System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5660 - **State**: PUBLISHED - **Published Date**: April 25, 2014 at 17:00 UTC - **Last Updated**: August 06, 2024 at 17:15 UTC - **Reserved Date**: August 30, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Power Software WinArchiver 3.2 allows remote attackers to execute arbitrary code via a crafted .zip file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130902 list of vulnerabilities discovered by realpentesting](http://seclists.org/fulldisclosure/2013/Sep/8) 2. [](http://realpentesting.blogspot.com.es/p/blog-page_3.html) 3. [92992](http://osvdb.org/show/osvdb/92992) 4. [](http://packetstormsecurity.com/files/121512/Winarchiver-3.2-Buffer-Overflow.html) 5. [](http://osvdb.org/ref/92/winarchiver-overflow.txt) 6. [59626](http://www.securityfocus.com/bid/59626)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49012 - **State**: PUBLISHED - **Published Date**: June 05, 2025 at 22:29 UTC - **Last Updated**: June 09, 2025 at 14:47 UTC - **Reserved Date**: May 29, 2025 at 16:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Himmelblau versions 0.9.0 through 0.9.14 and 1.00-alpha are vulnerable to a privilege escalation issue when Entra ID group-based access restrictions are configured using group display names instead of object IDs. Starting in version 0.9.0, Himmelblau introduced support for specifying group names in the `pam_allow_groups` configuration option. However, Microsoft Entra ID permits the creation of multiple groups with the same `displayName` via the Microsoft Graph API—even by non-admin users, depending on tenant settings. As a result, a user could create a personal group with the same name as a legitimate access group (e.g., `"Allow-Linux-Login"`), add themselves to it, and be granted authentication or `sudo` rights by Himmelblau. Because affected Himmelblau versions compare group names by either `displayName` or by the immutable `objectId`, this allows bypassing access control mechanisms intended to restrict login to members of official, centrally-managed groups. This issue is fixed in Himmelblau version **0.9.15** and later. In these versions, group name matching in `pam_allow_groups` has been deprecated and removed, and only group `objectId`s (GUIDs) may be specified for secure group-based filtering. To mitigate the issue without upgrading, replace all entries in `pam_allow_groups` with the objectId of the target Entra ID group(s) and/or audit your tenant for groups with duplicate display names using the Microsoft Graph API. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **himmelblau-idm - himmelblau** Affected versions: - >= 0.9.0, < 0.9.15 (Status: affected) - = 1.0.0-alpha (Status: affected) ### References 1. [https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-gcxr-m95v-qcf7](https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-gcxr-m95v-qcf7) 2. [https://github.com/himmelblau-idm/himmelblau/issues/554](https://github.com/himmelblau-idm/himmelblau/issues/554) 3. [https://github.com/himmelblau-idm/himmelblau/commit/918577f6a8392a71d9d3d67f20962c372a0c01c6](https://github.com/himmelblau-idm/himmelblau/commit/918577f6a8392a71d9d3d67f20962c372a0c01c6) 4. [https://learn.microsoft.com/en-us/answers/questions/1035045/azure-ad-b2c-creates-groups-with-the-same-name-usi?utm_source=chatgpt.com](https://learn.microsoft.com/en-us/answers/questions/1035045/azure-ad-b2c-creates-groups-with-the-same-name-usi?utm_source=chatgpt.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0700, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0700 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0700 - **State**: PUBLISHED - **Published Date**: January 31, 2013 at 11:00 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: January 17, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The client in InfoSphere FastTrack 8.1 through 8.7 in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 does not properly store credentials, which allows local users to bypass intended access restrictions via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21623501) 2. [infosphere-client-cred-storage(73266)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73266)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1233 - **State**: PUBLISHED - **Published Date**: March 30, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 19:56 UTC - **Reserved Date**: December 06, 2017 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description RSA Authentication Agent version 8.0.1 and earlier for Web for both IIS and Apache Web Server are affected by a cross-site scripting vulnerability. The attackers could potentially exploit this vulnerability to execute arbitrary HTML or JavaScript code in the user's browser session in the context of the affected website. ### Affected Products **Dell EMC - RSA Authentication Agent for Web for IIS, RSA Authentication Agent for Web for Apache Web Server** Affected versions: - version 8.0.1 and earlier (Status: affected) ### References 1. [20180326 DSA-2018-040: RSA Authentication Agent for Web for IIS and Apache Web Server Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2018/Mar/60) 2. [1040577](http://www.securitytracker.com/id/1040577)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15614 - **State**: PUBLISHED - **Published Date**: July 28, 2020 at 17:01 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 07, 2020 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the cha parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9718. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **CentOS Web Panel - CentOS Web Panel** Affected versions: - cwp-e17.0.9.8.923 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-761/) ### Credits - @PaulosYibelo & CasperTea
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7250 - **State**: PUBLISHED - **Published Date**: February 29, 2012 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:57 UTC - **Reserved Date**: December 19, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.novell.com/show_bug.cgi?id=748738) 2. [48516](http://secunia.com/advisories/48516) 3. [48899](http://secunia.com/advisories/48899) 4. [[openssl-dev] 20060829 Crash inside SMIME_read_PKCS7 if input is not MIME](http://marc.info/?l=openssl-dev&m=115685408414194&w=2) 5. [[openssl-dev] 20120210 [openssl.org #2711] Fix possible NULL dereference on bad MIME headers](http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html) 6. [RHSA-2009:1335](http://www.redhat.com/support/errata/RHSA-2009-1335.html) 7. [52181](http://www.securityfocus.com/bid/52181) 8. [36533](http://secunia.com/advisories/36533) 9. [USN-1424-1](http://www.ubuntu.com/usn/USN-1424-1) 10. [](https://bugzilla.redhat.com/show_bug.cgi?id=798100) 11. [](http://cvs.openssl.org/chngview?cn=22144) 12. [[oss-security] 20120227 CVE request: openssl: null pointer dereference issue](http://www.openwall.com/lists/oss-security/2012/02/27/10) 13. [[oss-security] 20120228 Re: CVE request: openssl: null pointer dereference issue](http://www.openwall.com/lists/oss-security/2012/02/28/14) 14. [48153](http://secunia.com/advisories/48153) 15. [HPSBUX02782](http://marc.info/?l=bugtraq&m=133728068926468&w=2) 16. [SSRT100844](http://marc.info/?l=bugtraq&m=133728068926468&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51713 - **State**: PUBLISHED - **Published Date**: December 22, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 22:40 UTC - **Reserved Date**: December 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/proftpd/proftpd/issues/1683) 2. [](https://github.com/proftpd/proftpd/issues/1683#issuecomment-1712887554) 3. [](https://github.com/proftpd/proftpd/blob/1.3.8/NEWS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2330 - **State**: PUBLISHED - **Published Date**: April 27, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 13:33 UTC - **Reserved Date**: April 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes_handler.php in DynaTracker 151 allows remote attackers to execute arbitrary PHP code via a URL in the base_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34159](http://osvdb.org/34159) 2. [34160](http://osvdb.org/34160) 3. [dynatracker-basepath-file-include(33873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33873) 4. [2638](http://securityreason.com/securityalert/2638) 5. [23667](http://www.securityfocus.com/bid/23667) 6. [20070425 DynaTracker &v151>> RFI](http://www.securityfocus.com/archive/1/466843/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45808 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 12:51 UTC - **Last Updated**: August 04, 2024 at 04:54 UTC - **Reserved Date**: December 27, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description jpress v4.2.0 allows users to register an account by default. With the account, user can upload arbitrary files to the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://jpress.com) 2. [](https://github.com/JPressProjects/jpress) 3. [](https://github.com/JPressProjects/jpress/issues/173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15787 - **State**: PUBLISHED - **Published Date**: August 29, 2019 at 11:18 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libZetta.rs through 0.1.2 has an integer overflow in the zpool parser (for error stats) that leads to a panic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Inner-Heaven/libzetta-rs/pull/89)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48063 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 03, 2024 at 15:30 UTC - **Reserved Date**: December 29, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=29924) 2. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd) 3. [](https://security.netapp.com/advisory/ntap-20231006-0008/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6087, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6087 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6087 - **State**: PUBLISHED - **Published Date**: September 13, 2024 at 16:12 UTC - **Last Updated**: September 13, 2024 at 16:40 UTC - **Reserved Date**: June 17, 2024 at 17:49 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **lunary-ai - lunary-ai/lunary** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8) 2. [](https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27234 - **State**: PUBLISHED - **Published Date**: February 16, 2021 at 03:43 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 16, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. The web application suffers from SQL injection on Adminlog.asp, Archivemsgs.asp, Deletelog.asp, Eventlog.asp, and Evmlog.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mutare.com/security-adv-mutare-2021-002-mutare-voice/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3496 - **State**: PUBLISHED - **Published Date**: March 18, 2019 at 17:35 UTC - **Last Updated**: August 04, 2024 at 19:12 UTC - **Reserved Date**: January 01, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Wifi-soft UniBox controller 3.x devices. The tools/controller/diagnostic_tools_controller Diagnostic Tools Controller is vulnerable to Remote Command Execution, allowing an attacker to execute arbitrary system commands on the server with root user privileges. Authentication for accessing this component can be bypassed by using Hard coded credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/151077/Wifi-soft-Unibox-2.x-Remote-Command-Code-Injection.html) 2. [[fulldisclosure] 20190106 Multiple Root RCE in Unibox Wifi Access Controller 0.x - 3.x](http://seclists.org/fulldisclosure/2019/Jan/23) 3. [](https://sahildhar.github.io/blogpost/Multiple-RCE-Vulnerabilties-in-Unibox-Controller-0.x-3.x/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16803 - **State**: PUBLISHED - **Published Date**: January 10, 2019 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In CIMTechniques CIMScan 6.x through 6.2, the SOAP WSDL parser allows attackers to execute SQL code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.linkedin.com/feed/update/urn:li:activity:6489145511902212096/) 2. [](https://twitter.com/DC3VDP/status/1083359509995753473) 3. [](https://www.websec.nl/news.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14895 - **State**: PUBLISHED - **Published Date**: November 29, 2019 at 13:50 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 10, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Red Hat - kernel** Affected versions: - all kernel versions 3.x.x and 4.x.x before 4.18.0 (Status: affected) ### References 1. [](https://www.openwall.com/lists/oss-security/2019/11/22/2) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895) 3. [FEDORA-2019-91f6e7bb71](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/) 4. [FEDORA-2019-8846a1a5a2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/) 5. [openSUSE-SU-2019:2675](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html) 6. [USN-4228-1](https://usn.ubuntu.com/4228-1/) 7. [USN-4227-1](https://usn.ubuntu.com/4227-1/) 8. [USN-4226-1](https://usn.ubuntu.com/4226-1/) 9. [USN-4225-1](https://usn.ubuntu.com/4225-1/) 10. [USN-4228-2](https://usn.ubuntu.com/4228-2/) 11. [USN-4227-2](https://usn.ubuntu.com/4227-2/) 12. [](http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html) 13. [[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html) 14. [USN-4225-2](https://usn.ubuntu.com/4225-2/) 15. [](http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html) 16. [RHSA-2020:0328](https://access.redhat.com/errata/RHSA-2020:0328) 17. [RHSA-2020:0339](https://access.redhat.com/errata/RHSA-2020:0339) 18. [RHSA-2020:0374](https://access.redhat.com/errata/RHSA-2020:0374) 19. [RHSA-2020:0375](https://access.redhat.com/errata/RHSA-2020:0375) 20. [RHSA-2020:0543](https://access.redhat.com/errata/RHSA-2020:0543) 21. [RHSA-2020:0592](https://access.redhat.com/errata/RHSA-2020:0592) 22. [RHSA-2020:0609](https://access.redhat.com/errata/RHSA-2020:0609) 23. [[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html) 24. [RHSA-2020:0653](https://access.redhat.com/errata/RHSA-2020:0653) 25. [RHSA-2020:0661](https://access.redhat.com/errata/RHSA-2020:0661) 26. [RHSA-2020:0664](https://access.redhat.com/errata/RHSA-2020:0664)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31271 - **State**: PUBLISHED - **Published Date**: April 12, 2024 at 12:40 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 29, 2024 at 16:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Ultimate Maps by Supsystic.This issue affects Ultimate Maps by Supsystic: from n/a through 1.2.16. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Supsystic - Ultimate Maps by Supsystic** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ultimate-maps-by-supsystic/wordpress-ultimate-maps-plugin-1-2-16-cross-site-request-forgery-vulnerability?_s_id=cve) ### Credits - Steven Julian (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4560 - **State**: PUBLISHED - **Published Date**: February 08, 2009 at 21:00 UTC - **Last Updated**: September 16, 2024 at 23:26 UTC - **Reserved Date**: October 14, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to obtain sensitive information via (1) a crafted request to the nnmRptConfig.exe CGI program, which reveals the pathname of log directories; or (2) a crafted parameter in a request to the ovlaunch.exe CGI program, which reveals configuration details. NOTE: this issue may be partially covered by CVE-2009-0205. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT080100](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01661610) 2. [HPSBMA02406](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01661610) 3. [20090206 HP Network Node Manager Multiple Information Disclosure Vulnerabilities](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=771)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0133 - **State**: PUBLISHED - **Published Date**: April 15, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: March 13, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GtkHTML, as included in Evolution before 1.2.4, allows remote attackers to cause a denial of service (crash) via certain malformed messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:138](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A138) 2. [CLA-2003:737](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000737) 3. [MDKSA-2003:046](http://www.mandriva.com/security/advisories?name=MDKSA-2003:046) 4. [RHSA-2003:126](http://www.redhat.com/support/errata/RHSA-2003-126.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4284 - **State**: PUBLISHED - **Published Date**: April 08, 2020 at 14:05 UTC - **Last Updated**: September 16, 2024 at 17:29 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could disclose sensitive information to an unauthorized user due to insufficient timeout functionality in the Web UI. IBM X-Force ID: 176207. ### Affected Products **IBM - Security Information Queue** Affected versions: - 1.0.0 (Status: affected) - 1.0.1 (Status: affected) - 1.0.2 (Status: affected) - 1.0.3 (Status: affected) - 1.0.4 (Status: affected) - 1.0.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6172551) 2. [ibm-isiq-cve20204284-info-disc (176207)](https://exchange.xforce.ibmcloud.com/vulnerabilities/176207)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1298 - **State**: PUBLISHED - **Published Date**: March 12, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:17 UTC - **Reserved Date**: March 12, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in Hadith module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter in a viewcat action to modules.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080308 PHP-Nuke SQL injection Module "Hadith" [cat]](http://www.securityfocus.com/archive/1/489323/100/0/threaded) 2. [hadith-cat-sql-injection(41092)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41092) 3. [28171](http://www.securityfocus.com/bid/28171) 4. [3730](http://securityreason.com/securityalert/3730) 5. [](http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3078) 6. [29322](http://secunia.com/advisories/29322)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34589 - **State**: PUBLISHED - **Published Date**: July 02, 2024 at 09:23 UTC - **Last Updated**: August 02, 2024 at 02:59 UTC - **Reserved Date**: May 07, 2024 at 04:43 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper input validation in parsing RTCP RR packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Jul-2024 Release in Android 12, 13, 14 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51870 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:31 UTC - **Last Updated**: November 20, 2024 at 14:26 UTC - **Reserved Date**: November 04, 2024 at 09:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aniketji007 Ultimate Flipbox Addon for Elementor allows Stored XSS.This issue affects Ultimate Flipbox Addon for Elementor: from n/a through .4. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **aniketji007 - Ultimate Flipbox Addon for Elementor** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ultimate-flipbox-addon-for-elementor/wordpress-ultimate-flipbox-addon-for-elementor-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Gab (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18533 - **State**: PUBLISHED - **Published Date**: August 20, 2019 at 15:52 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: August 16, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The rimons-twitter-widget plugin before 1.3 for WordPress has XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/rimons-twitter-widget/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30200 - **State**: PUBLISHED - **Published Date**: July 20, 2023 at 00:00 UTC - **Last Updated**: October 24, 2024 at 16:50 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the module “Image: WebP, Compress, Zoom, Lazy load, Alt & More” (ultimateimagetool) in versions up to 2.1.02 from Advanced Plugins for PrestaShop, a guest can download personal informations without restriction by performing a path traversal attack. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:H/I:N/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247) 2. [](https://security.friendsofpresta.org/modules/2023/07/20/ultimateimagetool.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1812 - **State**: PUBLISHED - **Published Date**: November 13, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 21, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description eosfailoverservice.exe in C3-ilex EOScada before 11.0.19.2 allows remote attackers to obtain sensitive cleartext information via a session on TCP port 12000. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [eoscada-eosfailoverservive-info-disc(79756)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79756) 2. [51171](http://secunia.com/advisories/51171) 3. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-271-01.pdf) 4. [56364](http://www.securityfocus.com/bid/56364)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3541 - **State**: PUBLISHED - **Published Date**: September 04, 2020 at 02:25 UTC - **Last Updated**: November 13, 2024 at 18:08 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the media engine component of Cisco Webex Meetings Client for Windows, Cisco Webex Meetings Desktop App for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to gain access to sensitive information. The vulnerability is due to unsafe logging of authentication requests by the affected software. An attacker could exploit this vulnerability by reading log files that are stored in the application directory. A successful exploit could allow the attacker to gain access to sensitive information, which could be used in further attacks. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Cisco - Cisco Webex Meetings** Affected versions: - n/a (Status: affected) ### References 1. [20200902 Cisco Webex Meetings Client for Windows, Webex Meetings Desktop App, and Webex Teams Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-media-znjfwHD6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7463 - **State**: PUBLISHED - **Published Date**: July 27, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description JBoss BRMS 6 and BPM Suite 6 before 6.4.3 are vulnerable to a reflected XSS via artifact upload. A malformed XML file, if uploaded, causes an error message to appear that includes part of the bad XML code verbatim without filtering out scripts. Successful exploitation would allow execution of script code within the context of the affected user. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Red Hat - business-central** Affected versions: - 6.4.3 (Status: affected) ### References 1. [RHSA-2017:1217](https://access.redhat.com/errata/RHSA-2017:1217) 2. [RHSA-2017:1218](https://access.redhat.com/errata/RHSA-2017:1218) 3. [98385](http://www.securityfocus.com/bid/98385) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7463)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2503 - **State**: PUBLISHED - **Published Date**: July 11, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 18, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The Qualcomm GPU driver in Android before 2016-07-05 on Nexus 5X and 6P devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28084795 and Qualcomm internal bug CR1006067. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-07-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24970 - **State**: PUBLISHED - **Published Date**: July 19, 2024 at 16:50 UTC - **Last Updated**: March 25, 2025 at 17:59 UTC - **Reserved Date**: April 05, 2024 at 19:28 UTC - **Assigned By**: hp ### Vulnerability Description Potential vulnerabilities have been identified in the HP Display Control software component within the HP Application Enabling Software Driver which might allow escalation of privilege. ### Affected Products **HP Inc. - HP Display Control** Affected versions: - See HP Security Bulletin reference for affected versions. (Status: affected) ### References 1. [](https://support.hp.com/us-en/document/ish_10914875-10914901-16/hpsbhf03954)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4449 - **State**: PUBLISHED - **Published Date**: January 16, 2023 at 15:37 UTC - **Last Updated**: April 07, 2025 at 18:12 UTC - **Reserved Date**: December 13, 2022 at 12:30 UTC - **Assigned By**: WPScan ### Vulnerability Description The Page scroll to id WordPress plugin before 1.7.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Page scroll to id** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0166 - **State**: PUBLISHED - **Published Date**: October 13, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: February 23, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the InterAccess telnet server TelnetD allows remote attackers to execute commands via a long login name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000223 Pragma Systems response to USSRLabs report](http://marc.info/?l=bugtraq&m=95142756403323&w=2) 2. [995](http://www.securityfocus.com/bid/995) 3. [20000221 Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT](http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPGEJHCCAA.labs%40ussrback.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1529 - **State**: PUBLISHED - **Published Date**: March 21, 2023 at 20:50 UTC - **Last Updated**: February 13, 2025 at 16:39 UTC - **Reserved Date**: March 21, 2023 at 00:43 UTC - **Assigned By**: Chrome ### Vulnerability Description Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 111.0.5563.110 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html) 2. [](https://crbug.com/1419718) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/) 5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/) 6. [](https://security.gentoo.org/glsa/202309-17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10103, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10103 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10103 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 19:03 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Miscellaneous). Supported versions that are affected are 2.0.0, 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Private Banking accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - FLEXCUBE Private Banking** Affected versions: - 2.0.0 (Status: affected) - 2.0.1 (Status: affected) - 2.2.0 (Status: affected) - 12.0.1 (Status: affected) ### References 1. [99750](http://www.securityfocus.com/bid/99750) 2. [1038934](http://www.securitytracker.com/id/1038934) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21140 - **State**: PUBLISHED - **Published Date**: August 18, 2022 at 19:43 UTC - **Last Updated**: May 05, 2025 at 16:38 UTC - **Reserved Date**: November 30, 2021 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access. ### Affected Products **n/a - Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products** Affected versions: - See references (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8911 - **State**: PUBLISHED - **Published Date**: May 09, 2018 at 13:00 UTC - **Last Updated**: September 16, 2024 at 23:20 UTC - **Reserved Date**: March 22, 2018 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Attachment Preview in Synology Note Station before 2.5.1-0844 allows remote authenticated users to inject arbitrary web script or HTML via malicious attachments. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Synology - Note Station** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.synology.com/zh-tw/support/security/Synology_SA_18_03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5293 - **State**: PUBLISHED - **Published Date**: August 24, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Red Hat Enterprise Virtualization Manager 3.6 and earlier gives valid SLAAC IPv6 addresses to interfaces when "boot protocol" is set to None, which might allow remote attackers to communicate with a system designated to be unreachable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://access.redhat.com/security/cve/CVE-2015-5293) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1267714)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33627, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33627 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33627 - **State**: PUBLISHED - **Published Date**: February 03, 2022 at 01:30 UTC - **Last Updated**: August 03, 2024 at 23:58 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.insyde.com/security-pledge) 2. [](https://www.insyde.com/security-pledge/SA-2022022) 3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf) 4. [](https://security.netapp.com/advisory/ntap-20220222-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39641, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39641 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39641 - **State**: PUBLISHED - **Published Date**: August 26, 2024 at 20:56 UTC - **Last Updated**: August 26, 2024 at 21:03 UTC - **Reserved Date**: June 26, 2024 at 21:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in ThimPress LearnPress.This issue affects LearnPress: from n/a through 4.2.6.8.2. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **ThimPress - LearnPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-2-6-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25901 - **State**: PUBLISHED - **Published Date**: March 28, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 19:16 UTC - **Reserved Date**: February 15, 2023 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Adobe - Dimension** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/dimension/apsb23-20.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12511 - **State**: PUBLISHED - **Published Date**: February 03, 2025 at 19:23 UTC - **Last Updated**: February 03, 2025 at 20:18 UTC - **Reserved Date**: December 11, 2024 at 13:24 UTC - **Assigned By**: Xerox ### Vulnerability Description With address book access, SMB/FTP settings could be modified, redirecting scans and possibly capturing credentials. This requires enabled scan functions and printer access. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Xerox - Versalink B400** Affected versions: - 0 (Status: affected) **Xerox - Versalink B405** Affected versions: - 0 (Status: affected) **Xerox - Versalink C400** Affected versions: - 0 (Status: affected) **Xerox - Versalink C405** Affected versions: - 0 (Status: affected) **Xerox - Versalink B600/B610** Affected versions: - 0 (Status: affected) **Xerox - Versalink B605/B615** Affected versions: - 0 (Status: affected) **Xerox - Versalink C500/C600** Affected versions: - 0 (Status: affected) **Xerox - Versalink C505/C605** Affected versions: - 0 (Status: affected) **Xerox - Versalink C7000** Affected versions: - 0 (Status: affected) **Xerox - Versalink C7020/C7025/C7030** Affected versions: - 0 (Status: affected) **Xerox - Versalink B7025/B7030/B7035** Affected versions: - 0 (Status: affected) **Xerox - Versalink B7125/B7130/B7135** Affected versions: - 0 (Status: affected) **Xerox - Versalink C7120/C7125/C7130** Affected versions: - 0 (Status: affected) **Xerox - Versalink C8000/C9000** Affected versions: - 0 (Status: affected) **Xerox - Versalink C8000W** Affected versions: - 0 (Status: affected) **Xerox - Phaser 6510** Affected versions: - 0 (Status: affected) **Xerox - WorkCentre 6515** Affected versions: - 0 (Status: affected) ### References 1. [](https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox%C2%AE-for-VersaLinkPhaser-and-WorkCentre.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39989 - **State**: PUBLISHED - **Published Date**: April 26, 2023 at 00:00 UTC - **Last Updated**: February 03, 2025 at 17:48 UTC - **Reserved Date**: September 06, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Fighting Cock Information System 1.0, which uses default credentials, but does not force nor prompt the administrators to change the credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com/php/12824/fighting-cock-information-system.html) 2. [](https://gist.github.com/0xHop/6ed962a1978edb1bd620c9c487400403) 3. [](https://gist.github.com/0xHop/43c4da65e0d101328a46b1bd5a11b262)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4927 - **State**: PUBLISHED - **Published Date**: October 09, 2011 at 10:00 UTC - **Last Updated**: August 07, 2024 at 04:02 UTC - **Reserved Date**: October 09, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Restaurant Guide (com_restaurantguide) component 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a country action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/1009-exploits/joomlarestaurantguide-sqlxsslfi.txt) 2. [15040](http://www.exploit-db.com/exploits/15040) 3. [8458](http://securityreason.com/securityalert/8458)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8796 - **State**: PUBLISHED - **Published Date**: May 05, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 16:48 UTC - **Reserved Date**: May 05, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because mysql_real_escape_string is misused, seos/courier/communication_p2p.php allows SQL injection with the app_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1847 - **State**: PUBLISHED - **Published Date**: May 03, 2011 at 20:00 UTC - **Last Updated**: August 06, 2024 at 22:45 UTC - **Reserved Date**: May 03, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IBM DB2 9.5 before FP7 and 9.7 before FP4 on Linux, UNIX, and Windows does not properly enforce privilege requirements for table access, which allows remote authenticated users to modify SYSSTAT.TABLES statistics columns via an UPDATE statement. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2011-1083](http://www.vupen.com/english/advisories/2011/1083) 2. [IC72119](http://www-01.ibm.com/support/docview.wss?uid=swg1IC72119) 3. [ibm-db2-rds-sec-bypass(66979)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66979) 4. [](http://www-01.ibm.com/support/docview.wss?crawler=1&uid=swg1IC72119) 5. [47525](http://www.securityfocus.com/bid/47525) 6. [oval:org.mitre.oval:def:14122](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14122) 7. [](http://www-01.ibm.com/support/docview.wss?crawler=1&uid=swg1IC71413) 8. [IC71413](http://www-01.ibm.com/support/docview.wss?uid=swg1IC71413) 9. [44229](http://secunia.com/advisories/44229)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2556 - **State**: PUBLISHED - **Published Date**: October 14, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The InfoPath Forms Services component in Microsoft SharePoint Server 2007 SP3 and 2010 SP2 misparses DTDs, which allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka "Microsoft SharePoint Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS15-110](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-110) 2. [1033804](http://www.securitytracker.com/id/1033804)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3514 - **State**: PUBLISHED - **Published Date**: July 14, 2023 at 04:53 UTC - **Last Updated**: November 05, 2024 at 19:56 UTC - **Reserved Date**: July 05, 2023 at 08:39 UTC - **Assigned By**: STAR_Labs ### Vulnerability Description Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and calling "AddModule" or "UninstallModules" command to execute arbitrary executable file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Razer - Razer Central** Affected versions: - 0 (Status: affected) ### References 1. [](https://starlabs.sg/advisories/23/23-3514/) ### Credits - Phan Thanh Duy (@PTDuy) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7436 - **State**: PUBLISHED - **Published Date**: October 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The SOS recette (aka com.sos.recette) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#247745](http://www.kb.cert.org/vuls/id/247745) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30908, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30908 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30908 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 18:50 UTC - **Last Updated**: August 03, 2024 at 22:48 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An authentication issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.1. A local attacker may be able to view the previous logged-in user’s desktop from the fast user switching screen. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212869) 2. [](https://support.apple.com/en-us/HT212872)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24613 - **State**: PUBLISHED - **Published Date**: February 03, 2023 at 00:00 UTC - **Last Updated**: March 26, 2025 at 14:55 UTC - **Reserved Date**: January 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_UI_Stack_Overflow_Vulnerability_ID-128285_V1.0.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36174 - **State**: PUBLISHED - **Published Date**: January 06, 2021 at 14:31 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Ninja Forms plugin before 3.4.27.1 for WordPress allows CSRF via services integration. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/ninja-forms/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38953 - **State**: PUBLISHED - **Published Date**: July 01, 2024 at 00:00 UTC - **Last Updated**: March 20, 2025 at 20:49 UTC - **Reserved Date**: June 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description phpok 6.4.003 contains a Cross Site Scripting (XSS) vulnerability in the ok_f() method under the framework/api/upload_control.php file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/qinggan/phpok/issues/17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0358 - **State**: PUBLISHED - **Published Date**: March 18, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:17 UTC - **Reserved Date**: March 17, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in VirtuaNews Admin Panel Pro 1.0.3 allows remote attackers to execute arbitrary script as other users via (1) the mainnews parameter in admin.php, (2) the expand parameter in admin.php, (3) the id parameter in admin.php, (4) the catid parameter in admin.php, or (5) an unnamed parameter during the newslogo_upload action in admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040305 VirtuaNews Admin Panel 1.0.3 Pro Cross Site Scripting Vulnerabillity](http://marc.info/?l=bugtraq&m=107851556116088&w=2) 2. [20040307 RE: VirtuaNews Admin Panel 1.0.3 Pro Cross Site Scripting Vulnerabillity](http://archives.neohapsis.com/archives/bugtraq/2004-03/0069.html) 3. [virtuanews-multiple-xss(15402)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15402) 4. [9812](http://www.securityfocus.com/bid/9812) 5. [9819](http://www.securityfocus.com/bid/9819)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0755 - **State**: PUBLISHED - **Published Date**: February 02, 2011 at 21:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 02, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.php.net/46587) 2. [](http://www.php.net/ChangeLog-5.php) 3. [php-mtrand-weak-security(65426)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65426) 4. [oval:org.mitre.oval:def:12589](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12589)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9884, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9884 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9884 - **State**: PUBLISHED - **Published Date**: July 05, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:24 UTC - **Reserved Date**: June 25, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpCoalesceFreeBlocks+0x00000000000001b6." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.irfanview.com/plugins.htm) 2. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9884)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39922 - **State**: PUBLISHED - **Published Date**: June 19, 2024 at 12:17 UTC - **Last Updated**: August 09, 2024 at 18:47 UTC - **Reserved Date**: August 07, 2023 at 12:46 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **ThemeFusion - Avada** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/avada/wordpress-avada-theme-7-11-1-authenticated-broken-access-control-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2365 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Memory leak in Microsoft Windows XP and Windows Server 2003 allows local users to cause a denial of service (memory exhaustion) by repeatedly creating and deleting directories using a non-standard tool such as smbmount. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040202 smbmount disrupts Windows file sharing.](http://archives.neohapsis.com/archives/bugtraq/2004-02/0119.html) 2. [win-linux-smbmount-dos(15057)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15057)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25662 - **State**: PUBLISHED - **Published Date**: May 13, 2024 at 19:09 UTC - **Last Updated**: February 13, 2025 at 15:47 UTC - **Reserved Date**: February 09, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Oxygen XML Web Author v26.0.0 and older and Oxygen Content Fusion v6.1 and older are vulnerable to Cross-Site Scripting (XSS) for malicious URLs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.oxygenxml.com/security/advisory/SYNC-2024-020601.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2768 - **State**: PUBLISHED - **Published Date**: December 23, 2011 at 02:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 19, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.torproject.org/blog/tor-02234-released-security-patches) 2. [DSA-2331](http://www.debian.org/security/2011/dsa-2331)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32935, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32935 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32935 - **State**: PUBLISHED - **Published Date**: May 23, 2022 at 18:42 UTC - **Last Updated**: April 16, 2025 at 17:53 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The affected Cognex product, the In-Sight OPC Server versions v5.7.4 (96) and prior, deserializes untrusted data, which could allow a remote attacker access to system level permission commands and local privilege escalation. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Cognex - In-Sight OPC Server** Affected versions: - All (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-224-01) ### Credits - Amir Preminger of Claroty reported this vulnerability to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47396 - **State**: REJECTED - **Last Updated**: March 17, 2025 at 22:38 UTC - **Reserved Date**: December 14, 2022 at 15:18 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9372 - **State**: PUBLISHED - **Published Date**: October 04, 2024 at 02:04 UTC - **Last Updated**: October 04, 2024 at 14:00 UTC - **Reserved Date**: September 30, 2024 at 20:34 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Blocks Hub plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wpblockshub - WP Blocks Hub** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7d32b2cc-9336-432e-9d2e-67db8b0e3f90?source=cve) 2. [](https://wordpress.org/plugins/wp-blocks-hub/#developers) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27896 - **State**: PUBLISHED - **Published Date**: March 14, 2023 at 05:02 UTC - **Last Updated**: February 27, 2025 at 18:04 UTC - **Reserved Date**: March 07, 2023 at 07:53 UTC - **Assigned By**: sap ### Vulnerability Description In SAP BusinessObjects Business Intelligence Platform - version 420, 430, an attacker can control a malicious BOE server, forcing the application server to connect to its own CMS, leading to a high impact on availability. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **SAP - BusinessObjects Business Intelligence Platform (Web Services)** Affected versions: - 420 (Status: affected) - 430 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/3287120) 2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40552 - **State**: PUBLISHED - **Published Date**: September 06, 2023 at 08:11 UTC - **Last Updated**: September 24, 2024 at 18:49 UTC - **Reserved Date**: August 16, 2023 at 11:15 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gurcharan Singh Fitness calculators plugin plugin <= 2.0.7 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Gurcharan Singh - Fitness calculators plugin** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/fitness-calculators/wordpress-fitness-calculators-plugin-plugin-2-0-7-cross-site-scripting-xss?_s_id=cve) ### Credits - Rio Darmawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10486 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 21:31 UTC - **Last Updated**: November 19, 2024 at 15:22 UTC - **Reserved Date**: October 28, 2024 at 22:56 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **automattic - Google for WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/64bc7d47-6b63-4fd9-85d4-82126f86308a?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/google-listings-and-ads/tags/2.8.6/vendor/googleads/google-ads-php/scripts/print_php_information.php) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0259, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0259 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0259 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1029599](http://www.securitytracker.com/id/1029599) 2. [1029598](http://www.securitytracker.com/id/1029598) 3. [MS14-001](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15751 - **State**: PUBLISHED - **Published Date**: October 22, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x0000000000009f39." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15751)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0654 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: August 15, 2001 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5339 - **State**: PUBLISHED - **Published Date**: February 22, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The core_enrol_get_enrolled_users web service in enrol/externallib.php in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 does not properly implement group-based access restrictions, which allows remote authenticated users to obtain sensitive course-participant information via a web-service request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-51861) 2. [](https://moodle.org/mod/forum/discuss.php?d=323234)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24712, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24712 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24712 - **State**: PUBLISHED - **Published Date**: February 28, 2022 at 16:00 UTC - **Last Updated**: April 23, 2025 at 19:00 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **codeigniter4 - CodeIgniter4** Affected versions: - < 4.1.9 (Status: affected) ### References 1. [](https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554) 2. [](https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_src/source/changelogs/v4.1.9.rst)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1483 - **State**: PUBLISHED - **Published Date**: March 18, 2023 at 09:31 UTC - **Last Updated**: August 02, 2024 at 05:49 UTC - **Reserved Date**: March 18, 2023 at 08:39 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in XiaoBingBy TeaCMS up to 2.0.2 and classified as critical. This vulnerability affects unknown code of the file /admin/getallarticleinfo. The manipulation of the argument searchInfo leads to sql injection. The attack can be initiated remotely. VDB-223366 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **XiaoBingBy - TeaCMS** Affected versions: - 2.0.0 (Status: affected) - 2.0.1 (Status: affected) - 2.0.2 (Status: affected) ### References 1. [](https://vuldb.com/?id.223366) 2. [](https://vuldb.com/?ctiid.223366) 3. [](https://gitee.com/xiaobingby/TeaCMS/issues/I6IJ0K) ### Credits - VulDB Gitee Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36075 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 14:35 UTC - **Last Updated**: April 23, 2025 at 19:29 UTC - **Reserved Date**: June 30, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge version 11.1 (and earlier) is affected by a Buffer Overflow vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Adobe - Bridge** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb21-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12094 - **State**: PUBLISHED - **Published Date**: November 07, 2017 at 16:00 UTC - **Last Updated**: September 17, 2024 at 00:05 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability. ### Affected Products **Circle Media - Circle** Affected versions: - firmware 2.0.1 (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0446)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39823 - **State**: PUBLISHED - **Published Date**: October 20, 2022 at 00:00 UTC - **Last Updated**: May 08, 2025 at 18:56 UTC - **Reserved Date**: September 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Softing OPC UA C++ SDK 5.66 through 6.x before 6.10. An OPC/UA browse request exceeding the server limit on continuation points may cause a use-after-free error ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.softing.com) 2. [](https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-8.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2264 - **State**: PUBLISHED - **Published Date**: March 02, 2014 at 17:00 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: March 02, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The OpenVPN module in Synology DiskStation Manager (DSM) 4.3-3810 update 1 has a hardcoded root password of synopass, which makes it easier for remote attackers to obtain access via a VPN session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://forum.synology.com/enu/viewtopic.php?f=173&t=77644) 2. [VU#534284](http://www.kb.cert.org/vuls/id/534284)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6346, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6346 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6346 - **State**: PUBLISHED - **Published Date**: November 29, 2023 at 12:02 UTC - **Last Updated**: February 13, 2025 at 17:26 UTC - **Reserved Date**: November 28, 2023 at 01:12 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 119.0.6045.199 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html) 2. [](https://crbug.com/1500856) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/) 5. [](https://www.debian.org/security/2023/dsa-5569) 6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/) 7. [](https://security.gentoo.org/glsa/202401-34)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25763 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 00:00 UTC - **Last Updated**: March 07, 2025 at 19:43 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description crmeb CRMEB-KY v5.4.0 and before has a SQL Injection vulnerability at getRead() in /system/SystemDatabackupServices.php ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/J-0k3r/sql/blob/main/sql.pdf) 2. [](https://github.com/J-0k3r/CVE-2025-25763)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7304 - **State**: PUBLISHED - **Published Date**: September 21, 2015 at 19:00 UTC - **Last Updated**: September 16, 2024 at 16:43 UTC - **Reserved Date**: September 21, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the amoCRM module 7.x-1.x before 7.x-1.2 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP POST data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.drupal.org/node/2569587) 2. [](https://www.drupal.org/node/2569243)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3226 - **State**: PUBLISHED - **Published Date**: December 01, 2022 at 00:00 UTC - **Last Updated**: April 24, 2025 at 20:13 UTC - **Reserved Date**: September 15, 2022 at 00:00 UTC - **Assigned By**: Sophos ### Vulnerability Description An OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall releases older than version 19.5 GA. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Sophos - Sophos Firewall** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://www.sophos.com/en-us/security-advisories/sophos-sa-20221201-sfos-19-5-0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21041 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 25, 2025 at 14:23 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In append_to_params of param_util.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-250123688References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2023-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-18476, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-18476 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-18476 - **State**: PUBLISHED - **Published Date**: August 26, 2021 at 17:28 UTC - **Last Updated**: August 04, 2024 at 14:00 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability in Hucart CMS 5.7.4 via the basic information field found in the avatar usd_image field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/joelister/bug/issues/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0067, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0067 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0067 - **State**: PUBLISHED - **Published Date**: January 13, 2010 at 01:00 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: December 16, 2009 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Application Server 10.1.2.3 and 10.1.3.4 allows remote attackers to affect confidentiality via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1023438](http://www.securitytracker.com/id?1023438) 2. [](http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html) 3. [TA10-012A](http://www.us-cert.gov/cas/techalerts/TA10-012A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38731, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38731 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38731 - **State**: PUBLISHED - **Published Date**: February 16, 2023 at 00:00 UTC - **Last Updated**: March 19, 2025 at 14:51 UTC - **Reserved Date**: August 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Qaelum DOSE 18.08 through 21.1 before 21.2 allows Directory Traversal via the loadimages name parameter. It allows a user to specify an arbitrary location on the server's filesystem from which to load an image. (Only images are displayed to the attacker. All other files are loaded but not displayed.) The Content-Type response header reflects the actual content type of the file being requested. This allows an attacker to enumerate files on the local system. Additionally, remote resources can be requested via a UNC path, allowing an attacker to coerce authentication out from the server to the attackers machine. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://qaelum.com/solutions/dose) 2. [](https://www.pwc.co.uk/issues/cyber-security-services/research/ethical-hacking-team-discovered-zero-day-vulnerability.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5107 - **State**: PUBLISHED - **Published Date**: August 23, 2012 at 20:00 UTC - **Last Updated**: August 07, 2024 at 00:23 UTC - **Reserved Date**: August 23, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20111121 Wordpress alert-before-your-post Plugin Cross-Site Scripting Vulnerabilities](http://www.securityfocus.com/archive/1/520590/100/0/threaded) 2. [50743](http://www.securityfocus.com/bid/50743) 3. [alertbeforeyourpost-postalert-xss(71413)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71413)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10002 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 17:00 UTC - **Last Updated**: August 06, 2024 at 03:07 UTC - **Reserved Date**: December 17, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.squid-cache.org/Advisories/SQUID-2016_11.txt) 2. [1037513](http://www.securitytracker.com/id/1037513) 3. [[oss-security] 20161217 Re: CVE Request - squid HTTP proxy multiple Information Disclosure issues](http://www.openwall.com/lists/oss-security/2016/12/18/1) 4. [RHSA-2017:0183](http://rhn.redhat.com/errata/RHSA-2017-0183.html) 5. [RHSA-2017:0182](http://rhn.redhat.com/errata/RHSA-2017-0182.html) 6. [94953](http://www.securityfocus.com/bid/94953) 7. [DSA-3745](http://www.debian.org/security/2016/dsa-3745)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14843 - **State**: PUBLISHED - **Published Date**: September 27, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 19:42 UTC - **Reserved Date**: September 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mojoomla School Management System for WordPress allows SQL Injection via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42804](https://www.exploit-db.com/exploits/42804/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2457 - **State**: PUBLISHED - **Published Date**: August 22, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:30 UTC - **Reserved Date**: August 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SA:2005:050](http://www.novell.com/linux/security/advisories/2005_50_kernel.html) 2. [USN-169-1](https://usn.ubuntu.com/169-1/) 3. [16500](http://secunia.com/advisories/16500) 4. [MDKSA-2005:220](http://www.mandriva.com/security/advisories?name=MDKSA-2005:220) 5. [19369](http://secunia.com/advisories/19369) 6. [DSA-1018](http://www.debian.org/security/2006/dsa-1018) 7. [14614](http://www.securityfocus.com/bid/14614) 8. [SUSE-SA:2005:068](http://www.securityfocus.com/archive/1/419522/100/0/threaded) 9. [MDKSA-2005:218](http://www.mandriva.com/security/advisories?name=MDKSA-2005:218) 10. [17826](http://secunia.com/advisories/17826) 11. [](http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5) 12. [17918](http://secunia.com/advisories/17918) 13. [DSA-1017](http://www.debian.org/security/2006/dsa-1017) 14. [MDKSA-2005:219](http://www.mandriva.com/security/advisories?name=MDKSA-2005:219) 15. [16355](http://secunia.com/advisories/16355/) 16. [19374](http://secunia.com/advisories/19374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26784 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 00:00 UTC - **Last Updated**: February 26, 2025 at 16:28 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability found in Kirin Fortress Machine v.1.7-2020-0610 allows attackers to execute arbitrary code via the /admin.php?controller=admin_commonuser parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.tosec.com.cn) 2. [](https://gist.github.com/yinfei6/b13e7527887ac0eb809fa0b6f36305e1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20030 - **State**: PUBLISHED - **Published Date**: March 04, 2024 at 02:43 UTC - **Last Updated**: October 29, 2024 at 20:51 UTC - **Reserved Date**: November 02, 2023 at 13:35 UTC - **Assigned By**: MediaTek ### Vulnerability Description In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541741. ### Affected Products **MediaTek, Inc. - MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8168, MT8195, MT8512** Affected versions: - Android 12.0, 13.0, 14.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/March-2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25800, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25800 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25800 - **State**: PUBLISHED - **Published Date**: July 14, 2022 at 11:42 UTC - **Last Updated**: August 03, 2024 at 04:49 UTC - **Reserved Date**: February 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Best Practical RT for Incident Response (RTIR) before 4.0.3 and 5.x before 5.0.3 allows SSRF via the whois lookup tool. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.bestpractical.com/release-notes/rtir/index.html) 2. [](https://docs.bestpractical.com/release-notes/rtir/5.0.3) 3. [](https://docs.bestpractical.com/release-notes/rtir/4.0.3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17610 - **State**: PUBLISHED - **Published Date**: October 16, 2019 at 21:18 UTC - **Last Updated**: August 05, 2024 at 01:47 UTC - **Reserved Date**: October 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HongCMS 3.0.0 has XSS via the install/index.php dbpassword parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cdn1.imggmi.com/uploads/2019/10/13/94ef1b084a074ffd9ef63408529aed17-full.png) 2. [](https://cdn1.imggmi.com/uploads/2019/10/13/e561884443c495286993e186f44dfd1f-full.png) 3. [](https://cxsecurity.com/issue/WLB-2019100100)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1399 - **State**: PUBLISHED - **Published Date**: February 27, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 23:35 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Daeja ViewONE Professional, Standard & Virtual 4.1.5 and 5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138435. ### Affected Products **IBM - Daeja ViewONE** Affected versions: - 4.1.5 (Status: affected) - 5.0 (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/138435) 2. [103223](http://www.securityfocus.com/bid/103223) 3. [](http://www.ibm.com/support/docview.wss?uid=swg22013094)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4788 - **State**: PUBLISHED - **Published Date**: May 16, 2025 at 16:31 UTC - **Last Updated**: May 16, 2025 at 18:10 UTC - **Reserved Date**: May 15, 2025 at 16:05 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in FreeFloat FTP Server 1.0. Affected by this vulnerability is an unknown functionality of the component DELETE Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **FreeFloat - FTP Server** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-309097 | FreeFloat FTP Server DELETE Command buffer overflow](https://vuldb.com/?id.309097) 2. [VDB-309097 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.309097) 3. [Submit #572476 | FreeFloat FTP Server 1.0 Buffer Overflow](https://vuldb.com/?submit.572476) 4. [](https://fitoxs.com/exploit/exploit-cd619c9271a231511f4fa2de1cf569b7040376a5cfe23dc6060884c32638254e.txt) ### Credits - Fernando Mengali (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14994 - **State**: PUBLISHED - **Published Date**: April 25, 2019 at 19:34 UTC - **Last Updated**: August 05, 2024 at 09:46 UTC - **Reserved Date**: August 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Essential Phone Android device with a build fingerprint of essential/mata/mata:8.1.0/OPM1.180104.166/297:user/release-keys contains a pre-installed platform app with a package name of com.ts.android.hiddenmenu (versionName=1.0, platformBuildVersionName=8.1.0) that contains an exported activity app component named com.ts.android.hiddenmenu.rtn.RTNResetActivity that allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf) 2. [](https://www.kryptowire.com/portal/android-firmware-defcon-2018/) 3. [](https://www.kryptowire.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31370 - **State**: REJECTED - **Last Updated**: March 29, 2025 at 03:55 UTC - **Reserved Date**: March 28, 2025 at 10:49 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5152 - **State**: PUBLISHED - **Published Date**: January 15, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 20:58 UTC - **Reserved Date**: September 24, 2012 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving seek operations on video data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16206](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16206) 2. [openSUSE-SU-2013:0236](http://lists.opensuse.org/opensuse-updates/2013-02/msg00005.html) 3. [](http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html) 4. [](https://code.google.com/p/chromium/issues/detail?id=165430)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4461 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:18 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 12.1.1, macOS Mojave 10.14.2, tvOS 12.1.1, watchOS 5.1.2. ### Affected Products **n/a - iOS, macOS, tvOS, watchOS ** Affected versions: - Versions prior to: iOS 12.1.1, macOS Mojave 10.14.2, tvOS 12.1.1, watchOS 5.1.2 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT209343) 2. [](https://support.apple.com/kb/HT209342) 3. [](https://support.apple.com/kb/HT209340) 4. [](https://support.apple.com/kb/HT209341)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1070 - **State**: PUBLISHED - **Published Date**: February 13, 2025 at 05:55 UTC - **Last Updated**: February 13, 2025 at 14:27 UTC - **Reserved Date**: February 05, 2025 at 21:21 UTC - **Assigned By**: schneider ### Vulnerability Description CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could render the device inoperable when a malicious file is downloaded. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Schneider Electric - ASCO 5310 Single-Channel Remote Annunciator** Affected versions: - All versions (Status: affected) **Schneider Electric - ASCO 5350 Eight Channel Remote Annunciator** Affected versions: - All versions (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0032 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 27, 2012 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1501 - **State**: REJECTED - **Published Date**: January 24, 2020 at 21:14 UTC - **Last Updated**: January 24, 2020 at 21:14 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available