) 2. [ibm-sam-cve20146088-nullcipher(95860)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95860) 3. [IV67358](http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358) 4. [IV67581](http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6610 - **State**: PUBLISHED - **Published Date**: November 03, 2015 at 11:00 UTC - **Last Updated**: August 06, 2024 at 07:29 UTC - **Reserved Date**: August 21, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description libstagefright in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka internal bug 23707088. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[android-security-updates] 20151102 Nexus Security Bulletin (November 2015)](https://groups.google.com/forum/message/raw?msg=android-security-updates/n1aw2MGce4E/jhpVEWDUCAAJ) 2. [1034049](http://www.securitytracker.com/id/1034049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45807 - **State**: PUBLISHED - **Published Date**: February 02, 2023 at 16:12 UTC - **Last Updated**: January 13, 2025 at 15:58 UTC - **Reserved Date**: November 23, 2022 at 07:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) in WPVibes WP Mail Log plugin <= 1.0.1 versions. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **WPVibes - WP Mail Log** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-mail-log/wordpress-wp-mail-log-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Lana Codes (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2732 - **State**: PUBLISHED - **Published Date**: August 09, 2022 at 12:06 UTC - **Last Updated**: November 20, 2024 at 16:18 UTC - **Reserved Date**: August 09, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Missing Authorization in GitHub repository openemr/openemr prior to 7.0.0.1. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **openemr - openemr/openemr** Affected versions: - unspecified (Status: affected) ### References 1. [](https://github.com/openemr/openemr/commit/2973592bc7b1f4996738a6fd27d1e277e33676b6) 2. [](https://huntr.dev/bounties/8773e0d1-5f1a-4e87-8998-f5ec45f6d533)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16278 - **State**: PUBLISHED - **Published Date**: January 11, 2023 at 21:39 UTC - **Last Updated**: April 09, 2025 at 13:27 UTC - **Reserved Date**: October 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_net, at 0x9d01815c, the value for the `ip` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Insteon - Hub** Affected versions: - Not specified (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24277, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24277 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24277 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:22 UTC - **Last Updated**: April 02, 2025 at 13:52 UTC - **Reserved Date**: January 17, 2025 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122373) 2. [](https://support.apple.com/en-us/122374) 3. [](https://support.apple.com/en-us/122375)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14245, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14245 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14245 - **State**: PUBLISHED - **Published Date**: September 21, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 19:20 UTC - **Reserved Date**: September 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/erikd/libsndfile/issues/317) 2. [[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update](https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html) 3. [USN-4013-1](https://usn.ubuntu.com/4013-1/) 4. [GLSA-202007-65](https://security.gentoo.org/glsa/202007-65) 5. [[debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update](https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1340, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1340 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1340 - **State**: PUBLISHED - **Published Date**: May 03, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:51 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Beck GmbH IPC@Chip TelnetD service supports only one connection and does not disconnect a user who does not complete the login process, which allows remote attackers to lock out the administrator account by connecting to the service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ipcchip-telnet-admin-lockout(6596)](http://www.iss.net/security_center/static/6596.php) 2. [2772](http://www.securityfocus.com/bid/2772) 3. [20010524 IPC@Chip Security](http://www.securityfocus.com/archive/1/186418) 4. [VU#756019](http://www.kb.cert.org/vuls/id/756019) 5. [20010602 IPC@Chip - Fixes](http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32299 - **State**: PUBLISHED - **Published Date**: September 20, 2021 at 15:26 UTC - **Last Updated**: August 03, 2024 at 23:17 UTC - **Reserved Date**: May 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in pbrt through 20200627. A stack-buffer-overflow exists in the function pbrt::ParamSet::ParamSet() located in paramset.h. It allows an attacker to cause code Execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mmp/pbrt-v3/issues/296)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41046, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41046 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41046 - **State**: PUBLISHED - **Published Date**: September 01, 2023 at 19:59 UTC - **Last Updated**: September 30, 2024 at 20:20 UTC - **Reserved Date**: August 22, 2023 at 16:57 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible in XWiki to execute Velocity code without having script right by creating an XClass with a property of type "TextArea" and content type "VelocityCode" or "VelocityWiki". For the former, the syntax of the document needs to be set the `xwiki/1.0` (this syntax doesn't need to be installed). In both cases, when adding the property to an object, the Velocity code is executed regardless of the rights of the author of the property (edit right is still required, though). In both cases, the code is executed with the correct context author so no privileged APIs can be accessed. However, Velocity still grants access to otherwise inaccessible data and APIs that could allow further privilege escalation. At least for "VelocityCode", this behavior is most likely very old but only since XWiki 7.2, script right is a separate right, before that version all users were allowed to execute Velocity and thus this was expected and not a security issue. This has been patched in XWiki 14.10.10 and 15.4 RC1. Users are advised to upgrade. There are no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **xwiki - xwiki-platform** Affected versions: - >= 7.2, < 14.10.10 (Status: affected) - >= 15.0-rc-1, < 15.4-rc-1 (Status: affected) ### References 1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m5m2-h6h9-p2c8](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m5m2-h6h9-p2c8) 2. [https://github.com/xwiki/xwiki-platform/commit/edc52579eeaab1b4514785c134044671a1ecd839](https://github.com/xwiki/xwiki-platform/commit/edc52579eeaab1b4514785c134044671a1ecd839) 3. [https://jira.xwiki.org/browse/XWIKI-20847](https://jira.xwiki.org/browse/XWIKI-20847) 4. [https://jira.xwiki.org/browse/XWIKI-20848](https://jira.xwiki.org/browse/XWIKI-20848)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11192 - **State**: PUBLISHED - **Published Date**: November 26, 2024 at 08:31 UTC - **Last Updated**: November 26, 2024 at 14:09 UTC - **Reserved Date**: November 13, 2024 at 19:01 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Spotify Play Button for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's spotifyplaybutton shortcode in all versions up to, and including, 2.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **jonkastonka - Sp*tify Play Button for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a52e43dd-46b4-445b-b350-a2fd76315869?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/spotify-play-button-for-wordpress/tags/2.11/sptify-play-button-for-wordpress.php#L147) 3. [](https://plugins.trac.wordpress.org/browser/spotify-play-button-for-wordpress/tags/2.11/sptify-play-button-for-wordpress.php#L137) 4. [](https://wordpress.org/plugins/spotify-play-button-for-wordpress/#developers) 5. [](https://plugins.trac.wordpress.org/changeset?old_path=%2Fspotify-play-button-for-wordpress&old=3189556&new_path=%2Fspotify-play-button-for-wordpress&new=3191339&sfp_email=&sfph_mail=) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37561 - **State**: PUBLISHED - **Published Date**: December 25, 2021 at 23:25 UTC - **Last Updated**: August 04, 2024 at 01:23 UTC - **Reserved Date**: July 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds write). ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:L/C:H/I:N/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300) 2. [](https://corp.mediatek.com/product-security-bulletin/January-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0197 - **State**: PUBLISHED - **Published Date**: April 01, 2023 at 04:55 UTC - **Last Updated**: February 11, 2025 at 16:38 UTC - **Reserved Date**: January 11, 2023 at 05:48 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious user in a guest VM can cause a NULL-pointer dereference, which may lead to denial of service. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **NVIDIA - vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)** Affected versions: - All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5452)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25206, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25206 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25206 - **State**: PUBLISHED - **Published Date**: February 15, 2022 at 16:11 UTC - **Last Updated**: August 03, 2024 at 04:36 UTC - **Reserved Date**: February 15, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials. ### Affected Products **Jenkins project - Jenkins dbCharts Plugin** Affected versions: - unspecified (Status: affected) - next of 0.5.2 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21524 - **State**: PUBLISHED - **Published Date**: July 10, 2024 at 05:00 UTC - **Last Updated**: August 01, 2024 at 22:27 UTC - **Reserved Date**: December 22, 2023 at 12:33 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of the package node-stringbuilder are vulnerable to Out-of-bounds Read due to incorrect memory length calculation, by calling ToBuffer, ToString, or CharAt on a StringBuilder object with a non-empty string value input. It's possible to return previously allocated memory, for example, by providing negative indexes, leading to an Information Disclosure. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P` ### Affected Products **n/a - node-stringbuilder** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617) 2. [](https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281) 3. [](https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67) ### Credits - Alessio Della Libera
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27290, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27290 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27290 - **State**: PUBLISHED - **Published Date**: March 03, 2023 at 22:36 UTC - **Last Updated**: March 05, 2025 at 16:01 UTC - **Reserved Date**: February 27, 2023 at 17:47 UTC - **Assigned By**: ibm ### Vulnerability Description Docker based datastores for IBM Instana (IBM Observability with Instana 239-0 through 239-2, 241-0 through 241-2, and 243-0) do not currently require authentication. Due to this, an attacker within the network could access the datastores with read/write access. IBM X-Force ID: 248737. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **IBM - Observability with Instana** Affected versions: - 239-0 (Status: affected) - 241-0 (Status: affected) - 243-0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6959969) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/248737) 3. [](http://packetstormsecurity.com/files/171770/IBM-Instana-243-0-Missing-Authentication.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3143, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3143 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3143 - **State**: PUBLISHED - **Published Date**: October 05, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 23:01 UTC - **Reserved Date**: October 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Mailbox Server for 4D WebStar before 5.3.5 allows attackers to cause a denial of service (crash) via IMAP clients on Mac OS X 10.4 Mail 2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History_535.txt) 2. [14981](http://www.securityfocus.com/bid/14981) 3. [17003](http://secunia.com/advisories/17003)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46728 - **State**: REJECTED - **Last Updated**: May 08, 2023 at 00:00 UTC - **Reserved Date**: December 07, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8425 - **State**: PUBLISHED - **Published Date**: February 18, 2019 at 00:00 UTC - **Last Updated**: September 16, 2024 at 16:23 UTC - **Reserved Date**: February 17, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description includes/database.php in ZoneMinder before 1.32.3 has XSS in the construction of SQL-ERR messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#sql-query-error-reflected-xss) 2. [](https://www.seebug.org/vuldb/ssvid-97764)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47759, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47759 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47759 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 07:47 UTC - **Last Updated**: May 19, 2025 at 16:00 UTC - **Reserved Date**: May 09, 2025 at 08:06 UTC - **Assigned By**: jpcert ### Vulnerability Description V-SFT v6.2.5.0 and earlier contains an issue with stack-based buffer overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **FUJI ELECTRIC CO., LTD. - S-SFT** Affected versions: - v6.2.5.0 and earlier (Status: affected) ### References 1. [](https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php) 2. [](https://jvn.jp/en/vu/JVNVU97228144/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4686 - **State**: PUBLISHED - **Published Date**: February 01, 2006 at 02:00 UTC - **Last Updated**: September 17, 2024 at 00:01 UTC - **Reserved Date**: January 31, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PunBB 1.2.9, when used alone or with F-ART BLOG:CMS, includes config.php before calling the unregister_globals function, which allows attackers to obtain unspecified sensitive information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17433](http://secunia.com/advisories/17433) 2. [](http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt) 3. [15328](http://www.securityfocus.com/bid/15328) 4. [17425](http://secunia.com/advisories/17425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20555 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 17:07 UTC - **Last Updated**: October 24, 2024 at 14:36 UTC - **Reserved Date**: October 27, 2022 at 18:53 UTC - **Assigned By**: AMD ### Vulnerability Description Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM. ### Affected Products **AMD - Ryzen™ 3000 Series Desktop Processors “Matisse” AM4** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” AM4** Affected versions: - various (Status: affected) **AMD - Ryzen™ 7000 Series Processors “Raphael”** Affected versions: - various (Status: affected) **AMD - Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” FP5** Affected versions: - various (Status: affected) **AMD - Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5** Affected versions: - various (Status: affected) **AMD - Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Picasso”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 6000 Series Mobile Processors "Rembrandt"** Affected versions: - various (Status: affected) **AMD - Ryzen™ 7030 Series Mobile Processors “Barcelo” ** Affected versions: - various (Status: affected) **AMD - Ryzen™ 7020 Series Mobile Processors “Mendocino”** Affected versions: - various (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4413, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4413 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4413 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 07, 2011 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23519 - **State**: PUBLISHED - **Published Date**: February 28, 2024 at 16:27 UTC - **Last Updated**: August 01, 2024 at 23:06 UTC - **Reserved Date**: January 17, 2024 at 18:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in M&S Consulting Email Before Download.This issue affects Email Before Download: from n/a through 6.9.7. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **M&S Consulting - Email Before Download** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/email-before-download/wordpress-email-before-download-plugin-6-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1573 - **State**: PUBLISHED - **Published Date**: June 10, 2010 at 00:00 UTC - **Last Updated**: August 07, 2024 at 01:28 UTC - **Reserved Date**: April 27, 2010 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.icysilence.org/?p=268) 2. [ADV-2010-1419](http://www.vupen.com/english/advisories/2010/1419) 3. [40648](http://www.securityfocus.com/bid/40648) 4. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=20682) 5. [40103](http://secunia.com/advisories/40103) 6. [20100608 IS-2010-002 - Linksys WAP54Gv3 Remote Debug Root Shell](http://www.securityfocus.com/archive/1/511733/100/0/threaded) 7. [wap54g-debug-command-execution(59286)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59286)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39225 - **State**: PUBLISHED - **Published Date**: September 23, 2022 at 06:40 UTC - **Last Updated**: April 23, 2025 at 16:56 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 4.10.15, or 5.0.0 and above prior to 5.2.6, a user can write to the session object of another user if the session object ID is known. For example, an attacker can assign the session object to their own user by writing to the `user` field and then read any custom fields of that session object. Note that assigning a session to another user does not usually change the privileges of either of the two users, and a user cannot assign their own session to another user. This issue is patched in version 4.10.15 and above, and 5.2.6 and above. To mitigate this issue in unpatched versions add a `beforeSave` trigger to the `_Session` class and prevent writing if the requesting user is different from the user in the session object. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-669: Security Weakness ### Affected Products **parse-community - parse-server** Affected versions: - < 4.10.15 (Status: affected) - >= 5.0.0, < 5.2.6 (Status: affected) ### References 1. [](https://github.com/parse-community/parse-server/security/advisories/GHSA-6w4q-23cf-j9jp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6940 - **State**: PUBLISHED - **Published Date**: December 19, 2023 at 01:41 UTC - **Last Updated**: May 07, 2025 at 20:26 UTC - **Reserved Date**: December 19, 2023 at 01:40 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system. ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **mlflow - mlflow/mlflow** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c) 2. [](https://github.com/mlflow/mlflow/commit/5139b1087d686fa52e2b087e09da66aff86297b1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2862, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2862 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2862 - **State**: PUBLISHED - **Published Date**: April 15, 2014 at 23:00 UTC - **Last Updated**: September 16, 2024 at 19:41 UTC - **Reserved Date**: April 15, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 does not check authorization in unspecified situations, which allows remote authenticated users to perform actions via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#437385](http://www.kb.cert.org/vuls/id/437385)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3820 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 15:02 UTC - **Reserved Date**: November 02, 2022 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab affecting all versions starting from 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. GitLab was not performing correct authentication with some Package Registries when IP address restrictions were configured, allowing an attacker already in possession of a valid Deploy Token to misuse it from any location. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=15.4, <15.4.6 (Status: affected) - >=15.5, <15.5.5 (Status: affected) - >=15.6, <15.6.1 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/378638) 2. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3820.json) ### Credits - This vulnerability has been discovered internally by the GitLab team.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44715 - **State**: PUBLISHED - **Published Date**: January 27, 2023 at 00:00 UTC - **Last Updated**: March 28, 2025 at 17:44 UTC - **Reserved Date**: November 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Improper File Permissions in NetScout nGeniusONE 6.3.2 build 904 allows authenticated remote users to gain permissions via a crafted payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.netscout.com/securityadvisories)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7902, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7902 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7902 - **State**: PUBLISHED - **Published Date**: October 28, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 22, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Infinite Automation Mango Automation 2.5.x and 2.6.x before 2.6.0 build 430 provides different error messages for failed login attempts in unspecified circumstances, which allows remote attackers to obtain sensitive information via a series of requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-300-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2028 - **State**: PUBLISHED - **Published Date**: April 19, 2019 at 19:23 UTC - **Last Updated**: August 04, 2024 at 18:35 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In numerous hand-crafted functions in libmpeg2, NEON registers are not preserved. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120644655. ### Affected Products **Android - Android** Affected versions: - Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2019-04-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7439, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7439 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7439 - **State**: PUBLISHED - **Published Date**: August 03, 2024 at 16:00 UTC - **Last Updated**: August 05, 2024 at 15:09 UTC - **Reserved Date**: August 02, 2024 at 21:36 UTC - **Assigned By**: VulDB ### Vulnerability Description ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek CC8160 VVTK-0100d and classified as critical. Affected by this issue is the function read of the component httpd. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273524. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Vivotek - CC8160** Affected versions: - VVTK-0100d (Status: affected) ### References 1. [VDB-273524 | Vivotek CC8160 httpd read stack-based overflow](https://vuldb.com/?id.273524) 2. [VDB-273524 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.273524) 3. [Submit #383830 | VIVOTEK CC8160 VVTK-0100d buffer overflow](https://vuldb.com/?submit.383830) 4. [](https://yjz233.notion.site/vivotek-CC8160-has-stack-buffer-overflow-vulnerability-in-httpd-8409f967d3064493b649720f36d59081?pvs=4) ### Credits - jylsec (VulDB User)