System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-8956, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-8956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8956
- **State**: PUBLISHED
- **Published Date**: December 12, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the K7Sentry.sys kernel mode driver (aka K7AV Sentry Device Driver) before 12.8.0.119, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8956/)
2. [20141210 CVE-2014-8956 - Privilege Escalation In K7 Computing Multiple Products [K7Sentry.sys]](http://seclists.org/fulldisclosure/2014/Dec/46)
3. [](http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1412, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1412
- **State**: PUBLISHED
- **Published Date**: March 28, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TFT Gallery 0.10 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the admin password file and obtain password hashes via a direct request to admin/passwd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061204 Multiple bugs in TFT-Gallery](http://www.securityfocus.com/archive/1/453471/100/0/threaded)
2. [1611](https://www.exploit-db.com/exploits/1611)
3. [17250](http://www.securityfocus.com/bid/17250)
4. [19411](http://secunia.com/advisories/19411)
5. [20061204 Re: Multiple bugs in TFT-Gallery](http://www.securityfocus.com/archive/1/453485/100/0/threaded)
6. [ADV-2006-1115](http://www.vupen.com/english/advisories/2006/1115)
7. [tftgallery-passwd-disclosure(25465)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25465)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-4572, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-4572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4572
- **State**: PUBLISHED
- **Published Date**: November 16, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 15:01 UTC
- **Reserved Date**: August 28, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-544-2](http://www.ubuntu.com/usn/usn-544-2)
2. [27691](http://secunia.com/advisories/27691)
3. [RHSA-2007:1016](http://www.redhat.com/support/errata/RHSA-2007-1016.html)
4. [USN-544-1](https://usn.ubuntu.com/544-1/)
5. [ADV-2007-4238](http://www.vupen.com/english/advisories/2007/4238)
6. [TA07-352A](http://www.us-cert.gov/cas/techalerts/TA07-352A.html)
7. [30835](http://secunia.com/advisories/30835)
8. [29341](http://secunia.com/advisories/29341)
9. [1018954](http://securitytracker.com/id?1018954)
10. [SSA:2007-320-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739)
11. [HPSBUX02316](http://marc.info/?l=bugtraq&m=120524782005154&w=2)
12. [28136](http://secunia.com/advisories/28136)
13. [30736](http://secunia.com/advisories/30736)
14. [ADV-2007-3869](http://www.vupen.com/english/advisories/2007/3869)
15. [27679](http://secunia.com/advisories/27679)
16. [27682](http://secunia.com/advisories/27682)
17. [27701](http://secunia.com/advisories/27701)
18. [RHSA-2007:1013](http://www.redhat.com/support/errata/RHSA-2007-1013.html)
19. [ADV-2008-1908](http://www.vupen.com/english/advisories/2008/1908)
20. [samba-nmbd-bo(38501)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38501)
21. [27720](http://secunia.com/advisories/27720)
22. [SSRT071495](http://marc.info/?l=bugtraq&m=120524782005154&w=2)
23. [HPSBUX02341](http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657)
24. [30484](http://secunia.com/advisories/30484)
25. [20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages](http://www.securityfocus.com/archive/1/485936/100/0/threaded)
26. [DSA-1409](http://www.debian.org/security/2007/dsa-1409)
27. [27450](http://secunia.com/advisories/27450)
28. [27731](http://secunia.com/advisories/27731)
29. [[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages](http://lists.vmware.com/pipermail/security-announce/2008/000002.html)
30. [oval:org.mitre.oval:def:11132](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11132)
31. [SSRT080075](http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657)
32. [APPLE-SA-2007-12-17](http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html)
33. [MDKSA-2007:224](http://www.mandriva.com/security/advisories?name=MDKSA-2007:224)
34. [27787](http://secunia.com/advisories/27787)
35. [](http://docs.info.apple.com/article.html?artnum=307179)
36. [oval:org.mitre.oval:def:5643](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5643)
37. [28368](http://secunia.com/advisories/28368)
38. [](https://issues.rpath.com/browse/RPL-1894)
39. [26454](http://www.securityfocus.com/bid/26454)
40. [GLSA-200711-29](http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml)
41. [USN-617-1](http://www.ubuntu.com/usn/usn-617-1)
42. [FEDORA-2007-3402](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html)
43. [27927](http://secunia.com/advisories/27927)
44. [ADV-2008-1712](http://www.vupen.com/english/advisories/2008/1712/references)
45. [ADV-2008-0859](http://www.vupen.com/english/advisories/2008/0859/references)
46. [237764](http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1)
47. [](http://www.vmware.com/security/advisories/VMSA-2008-0001.html)
48. [](http://us1.samba.org/samba/security/CVE-2007-4572.html)
49. [RHSA-2007:1017](http://www.redhat.com/support/errata/RHSA-2007-1017.html)
50. [ADV-2008-0064](http://www.vupen.com/english/advisories/2008/0064)
51. [SUSE-SA:2007:065](http://www.novell.com/linux/security/advisories/2007_65_samba.html)
52. [20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages](http://www.securityfocus.com/archive/1/486859/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-13056, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-13056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13056
- **State**: REJECTED
- **Published Date**: January 14, 2022 at 16:24 UTC
- **Last Updated**: January 14, 2022 at 16:24 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-3022, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-3022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3022
- **State**: REJECTED
- **Published Date**: July 16, 2018 at 15:00 UTC
- **Last Updated**: July 16, 2018 at 14:57 UTC
- **Reserved Date**: April 12, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-2511, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-2511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2511
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 19:00 UTC
- **Last Updated**: October 02, 2024 at 16:05 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SOAP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
2. [106574](http://www.securityfocus.com/bid/106574)
3. [openSUSE-SU-2019:1547](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html)
4. [openSUSE-SU-2019:1814](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7100, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7100
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 06:48 UTC
- **Last Updated**: August 01, 2024 at 21:52 UTC
- **Reserved Date**: July 25, 2024 at 09:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bt_bb_button shortcode in all versions up to, and including, 5.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**boldthemes - Bold Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4999bbf3-3dbd-4c9a-b648-744192c9586c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/bold-page-builder/trunk/content_elements/bt_bb_button/bt_bb_button.php#L155)
3. [](https://wordpress.org/plugins/bold-page-builder/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3127440/)
### Credits
- Arkadiusz Hydzik
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-6142, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-6142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6142
- **State**: PUBLISHED
- **Published Date**: June 04, 2014 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 21:28 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Session::Cookie in the HTML::EP module 0.2011 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [htmlep-cve20126142-sec-bypass(84199)](https://exchange.xforce.ibmcloud.com/vulnerabilities/84199)
2. [[oss-security] 20130514 Re: CVE Request: Storable::thaw called on cookie data in multiple CPAN modules](http://seclists.org/oss-sec/2013/q2/318)
3. [59833](http://www.securityfocus.com/bid/59833)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-7471, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-7471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7471
- **State**: PUBLISHED
- **Published Date**: February 25, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 06:31 UTC
- **Reserved Date**: February 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KingView 7.5SP1 has an integer overflow during stgopenstorage API read operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cnvd.org.cn/flaw/show/1202823)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-2060, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-2060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2060
- **State**: PUBLISHED
- **Published Date**: March 07, 2025 at 02:31 UTC
- **Last Updated**: March 10, 2025 at 19:47 UTC
- **Reserved Date**: March 06, 2025 at 15:39 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been classified as critical. This affects an unknown part of the file /admin/admin-profile.php. The manipulation of the argument contactnumber leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Emergency Ambulance Hiring Portal**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-298815 | PHPGurukul Emergency Ambulance Hiring Portal admin-profile.php sql injection](https://vuldb.com/?id.298815)
2. [VDB-298815 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298815)
3. [Submit #514523 | PHPGurukul Emergency Ambulance Hiring Portal V1.0 SQL Injection](https://vuldb.com/?submit.514523)
4. [](https://github.com/siznwaa/CVE/issues/3)
5. [](https://phpgurukul.com/)
### Credits
- siznwaa (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-17984, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-17984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17984
- **State**: PUBLISHED
- **Published Date**: October 04, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 11:01 UTC
- **Reserved Date**: October 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An unanchored /[a-z]{2}/ regular expression in ISPConfig before 3.1.13 makes it possible to include arbitrary files, leading to code execution. This is exploitable by authenticated users who have local filesystem access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ispconfig.org/blog/ispconfig-3-1-13-released-important-security-bugfix/)
2. [](https://0x09al.github.io/security/ispconfig/exploit/vulnerability/2018/08/20/bug-or-backdoor-ispconfig-rce.html)
3. [](https://github.com/0x09AL/0x09al.github.io/blob/master/_posts/2018-08-20-bug-or-backdoor-ispconfig-rce.markdown)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-32360, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-32360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32360
- **State**: PUBLISHED
- **Published Date**: April 05, 2025 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 16:12 UTC
- **Reserved Date**: April 05, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Zammad 6.4.x before 6.4.2, there is information exposure. Only agents should be able to see and work on shared article drafts. However, a logged in customer was able to see details about shared drafts for their customer tickets in the browser console, which may contain confidential information, and also to manipulate them via API.
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-402: Security Weakness
### Affected Products
**Zammad - Zammad**
Affected versions:
- 6.4 (Status: affected)
### References
1. [](https://zammad.com/en/advisories/zaa-2025-03)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14793, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14793
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:22 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.6.49 and prior (Status: affected)
- 5.7.31 and prior (Status: affected)
- 8.0.21 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
2. [](https://security.netapp.com/advisory/ntap-20201023-0003/)
3. [FEDORA-2020-eee64a579c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/)
4. [FEDORA-2020-4f9ee82bc5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/)
5. [FEDORA-2020-53df1c05be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/)
6. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-14600, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-14600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14600
- **State**: PUBLISHED
- **Published Date**: January 17, 2020 at 17:33 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: August 03, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path element in the installer for Intel(R) SNMP Subagent Stand-Alone for Windows* may allow an authenticated user to potentially enable escalation of privilege via local access.
### Affected Products
**Intel - Intel(R) SNMP Subagent Stand-Alone for Windows***
Affected versions:
- all versions (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00300.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-2389, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-2389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2389
- **State**: PUBLISHED
- **Published Date**: February 14, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 04:14 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions a malicious user can inject log files of SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, hiding important information in the log file.
### Affected Products
**SAP SE - SAP Internet Graphics Server**
Affected versions:
- 7.20 (Status: affected)
- 7.20EXT (Status: affected)
- 7.45 (Status: affected)
- 7.49 (Status: affected)
- 7.53 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2525222)
2. [](https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50694, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50694
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 00:00 UTC
- **Last Updated**: November 13, 2024 at 17:57 UTC
- **Reserved Date**: December 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in dom96 HTTPbeast v.0.4.1 and before allows a remote attacker to send a malicious crafted request due to insufficient parsing in the parser.nim component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dom96/httpbeast/pull/96)
2. [](https://github.com/dom96/httpbeast/issues/95)
3. [](https://gist.github.com/anas-cherni/c95e2fc1fd84d93167eb60193318d0b8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-26810, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-26810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26810
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 19:04 UTC
- **Last Updated**: January 02, 2025 at 18:52 UTC
- **Reserved Date**: March 09, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows File Server Resource Management Service Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows File Server Resource Management Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26810)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-8903, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-8903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8903
- **State**: PUBLISHED
- **Published Date**: May 11, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201705-11](https://security.gentoo.org/glsa/201705-11)
2. [1038386](http://www.securitytracker.com/id/1038386)
3. [](https://xenbits.xen.org/xsa/advisory-213.html)
4. [98426](http://www.securityfocus.com/bid/98426)
5. [](https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25794, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25794
- **State**: PUBLISHED
- **Published Date**: March 20, 2023 at 10:33 UTC
- **Last Updated**: January 13, 2025 at 15:50 UTC
- **Reserved Date**: February 15, 2023 at 12:11 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Mighty Digital Nooz plugin <= 1.6.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Mighty Digital - Nooz**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/nooz/wordpress-nooz-plugin-1-6-0-cross-site-scripting-xss?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1447, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1447
- **State**: PUBLISHED
- **Published Date**: May 03, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:51 UTC
- **Reserved Date**: May 03, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in main.php in SitePanel 2.6.1 and earlier (SitePanel2) allows remote attackers to execute arbitrary PHP code via the p parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16268](http://www.osvdb.org/16268)
2. [15213](http://secunia.com/advisories/15213)
3. [](http://www.gulftech.org/?node=research&article_id=00072-05032005)
4. [](http://forum.sitepanel2.com/index.php?showtopic=271)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-17853, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-17853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17853
- **State**: PUBLISHED
- **Published Date**: December 23, 2017 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 21:06 UTC
- **Reserved Date**: December 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.openwall.com/lists/oss-security/2017/12/21/2)
2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4374f256ce8182019353c0c639bb8d0695b4c941)
3. [](https://github.com/torvalds/linux/commit/4374f256ce8182019353c0c639bb8d0695b4c941)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-42598, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-42598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-42598
- **State**: PUBLISHED
- **Published Date**: April 28, 2025 at 08:20 UTC
- **Last Updated**: April 28, 2025 at 16:10 UTC
- **Reserved Date**: April 16, 2025 at 11:56 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Multiple SEIKO EPSON printer drivers for Windows OS are configured with an improper access permission settings when installed or used in a language other than English. If a user is directed to place a crafted DLL file in a location of an attacker's choosing, the attacker may execute arbitrary code with SYSTEM privilege on a Windows system on which the printer driver is installed.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**SEIKO EPSON CORPORATION - SEIKO EPSON printer drivers for Windows OS**
Affected versions:
- see the information provided by SEIKO EPSON CORPORATION. (Status: affected)
### References
1. [](https://www.epson.co.uk/en_GB/faq/KA-01993/contents?loc=en-us)
2. [](https://www.epson.jp/support/misc_t/250428_oshirase.htm)
3. [](https://www2.epson.jp/support/misc_t/windrv_productlist.pdf)
4. [](https://jvn.jp/en/vu/JVNVU90649144/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-3077, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-3077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3077
- **State**: PUBLISHED
- **Published Date**: November 09, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 20, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in util/icon_browser.php in the Horde Application Framework before 3.3.9 allows remote attackers to inject arbitrary web script or HTML via the subdir parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=630687)
2. [20100906 XSS in Horde Application Framework <=3.3.8, icon_browser.php](http://seclists.org/fulldisclosure/2010/Sep/82)
3. [FEDORA-2010-16592](http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050408.html)
4. [](http://git.horde.org/diff.php/horde/util/icon_browser.php?rt=horde-git&r1=a978a35c3e95e784253508fd4333d2fbb64830b6&r2=9342addbd2b95f184f230773daa4faf5ef6d65e9)
5. [FEDORA-2010-16555](http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050423.html)
6. [42140](http://secunia.com/advisories/42140)
7. [[announce] 20100928 Horde 3.3.9 (final)](http://lists.horde.org/archives/announce/2010/000557.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-29046, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-29046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29046
- **State**: PUBLISHED
- **Published Date**: May 17, 2021 at 10:27 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Asset module's category selector input field in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_asset_categories_admin_web_portlet_AssetCategoriesAdminPortlet_title parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://liferay.com)
2. [](https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120743501)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8784, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8784
- **State**: PUBLISHED
- **Published Date**: November 29, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 01:55 UTC
- **Reserved Date**: March 19, 2018 at 00:00 UTC
- **Assigned By**: checkpoint
### Vulnerability Description
FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Check Point Software Technologies Ltd. - FreeRDP**
Affected versions:
- All versions prior to 2.0.0-rc4 (Status: affected)
### References
1. [106938](http://www.securityfocus.com/bid/106938)
2. [USN-3845-1](https://usn.ubuntu.com/3845-1/)
3. [](https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/)
4. [](https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46211, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46211
- **State**: REJECTED
- **Last Updated**: January 27, 2023 at 00:00 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-22051, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-22051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22051
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 20:18 UTC
- **Last Updated**: September 13, 2024 at 16:41 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: GraalVM Compiler). Supported versions that are affected are Oracle GraalVM Enterprise Edition: 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - GraalVM Enterprise Edition**
Affected versions:
- Oracle GraalVM Enterprise Edition:21.3.6 (Status: affected)
- Oracle GraalVM Enterprise Edition:22.3.2 (Status: affected)
- Oracle GraalVM for JDK:17.0.7 (Status: affected)
- Oracle GraalVM for JDK:20.0.1 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2023.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4314, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4314
- **State**: PUBLISHED
- **Published Date**: August 20, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The System Snapshot feature in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.1 allows remote authenticated users to obtain sensitive password-hash information by reading the snapshot file, aka Bug ID CSCuv40422.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150812 Cisco TelePresence Video Communication Server Expressway Information Disclosure Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40439)
2. [1033266](http://www.securitytracker.com/id/1033266)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-0236, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-0236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0236
- **State**: PUBLISHED
- **Published Date**: January 18, 2022 at 16:52 UTC
- **Last Updated**: January 31, 2025 at 18:56 UTC
- **Reserved Date**: January 14, 2022 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**vjinfotech - WP Import Export**
Affected versions:
- 3.9.15 (Status: affected)
**vjinfotech - WP Import Export Lite**
Affected versions:
- 3.9.15 (Status: affected)
### References
1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0236)
2. [](https://plugins.trac.wordpress.org/changeset/2649762/wp-import-export-lite/trunk/includes/classes/class-wpie-general.php)
3. [](https://github.com/qurbat/CVE-2022-0236)
### Credits
- Karan Saini (Kloudle Inc.)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-1274, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-1274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1274
- **State**: PUBLISHED
- **Published Date**: March 14, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
FaceTime in Apple iOS before 7.1 allows physically proximate attackers to obtain sensitive FaceTime contact information by using the lock screen for an invalid FaceTime call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6162)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5356, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5356
- **State**: PUBLISHED
- **Published Date**: January 12, 2024 at 13:56 UTC
- **Last Updated**: May 22, 2025 at 04:09 UTC
- **Reserved Date**: October 03, 2023 at 12:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
Incorrect authorization checks in GitLab CE/EE from all versions starting from 8.13 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2, allows a user to abuse slack/mattermost integrations to execute slash commands as another user.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**GitLab - GitLab**
Affected versions:
- 8.13 (Status: affected)
- 16.6 (Status: affected)
- 16.7 (Status: affected)
### References
1. [GitLab Issue #427154](https://gitlab.com/gitlab-org/gitlab/-/issues/427154)
2. [HackerOne Bug Bounty Report #2188868](https://hackerone.com/reports/2188868)
### Credits
- Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-26773, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-26773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26773
- **State**: PUBLISHED
- **Published Date**: February 17, 2025 at 11:38 UTC
- **Last Updated**: February 18, 2025 at 19:30 UTC
- **Reserved Date**: February 14, 2025 at 06:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Adnan - Analytify**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-5-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0153, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0153
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1666](http://www.osvdb.org/1666)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-42533, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-42533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42533
- **State**: PUBLISHED
- **Published Date**: March 25, 2025 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 14:39 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the authentication module in Convivance StandVoice 4.5 through 6.2 allows remote attackers to execute arbitrary code via the GEST_LOGIN parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/7h30th3r0n3/eae27e0eed39741365c55dfd46b57dc8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37058, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37058
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 16:02 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 20, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9611, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9611
- **State**: PUBLISHED
- **Published Date**: July 26, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Ins_MIRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201811-12](https://security.gentoo.org/glsa/201811-12)
2. [](https://bugs.ghostscript.com/show_bug.cgi?id=698024)
3. [DSA-3986](http://www.debian.org/security/2017/dsa-3986)
4. [99975](http://www.securityfocus.com/bid/99975)
5. [](http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c7c55972758a93350882c32147801a3485b010fe)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-35065, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-35065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35065
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 18:31 UTC
- **Reserved Date**: June 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294)
2. [](https://github.com/gulpjs/glob-parent/commit/3e9f04a3b4349db7e1962d87c9a7398cda51f339)
3. [](https://github.com/gulpjs/glob-parent/pull/49)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2493, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2493
- **State**: PUBLISHED
- **Published Date**: July 10, 2023 at 12:40 UTC
- **Last Updated**: November 12, 2024 at 14:08 UTC
- **Reserved Date**: May 03, 2023 at 13:44 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The All In One Redirection WordPress plugin before 2.2.0 does not properly sanitise and escape multiple parameters before using them in an SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-89 SQL Injection: SQL Injection
### Affected Products
**Unknown - All In One Redirection**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a9a205a4-eef9-4f30-877a-4c562930650c)
### Credits
- Chien Vuong
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6329, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6329
- **State**: PUBLISHED
- **Published Date**: October 12, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
SQL injection vulnerability in Cisco Prime Collaboration Provisioning 10.6 and 11.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCut64074.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033783](http://www.securitytracker.com/id/1033783)
2. [20151008 Cisco Prime Collaboration Provisioning SQL Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151008-pcp)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3249, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3249
- **State**: PUBLISHED
- **Published Date**: June 17, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Puppet Enterprise 2.8.x before 2.8.7 allows remote attackers to obtain sensitive information via vectors involving hiding and unhiding nodes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [59197](http://secunia.com/advisories/59197)
2. [](http://puppetlabs.com/security/cve/cve-2014-3249)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16741, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16741
- **State**: PUBLISHED
- **Published Date**: January 12, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 09, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - PHOENIX CONTACT FL SWITCH**
Affected versions:
- PHOENIX CONTACT FL SWITCH (Status: affected)
### References
1. [](https://cert.vde.com/en-us/advisories/vde-2017-006)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-43542, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-43542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43542
- **State**: PUBLISHED
- **Published Date**: June 03, 2024 at 10:05 UTC
- **Last Updated**: August 13, 2024 at 20:04 UTC
- **Reserved Date**: September 19, 2023 at 14:48 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 9205 LTE Modem (Status: affected)
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- FSM10056 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QCA4004 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCA9984 (Status: affected)
- QCC710 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM4325 (Status: affected)
- QCM4490 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6024 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN7606 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9024 (Status: affected)
- QCS2290 (Status: affected)
- QCS4290 (Status: affected)
- QCS4490 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8155 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8380XP (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD460 (Status: affected)
- SD662 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SG4150P (Status: affected)
- SG8275P (Status: affected)
- SM4125 (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM8550P (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 665 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon Wear 1300 Platform (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X70 Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2230P (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9306 (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3999 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13496, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13496
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 11:07 UTC
- **Last Updated**: March 24, 2025 at 15:50 UTC
- **Reserved Date**: January 16, 2025 at 20:56 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 7.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This vulnerability was previously published as being fixed in version 7.2.2 which was incorrect. The correct fixed version is 7.3.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**rubengc - GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ea54436c-b623-4049-af19-9995c312476e?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/gamipress/trunk/libraries/ct/includes/class-ct-query.php#L160)
3. [](https://plugins.trac.wordpress.org/browser/gamipress/trunk/includes/ajax-functions.php#L39)
4. [](https://wordpress.org/plugins/gamipress/#developers)
5. [](https://plugins.trac.wordpress.org/changeset/3226227/)
6. [](https://abrahack.com/posts/gamipress-sqli/)
### Credits
- abrahack
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-24886, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-24886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24886
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: February 28, 2025 at 21:11 UTC
- **Reserved Date**: January 31, 2023 at 20:32 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-908: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24886)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-3537, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-3537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3537
- **State**: PUBLISHED
- **Published Date**: May 13, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 13, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in todooforum.php in Todoo Forum 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) id_post or (2) pg parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92318](http://osvdb.org/92318)
2. [59069](http://www.securityfocus.com/bid/59069)
3. [](http://packetstormsecurity.com/files/121290/Todoo-Forum-2.0-Cross-Site-Scripting-SQL-Injection.html)
4. [todooforum-todooforum-sql-injection(83599)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83599)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-2004, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-2004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2004
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 19:51 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In publishKeyEvent, publishMotionEvent and sendUnchainedFinishedSignal of InputTransport.cpp, there are uninitialized data leading to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-115739809
### Affected Products
**n/a - Android**
Affected versions:
- Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-03-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7415, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7415
- **State**: PUBLISHED
- **Published Date**: September 06, 2024 at 03:30 UTC
- **Last Updated**: September 06, 2024 at 13:44 UTC
- **Reserved Date**: August 02, 2024 at 12:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Remember Me Controls plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0.1. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**coffee2code - Remember Me Controls**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/01707346-86c2-45c8-a2c9-81a147506fa4?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3146603%40remember-me-controls&new=3146603%40remember-me-controls&sfp_email=&sfph_mail=)
3. [](https://plugins.trac.wordpress.org/browser/remember-me-controls/tags/2.0.1/tests/phpunit/bootstrap.php)
### Credits
- Matthew Rollings
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-7164, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-7164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7164
- **State**: PUBLISHED
- **Published Date**: June 13, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: nodejs
### Vulnerability Description
Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour.
### Affected Products
**The Node.js Project - Node.js**
Affected versions:
- 9.7.X+ (Status: affected)
- 10.x+ (Status: affected)
### References
1. [104463](http://www.securityfocus.com/bid/104463)
2. [](https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/)
3. [GLSA-202003-48](https://security.gentoo.org/glsa/202003-48)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-2575, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-2575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2575
- **State**: PUBLISHED
- **Published Date**: April 11, 2025 at 11:11 UTC
- **Last Updated**: April 11, 2025 at 13:22 UTC
- **Reserved Date**: March 20, 2025 at 21:01 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Z Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. Note: This requires Royal Shop theme to be installed.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**wpzita - Z Companion**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e0f7bba4-76c3-4904-bd96-2074147b33f5?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/z-companion/trunk/import/importer/wxr-importer.php#L149)
3. [](https://plugins.trac.wordpress.org/browser/z-companion/trunk/import/importer/wxr-importer.php#L63)
4. [](https://plugins.trac.wordpress.org/browser/z-companion/trunk/import/inc/importer.php#L148)
5. [](https://plugins.trac.wordpress.org/browser/z-companion/trunk/import/inc/importer.php#L62)
6. [](https://wordpress.org/plugins/z-companion/#developers)
7. [](https://plugins.trac.wordpress.org/changeset/3270130/)
### Credits
- Avraham Shemesh
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-1864, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-1864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1864
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:48 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. An attacker with JavaScript execution may be able to execute arbitrary code.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212317)
2. [](https://support.apple.com/en-us/HT212323)
3. [](https://support.apple.com/en-us/HT212324)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4878, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4878
- **State**: PUBLISHED
- **Published Date**: May 26, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: May 26, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Administration Console in Novell Access Manager before 3.1 SP1 allows attackers to access system files via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [accessmgr-admin-console-info-disclosure(51822)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51822)
2. [ADV-2009-1945](http://www.vupen.com/english/advisories/2009/1945)
3. [1022581](http://www.securitytracker.com/id?1022581)
4. [35734](http://www.securityfocus.com/bid/35734)
5. [35898](http://secunia.com/advisories/35898)
6. [](http://www.novell.com/documentation/novellaccessmanager31/accessmanager_readme/data/accessmanager_readme.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-28149, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-28149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28149
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 00:00 UTC
- **Last Updated**: November 07, 2024 at 16:49 UTC
- **Reserved Date**: March 12, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the IhisiServiceSmm module in Insyde InsydeH2O with kernel 5.2 before 05.28.42, 5.3 before 05.37.42, 5.4 before 05.45.39, 5.5 before 05.53.39, and 5.6 before 05.60.39 that could allow an attacker to modify UEFI variables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.insyde.com/security-pledge/SA-2023040)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5946, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5946
- **State**: PUBLISHED
- **Published Date**: September 26, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Directory traversal vulnerability in IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21988625)
2. [IT16944](http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944)
3. [93086](http://www.securityfocus.com/bid/93086)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-4904, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-4904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4904
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 20:35 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
### Affected Products
**IBM - Financial Transaction Manager**
Affected versions:
- 3.2.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6371260)
2. [ibm-ftm-cve20204904-csrf (191106)](https://exchange.xforce.ibmcloud.com/vulnerabilities/191106)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-1918, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-1918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1918
- **State**: PUBLISHED
- **Published Date**: April 22, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 08:40 UTC
- **Reserved Date**: April 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in submit.php in PHP-Fusion 6.01.14 and 6.00.307, when magic_quotes_gpc is disabled and the database table prefix is known, allows remote authenticated users to execute arbitrary SQL commands via the submit_info[] parameter in a link submission action. NOTE: it was later reported that 7.00.2 is also affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33295](http://secunia.com/advisories/33295)
2. [](http://www.php-fusion.co.uk/news.php)
3. [phpfusion-submit-sql-injection(41914)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41914)
4. [5470](https://www.exploit-db.com/exploits/5470)
5. [ADV-2008-1318](http://www.vupen.com/english/advisories/2008/1318/references)
6. [7576](https://www.exploit-db.com/exploits/7576)
7. [29930](http://secunia.com/advisories/29930)
8. [28855](http://www.securityfocus.com/bid/28855)
9. [51052](http://osvdb.org/51052)
10. [phpfusion-submitinfo-sql-injection(47610)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47610)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-0826, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-0826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0826
- **State**: PUBLISHED
- **Published Date**: October 03, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 01:57 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the HTC bootloader. Product: Android. Versions: Android kernel. Android ID: A-34949781.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-10-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-32675, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-32675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32675
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 16:09 UTC
- **Last Updated**: April 09, 2025 at 18:08 UTC
- **Reserved Date**: April 09, 2025 at 11:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help allows Server Side Request Forgery. This issue affects SEO Help: from n/a through 6.6.0.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**QuantumCloud - SEO Help**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/seo-help/vulnerability/wordpress-seo-help-plugin-6-6-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve)
### Credits
- Phan Trong Quan - VNPT Cyber Immunity (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-31639, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-31639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31639
- **State**: PUBLISHED
- **Published Date**: June 13, 2023 at 16:14 UTC
- **Last Updated**: January 03, 2025 at 18:08 UTC
- **Reserved Date**: May 25, 2022 at 21:05 UTC
- **Assigned By**: hp
### Vulnerability Description
Potential time-of-check to time-of-use (TOCTOU) vulnerabilities have been identified in the BIOS for certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
### Affected Products
**HP Inc. - HP PC BIOS**
Affected versions:
- See HP Security Bulletin reference for affected versions. (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_7149996-7150021-16/hpsbhf03814)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-14315, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-14315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14315
- **State**: PUBLISHED
- **Published Date**: July 28, 2019 at 00:23 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 27, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in upload.php in SunHater KCFinder 3.20-test1, 3.20-test2, 3.12, and earlier allows remote attackers to inject arbitrary web script or HTML via the CKEditorFuncNum parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sunhater/kcfinder/issues/180)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50381, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50381
- **State**: PUBLISHED
- **Published Date**: July 08, 2024 at 15:22 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 07, 2023 at 15:53 UTC
- **Assigned By**: talos
### Vulnerability Description
Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `targetAPSsid` request's parameter.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**LevelOne - WBR-6013**
Affected versions:
- RER4_A_v3411b_2T2R_LEV_09_170623 (Status: affected)
**Realtek - rtl819x Jungle SDK**
Affected versions:
- v3.4.11 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-56435, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-56435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56435
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 01:33 UTC
- **Last Updated**: January 08, 2025 at 17:20 UTC
- **Reserved Date**: December 26, 2024 at 08:45 UTC
- **Assigned By**: huawei
### Vulnerability Description
Cross-process screen stack vulnerability in the UIExtension module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2025/1/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-29138, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-29138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29138
- **State**: PUBLISHED
- **Published Date**: March 19, 2024 at 13:40 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 17, 2024 at 16:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DEV Institute Restrict User Access – Membership Plugin with Force allows Reflected XSS.This issue affects Restrict User Access – Membership Plugin with Force: from n/a through 2.5.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**DEV Institute - Restrict User Access – Membership Plugin with Force**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/restrict-user-access/wordpress-restrict-user-access-plugin-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Yudistira Arya (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1392, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1392
- **State**: PUBLISHED
- **Published Date**: March 07, 2012 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 01:30 UTC
- **Reserved Date**: February 28, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Dolphin Browser HD (mobi.mgeek.TunnyBrowser) application 6.2.0, 7.2.1, 7.3.0, and 7.4.0 for Android has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1392-vulnerability-in-DolphinBrowserHD.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-16328, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-16328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16328
- **State**: PUBLISHED
- **Published Date**: October 03, 2019 at 19:51 UTC
- **Last Updated**: August 05, 2024 at 01:10 UTC
- **Reserved Date**: September 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tomerfiliba/rpyc)
2. [](https://rpyc.readthedocs.io/en/latest/docs/security.html)
3. [openSUSE-SU-2020:0685](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html)
4. [openSUSE-SU-2020:0763](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-48480, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-48480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48480
- **State**: PUBLISHED
- **Published Date**: May 30, 2025 at 04:34 UTC
- **Last Updated**: May 30, 2025 at 22:01 UTC
- **Reserved Date**: May 22, 2025 at 12:11 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, an authorized user with the administrator role or with the privilege User::PERM_EDIT_USERS can create a user, specifying the path to the user's avatar ../.htaccess during creation, and then delete the user's avatar, resulting in the deletion of the file .htaccess in the folder /storage/app/public. This issue has been patched in version 1.8.180.
### Weakness Classification (CWE)
- CWE-841: Security Weakness
### Affected Products
**freescout-help-desk - freescout**
Affected versions:
- < 1.8.180 (Status: affected)
### References
1. [https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-pfjf-43mp-3gp2](https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-pfjf-43mp-3gp2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-21163, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-21163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21163
- **State**: PUBLISHED
- **Published Date**: March 09, 2021 at 17:46 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1111239)
3. [FEDORA-2021-c88a96bd4b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/)
4. [FEDORA-2021-4740239e28](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/)
5. [FEDORA-2021-78547312f2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/)
6. [DSA-4886](https://www.debian.org/security/2021/dsa-4886)
7. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-54408, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-54408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54408
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:13 UTC
- **Last Updated**: December 16, 2024 at 16:40 UTC
- **Reserved Date**: December 02, 2024 at 12:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Jake H. Youtube Video Grid allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Youtube Video Grid: from n/a through 1.9.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Jake H. - Youtube Video Grid**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/youmax-channel-embeds-for-youtube-businesses/vulnerability/wordpress-youtube-video-grid-plugin-1-9-csrf-to-settings-change-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-0039, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-0039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0039
- **State**: PUBLISHED
- **Published Date**: April 10, 2019 at 20:13 UTC
- **Last Updated**: September 16, 2024 at 16:12 UTC
- **Reserved Date**: October 11, 2018 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
If REST API is enabled, the Junos OS login credentials are vulnerable to brute force attacks. The high default connection limit of the REST API may allow an attacker to brute-force passwords using advanced scripting techniques. Additionally, administrators who do not enforce a strong password policy can increase the likelihood of success from brute force attacks. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D495, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.2 versions prior to 18.2R1-S5; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R1-S1.
### Weakness Classification (CWE)
- CWE-307: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 14.1X53 (Status: affected)
- 15.1 (Status: affected)
- 15.1X49 (Status: affected)
- 15.1X53 (Status: affected)
- 16.1 (Status: affected)
- 16.1X65 (Status: affected)
- 16.2 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.2X75 (Status: affected)
- 18.3 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA10928)
2. [107899](http://www.securityfocus.com/bid/107899)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-5428, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-5428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5428
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 13:31 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 28, 2024 at 07:30 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in SourceCodester Simple Online Bidding System 1.0. Affected by this vulnerability is the function save_product of the file /admin/index.php?page=manage_product of the component HTTP POST Request Handler. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-266383.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**SourceCodester - Simple Online Bidding System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-266383 | SourceCodester Simple Online Bidding System HTTP POST Request save_product cross-site request forgery](https://vuldb.com/?id.266383)
2. [VDB-266383 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.266383)
3. [Submit #345072 | SourceCodester Simple Online Bidding System 1.0 Cross-Site Request Forgery](https://vuldb.com/?submit.345072)
4. [](https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md)
### Credits
- kaikai145154 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1107, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1107
- **State**: PUBLISHED
- **Published Date**: March 09, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in news.php in NMDeluxe before 1.0.1 allows remote attackers to inject arbitrary web script or HTML via the nick parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-0860](http://www.vupen.com/english/advisories/2006/0860)
2. [17017](http://www.securityfocus.com/bid/17017)
3. [595](http://securityreason.com/securityalert/595)
4. [](http://evuln.com/vulns/93/summary.html)
5. [](http://nmdeluxe.com/index.php)
6. [nmdeluxe-news-xss(25069)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25069)
7. [19117](http://secunia.com/advisories/19117)
8. [20060317 [eVuln] NMDeluxe XSS & SQL Injection Vulnerabilities](http://www.securityfocus.com/archive/1/428002/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-5159, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-5159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5159
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [RHSA-2018:1415](https://access.redhat.com/errata/RHSA-2018:1415)
2. [GLSA-201810-01](https://security.gentoo.org/glsa/201810-01)
3. [RHSA-2018:1726](https://access.redhat.com/errata/RHSA-2018:1726)
4. [RHSA-2018:1414](https://access.redhat.com/errata/RHSA-2018:1414)
5. [GLSA-201811-13](https://security.gentoo.org/glsa/201811-13)
6. [](https://www.mozilla.org/security/advisories/mfsa2018-13/)
7. [44759](https://www.exploit-db.com/exploits/44759/)
8. [](https://www.mozilla.org/security/advisories/mfsa2018-11/)
9. [USN-3660-1](https://usn.ubuntu.com/3660-1/)
10. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1441941)
11. [1040896](http://www.securitytracker.com/id/1040896)
12. [DSA-4199](https://www.debian.org/security/2018/dsa-4199)
13. [USN-3645-1](https://usn.ubuntu.com/3645-1/)
14. [[debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html)
15. [[debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html)
16. [RHSA-2018:1725](https://access.redhat.com/errata/RHSA-2018:1725)
17. [DSA-4209](https://www.debian.org/security/2018/dsa-4209)
18. [](https://www.mozilla.org/security/advisories/mfsa2018-12/)
19. [104136](http://www.securityfocus.com/bid/104136)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-4067, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-4067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4067
- **State**: PUBLISHED
- **Published Date**: July 30, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Absolute path traversal vulnerability in the clInetSuiteX6.clWebDav ActiveX control in CLINETSUITEX6.OCX in Clever Internet ActiveX Suite 6.2 allows remote attackers to create or overwrite arbitrary files via a full pathname in the second argument to the GetToFile method. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4226](https://www.exploit-db.com/exploits/4226)
2. [20070730 Remote File Inclusion: it's not just for PHP anymore](http://www.attrition.org/pipermail/vim/2007-July/001729.html)
3. [ADV-2007-2659](http://www.vupen.com/english/advisories/2007/2659)
4. [25063](http://www.securityfocus.com/bid/25063)
5. [26213](http://secunia.com/advisories/26213)
6. [cleverinternet-gettofile-file-overwrite(35590)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35590)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3859, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3859
- **State**: PUBLISHED
- **Published Date**: August 26, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 17:09 UTC
- **Reserved Date**: October 05, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.
### Weakness Classification (CWE)
- CWE-214: Security Weakness
### Affected Products
**n/a - undertow**
Affected versions:
- Fixed in 2.2.15.Final (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2010378)
2. [](https://issues.redhat.com/browse/UNDERTOW-1979)
3. [](https://github.com/undertow-io/undertow/pull/1296)
4. [](https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2)
5. [](https://access.redhat.com/security/cve/CVE-2021-3859)
6. [](https://security.netapp.com/advisory/ntap-20221201-0004/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-3925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-3925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3925
- **State**: PUBLISHED
- **Published Date**: September 04, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in admin.php in Content Management Made Easy (CMME) 1.12 allows remote attackers to trigger the logout of an administrative user via a logout action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4220](http://securityreason.com/securityalert/4220)
2. [cmme-admin-csrf(44686)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44686)
3. [6313](https://www.exploit-db.com/exploits/6313)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-6939, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-6939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6939
- **State**: PUBLISHED
- **Published Date**: November 23, 2020 at 16:16 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 13, 2020 at 00:00 UTC
- **Assigned By**: Salesforce
### Vulnerability Description
Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.
### Affected Products
**n/a - Tableau Server**
Affected versions:
- versions affected on both Windows and Linux are: 2018.2 through 2018.2.27 (Status: affected)
- 2018.3 through 2018.3.24 (Status: affected)
- 2019.1 through 2019.1.22 (Status: affected)
- 2019.2 through 2019.2.18 (Status: affected)
- 2019.3 through 2019.3.14 (Status: affected)
- 2019.4 through 2019.4.13 (Status: affected)
- 2020.1 through 2020.1.10 (Status: affected)
- 2020.2 through 2020.2.7 (Status: affected)
- 2020.3 through 2020.3.2 (Status: affected)
### References
1. [](https://help.salesforce.com/articleView?id=000355686&type=1&mode=1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-13543, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-13543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13543
- **State**: PUBLISHED
- **Published Date**: December 03, 2020 at 16:24 UTC
- **Last Updated**: August 04, 2024 at 12:18 UTC
- **Reserved Date**: May 26, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
### Affected Products
**n/a - Webkit**
Affected versions:
- Webkit WebKitGTK 2.30.0 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155)
2. [GLSA-202012-10](https://security.gentoo.org/glsa/202012-10)
3. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-30648, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-30648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30648
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 19:54 UTC
- **Last Updated**: April 09, 2025 at 20:06 UTC
- **Reserved Date**: March 24, 2025 at 19:34 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS).
When a specifically malformed DHCP packet is received from a DHCP client, the jdhcpd process crashes, which will lead to the unavailability of the DHCP service and thereby resulting in a sustained DoS. The DHCP process will restart automatically to recover the service.
This issue will occur when dhcp-security is enabled.
This issue affects Junos OS:
* All versions before 21.2R3-S9,
* from 21.4 before 21.4R3-S10,
* from 22.2 before 22.2R3-S6,
* from 22.4 before 22.4R3-S6,
* from 23.2 before 23.2R2-S3,
* from 23.4 before 23.4R2-S4,
* from 24.2 before 24.2R2;
Junos OS Evolved: * from 22.4 before 22.4R3-S6-EVO,
* from 23.2 before 23.2R2-S3-EVO,
* from 23.4 before 23.4R2-S4-EVO,
* from 24.2 before 24.2R2-EVO.
.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 21.4 (Status: affected)
- 22.2 (Status: affected)
- 22.4 (Status: affected)
- 23.2 (Status: affected)
- 23.4 (Status: affected)
- 24.2 (Status: affected)
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 22.4 (Status: affected)
- 23.2 (Status: affected)
- 23.4 (Status: affected)
- 24.2 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA96458)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9351, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9351
- **State**: PUBLISHED
- **Published Date**: December 09, 2014 at 22:52 UTC
- **Last Updated**: September 17, 2024 at 00:41 UTC
- **Reserved Date**: December 09, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
engine/server/server.cpp in Teeworlds 0.6.x before 0.6.3 allows remote attackers to read memory and cause a denial of service (crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514)
2. [FEDORA-2014-15701](http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145173.html)
3. [](https://www.teeworlds.com/?page=news&id=11200)
4. [71301](http://www.securityfocus.com/bid/71301)
5. [FEDORA-2014-15670](http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145650.html)
6. [FEDORA-2014-15733](http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145172.html)
7. [](https://github.com/teeworlds/teeworlds/commit/a766cb44bcffcdb0b88e776d01c5ee1323d44f85)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3191, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3191
- **State**: PUBLISHED
- **Published Date**: March 17, 2016 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [84810](http://www.securityfocus.com/bid/84810)
2. [](http://vcs.pcre.org/pcre2?view=revision&revision=489)
3. [RHSA-2016:1132](https://access.redhat.com/errata/RHSA-2016:1132)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
5. [](http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886)
6. [RHSA-2016:1025](http://rhn.redhat.com/errata/RHSA-2016-1025.html)
7. [](https://bugs.debian.org/815921)
8. [](https://bugs.debian.org/815920)
9. [](https://bugzilla.redhat.com/show_bug.cgi?id=1311503)
10. [](https://bugs.exim.org/show_bug.cgi?id=1791)
11. [](https://www.tenable.com/security/tns-2016-18)
12. [](https://bto.bluecoat.com/security-advisory/sa128)
13. [](http://vcs.pcre.org/pcre?view=revision&revision=1631)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-32916, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-32916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32916
- **State**: PUBLISHED
- **Published Date**: December 15, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 18:35 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 16. An app may be able to disclose kernel memory.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213446)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-11446, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-11446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11446
- **State**: PUBLISHED
- **Published Date**: June 25, 2018 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 08:10 UTC
- **Reserved Date**: May 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The buy function of a smart contract implementation for Gold Reward (GRX), an Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the buyer because of overflow of the multiplication of its argument amount and a manipulable variable buyPrice, aka the "tradeTrap" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://peckshield.com/2018/06/11/tradeTrap/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-2637, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-2637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2637
- **State**: PUBLISHED
- **Published Date**: June 10, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in F5 FirePass SSL VPN 6.0.2 hotfix 3, and possibly earlier versions, allow remote attackers to inject arbitrary web script or HTML via quotes in (1) the css_exceptions parameter in vdesk/admincon/webyfiers.php and (2) the sql_matchscope parameter in vdesk/admincon/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1020205](http://www.securitytracker.com/id?1020205)
2. [ADV-2008-1765](http://www.vupen.com/english/advisories/2008/1765/references)
3. [20080605 F5 FirePass Content Inspection Management XSS](http://www.securityfocus.com/archive/1/493149/100/0/threaded)
4. [30550](http://secunia.com/advisories/30550)
5. [3931](http://securityreason.com/securityalert/3931)
6. [29574](http://www.securityfocus.com/bid/29574)
7. [firepass-webyfiers-index-xss(42884)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42884)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6669, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6669
- **State**: PUBLISHED
- **Published Date**: September 22, 2016 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 10, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92441](http://www.securityfocus.com/bid/92441)
2. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-37126, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-37126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37126
- **State**: PUBLISHED
- **Published Date**: July 02, 2024 at 07:28 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 03, 2024 at 12:08 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to unauthorized gain of root-level access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Dell - PowerScale OneFS**
Affected versions:
- 8.2.2.x (Status: affected)
- 9.7.0.1 (Status: affected)
- 9.7.0.3 (Status: affected)
- 9.8.0.0 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000226569/dsa-2024-255-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-25989, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-25989 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25989
- **State**: PUBLISHED
- **Published Date**: December 29, 2021 at 09:10 UTC
- **Last Updated**: April 30, 2025 at 15:44 UTC
- **Reserved Date**: January 22, 2021 at 00:00 UTC
- **Assigned By**: Mend
### Vulnerability Description
In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ifmeorg - ifme**
Affected versions:
- 1.0.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://github.com/ifmeorg/ifme/commit/df4986f0721a72779403d21d36c025fe95edffad)
2. [](https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25989)
### Credits
- WhiteSource Vulnerability Research Team (WVR)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-1734, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-1734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1734
- **State**: PUBLISHED
- **Published Date**: April 24, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 20:59 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Team Server affecting the following IBM Rational Products: Collaborative Lifecycle Management (CLM), Rational DOORS Next Generation (RDNG), Rational Engineering Lifecycle Manager (RELM), Rational Team Concert (RTC), Rational Quality Manager (RQM), Rational Rhapsody Design Manager (Rhapsody DM), and Rational Software Architect (RSA DM) stores potentially sensitive information in a cache that could be read by authenticated users. IBM X-Force ID: 134915.
### Affected Products
**IBM - Rational Engineering Lifecycle Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Quality Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Rhapsody Design Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.2 (Status: affected)
- 5.0.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational DOORS Next Generation**
Affected versions:
- 5.0.2 (Status: affected)
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Team Concert**
Affected versions:
- 5.0 (Status: affected)
- 5.0.2 (Status: affected)
- 5.0.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Software Architect Design Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.2 (Status: affected)
- 5.0.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22015635)
2. [ibm-jazz-cve20171734-info-disc(134915)](https://exchange.xforce.ibmcloud.com/vulnerabilities/134915)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-1339, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-1339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1339
- **State**: PUBLISHED
- **Published Date**: December 11, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: December 03, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The "XMLURL" property in the Spreadsheet component of Office Web Components (OWC) 10 follows redirections, which allows remote attackers to determine the existence of local files based on exceptions, or to read WorkSheet XML files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://security.greymagic.com/adv/gm008-ie/)
2. [20020408 Multiple local files detection issues with OWC in IE (GM#008-IE)](http://marc.info/?l=bugtraq&m=101830175621193&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5616, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5616
- **State**: PUBLISHED
- **Published Date**: August 04, 2020 at 01:05 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] free edition ver1.0.0, [Gallery01] free edition ver1.0.3 and earlier, [CalendarForm01] free edition ver1.0.3 and earlier, and [Link01] free edition ver1.0.0 allows remote attackers to bypass authentication and log in to the product with administrative privileges via unspecified vectors.
### Affected Products
**PHP Factory - [Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01]**
Affected versions:
- [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] free edition ver1.0.0, [Gallery01] free edition ver1.0.3 and earlier, [CalendarForm01] free edition ver1.0.3 and earlier, and [Link01] free edition ver1.0.0 (Status: affected)
### References
1. [](https://www.php-factory.net/calendar/01.php)
2. [](https://www.php-factory.net/calendar/02.php)
3. [](https://jvn.jp/en/jp/JVN73169744/index.html)
4. [](https://www.php-factory.net/news/pkobo-news01.php)
5. [](https://www.php-factory.net/vote/01.php)
6. [](https://www.php-factory.net/telop/01.php)
7. [](https://www.php-factory.net/gallery/01.php)
8. [](https://www.php-factory.net/calendar_form/01.php)
9. [](https://www.php-factory.net/link/01.php)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-4654, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-4654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4654
- **State**: PUBLISHED
- **Published Date**: August 18, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
IOMobileFrameBuffer in Apple iOS before 9.3.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036546](http://www.securitytracker.com/id/1036546)
2. [](https://support.apple.com/HT207026)
3. [92338](http://www.securityfocus.com/bid/92338)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-40470, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-40470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40470
- **State**: PUBLISHED
- **Published Date**: October 13, 2021 at 00:27 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
DirectX Graphics Kernel Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-45388, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-45388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45388
- **State**: REJECTED
- **Published Date**: January 12, 2022 at 16:13 UTC
- **Last Updated**: January 12, 2022 at 16:13 UTC
- **Reserved Date**: December 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0092, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0092
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: January 08, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-24630, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-24630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24630
- **State**: PUBLISHED
- **Published Date**: October 19, 2020 at 17:34 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 25, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote operatoronlinelist_content privilege escalation vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
### Affected Products
**n/a - HPE Intelligent Management Center (iMC)**
Affected versions:
- Prior to iMC PLAT 7.3 (E0705P07) (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-35570, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-35570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35570
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:50 UTC
- **Last Updated**: September 25, 2024 at 19:34 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Mobile Field Service product of Oracle E-Business Suite (component: Admin UI). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Mobile Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Mobile Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Mobile Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Mobile Field Service**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.10 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9304, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9304
- **State**: PUBLISHED
- **Published Date**: May 31, 2017 at 03:54 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: May 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the _yr_re_emit function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/VirusTotal/yara/commit/925bcf3c3b0a28b5b78e25d9efda5c0bf27ae699)
2. [](https://github.com/VirusTotal/yara/issues/674)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2186, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2186
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 06:37 UTC
- **Last Updated**: January 06, 2025 at 20:10 UTC
- **Reserved Date**: April 19, 2023 at 15:35 UTC
- **Assigned By**: trellix
### Vulnerability Description
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H`
### Weakness Classification (CWE)
- CWE-134: Security Weakness
### Affected Products
**Triangle MicroWorks - SCADA Data Gateway**
Affected versions:
- 5.01.03 (Status: affected)
### References
1. [](https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html)
### Credits
- Sam Quinn
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27217, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27217
- **State**: PUBLISHED
- **Published Date**: March 15, 2022 at 16:46 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 15, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
### Affected Products
**Jenkins project - Jenkins Vmware vRealize CodeStream Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.2 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2238)
2. [[oss-security] 20220315 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/03/15/2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16254, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16254
- **State**: PUBLISHED
- **Published Date**: March 21, 2019 at 16:51 UTC
- **Last Updated**: August 05, 2024 at 20:20 UTC
- **Reserved Date**: October 31, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at 0x9d014e4c the value for the flg key is copied using strcpy to the buffer at $sp+0x270. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow.
### Affected Products
**n/a - Insteon**
Affected versions:
- Insteon Hub 2245-222 - Firmware version 1012 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30288, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30288
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 06:31 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 07, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible stack overflow due to improper length check of TLV while copying the TLV to a local stack variable in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8053, APQ8096AU, AQT1000, AR8031, AR8035, CSR8811, CSRA6620, CSRA6640, CSRB31024, IPQ5010, IPQ5018, IPQ5028, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MSM8996AU, PMP8074, QCA1023, QCA1062, QCA1064, QCA10901, QCA2062, QCA2064, QCA2065, QCA2066, QCA4010, QCA4020, QCA4024, QCA6174A, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6694, QCA6696, QCA8072, QCA8075, QCA8081, QCA9369, QCA9377, QCA9379, QCA9888, QCA9889, QCA9984, QCM2290, QCM4290, QCM6125, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5121, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6122, QCN7605, QCN7606, QCN9000, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS405, QCS410, QCS4290, QCS605, QCS610, ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-43057, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-43057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43057
- **State**: PUBLISHED
- **Published Date**: November 11, 2023 at 15:31 UTC
- **Last Updated**: September 03, 2024 at 15:23 UTC
- **Reserved Date**: September 15, 2023 at 01:12 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267484.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**IBM - IBM QRadar SIEM**
Affected versions:
- 7.5.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7070736)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/267484)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.