System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3190 - **State**: PUBLISHED - **Published Date**: September 15, 2009 at 21:00 UTC - **Last Updated**: August 07, 2024 at 06:14 UTC - **Reserved Date**: September 15, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in PAD Site Scripts 3.6 allow remote attackers to execute arbitrary SQL commands via the (1) search parameter to list.php and (2) cat parameter to rss.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9531](http://www.exploit-db.com/exploits/9531) 2. [ADV-2009-2434](http://www.vupen.com/english/advisories/2009/2434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27732 - **State**: REJECTED - **Published Date**: July 07, 2022 at 19:45 UTC - **Last Updated**: July 07, 2022 at 19:45 UTC - **Reserved Date**: October 26, 2020 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48565 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 10:17 UTC - **Last Updated**: October 07, 2024 at 13:45 UTC - **Reserved Date**: November 16, 2023 at 23:29 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35055, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35055 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35055 - **State**: PUBLISHED - **Published Date**: October 11, 2023 at 15:14 UTC - **Last Updated**: September 18, 2024 at 13:56 UTC - **Reserved Date**: June 12, 2023 at 15:52 UTC - **Assigned By**: talos ### Vulnerability Description A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Yifan - YF325** Affected versions: - v1.0_20221108 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761) ### Credits - Discovered by Francesco Benvenuto of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43572 - **State**: PUBLISHED - **Published Date**: November 09, 2021 at 21:05 UTC - **Last Updated**: August 04, 2024 at 04:03 UTC - **Reserved Date**: November 09, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The verify function in the Stark Bank Python ECDSA library (aka starkbank-escada or ecdsa-python) before 2.0.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/) 2. [](https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1) 3. [](https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36019, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36019 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36019 - **State**: PUBLISHED - **Published Date**: May 30, 2024 at 14:59 UTC - **Last Updated**: May 04, 2025 at 09:10 UTC - **Reserved Date**: May 17, 2024 at 13:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: regmap: maple: Fix cache corruption in regcache_maple_drop() When keeping the upper end of a cache block entry, the entry[] array must be indexed by the offset from the base register of the block, i.e. max - mas.index. The code was indexing entry[] by only the register address, leading to an out-of-bounds access that copied some part of the kernel memory over the cache contents. This bug was not detected by the regmap KUnit test because it only tests with a block of registers starting at 0, so mas.index == 0. ### Affected Products **Linux - Linux** Affected versions: - f033c26de5a5734625d2dd1dc196745fae186f1b (Status: affected) - f033c26de5a5734625d2dd1dc196745fae186f1b (Status: affected) - f033c26de5a5734625d2dd1dc196745fae186f1b (Status: affected) **Linux - Linux** Affected versions: - 6.4 (Status: affected) - 0 (Status: unaffected) - 6.6.26 (Status: unaffected) - 6.8.5 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/3af6c5ac72dc5b721058132a0a1d7779e443175e) 2. [](https://git.kernel.org/stable/c/51c4440b9d3fd7c8234e6de9170a487c03506e53) 3. [](https://git.kernel.org/stable/c/00bb549d7d63a21532e76e4a334d7807a54d9f31)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30865, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30865 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30865 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 10:55 UTC - **Last Updated**: March 27, 2025 at 18:57 UTC - **Reserved Date**: March 26, 2025 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in fuzzoid 3DPrint Lite allows Cross Site Request Forgery. This issue affects 3DPrint Lite: from n/a through 2.1.3.5. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **fuzzoid - 3DPrint Lite** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/3dprint-lite/vulnerability/wordpress-3dprint-lite-plugin-2-1-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2636, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2636 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2636 - **State**: PUBLISHED - **Published Date**: March 07, 2017 at 22:00 UTC - **Last Updated**: August 05, 2024 at 14:02 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2017:0892](https://access.redhat.com/errata/RHSA-2017:0892) 2. [96732](http://www.securityfocus.com/bid/96732) 3. [1037963](http://www.securitytracker.com/id/1037963) 4. [RHSA-2017:0932](https://access.redhat.com/errata/RHSA-2017:0932) 5. [[oss-security] 20170307 Linux kernel: CVE-2017-2636: local privilege escalation flaw in n_hdlc](http://www.openwall.com/lists/oss-security/2017/03/07/6) 6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1428319) 7. [](https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html) 8. [RHSA-2017:1125](https://access.redhat.com/errata/RHSA-2017:1125) 9. [RHSA-2017:0933](https://access.redhat.com/errata/RHSA-2017:0933) 10. [RHSA-2017:1232](https://access.redhat.com/errata/RHSA-2017:1232) 11. [RHSA-2017:0931](https://access.redhat.com/errata/RHSA-2017:0931) 12. [DSA-3804](http://www.debian.org/security/2017/dsa-3804) 13. [RHSA-2017:1233](https://access.redhat.com/errata/RHSA-2017:1233) 14. [RHSA-2017:1488](https://access.redhat.com/errata/RHSA-2017:1488) 15. [RHSA-2017:0986](https://access.redhat.com/errata/RHSA-2017:0986) 16. [RHSA-2017:1126](https://access.redhat.com/errata/RHSA-2017:1126)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3708 - **State**: PUBLISHED - **Published Date**: August 19, 2008 at 19:10 UTC - **Last Updated**: August 07, 2024 at 09:45 UTC - **Reserved Date**: August 19, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in dotCMS 1.6.0.9 allow remote attackers to read arbitrary files via a .. (dot dot) in the id parameter to (1) news/index.dot and (2) getting_started/macros/macros_detail.dot. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31516](http://secunia.com/advisories/31516) 2. [4163](http://securityreason.com/securityalert/4163) 3. [30703](http://www.securityfocus.com/bid/30703) 4. [dotcms-index-macrosdetail-file-include(44491)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44491) 5. [6247](https://www.exploit-db.com/exploits/6247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6714, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6714 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6714 - **State**: REJECTED - **Published Date**: January 12, 2021 at 20:02 UTC - **Last Updated**: January 12, 2021 at 20:02 UTC - **Reserved Date**: January 09, 2020 at 00:00 UTC - **Assigned By**: Eaton ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7756, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7756 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7756 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3674, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3674 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3674 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 25, 2025 at 16:41 UTC - **Reserved Date**: August 02, 2021 at 00:00 UTC - **Assigned By**: fedora ### Vulnerability Description A flaw was found in rizin. The create_section_from_phdr function allocates space for ELF section data by processing the headers. Crafted values in the headers can cause out of bounds reads, which can lead to memory corruption and possibly code execution through the binary object's callback function. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - rizin** Affected versions: - affected rizin after version v0.2.1 until commit 1e0c34946dddf9b8e5e63933aefacf2b26d08103 (Status: affected) ### References 1. [](https://github.com/rizinorg/rizin/pull/1313) 2. [](https://gist.github.com/netspooky/61101e191afee95feda7dbd2f6b061c4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34024, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34024 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34024 - **State**: PUBLISHED - **Published Date**: June 18, 2024 at 05:44 UTC - **Last Updated**: November 15, 2024 at 20:34 UTC - **Reserved Date**: May 22, 2024 at 00:24 UTC - **Assigned By**: jpcert ### Vulnerability Description Observable response discrepancy issue exists in ID Link Manager and FUJITSU Software TIME CREATOR. If this vulnerability is exploited, an unauthenticated remote attacker may determine if a username is valid or not. ### Affected Products **Fsas Technologies Inc. - FUJITSU Business Application ID Link Manager II** Affected versions: - V1.8 and earlier (Status: affected) **Fsas Technologies Inc. - FUJITSU Software ID Link Manager** Affected versions: - V2.0 (Status: affected) **Fsas Technologies Inc. - FUJITSU Software TIME CREATOR ID Link Manager** Affected versions: - V2.3.0 (Status: affected) - V2.3.1 (Status: affected) - V2.4 (Status: affected) - V2.5 (Status: affected) - V2.6 (Status: affected) - and V2.7 (Status: affected) **Fsas Technologies Inc. - FUJITSU Software TIME CREATOR ID Link Manager** Affected versions: - V3.0 (Status: affected) - V3.0.2 (Status: affected) - V3.0.2.1 (Status: affected) - and V3.0.3 (Status: affected) **Fsas Technologies Inc. - FUJITSU Software TIME CREATOR ID Link Manager SaaS** Affected versions: - Versions before the maintenance on June 16 (Status: affected) - 2024 (Status: affected) ### References 1. [](https://www.fujitsu.com/jp/group/fsas/about/resources/security/2024/0617.html) 2. [](https://jvn.jp/en/jp/JVN65171386/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32790, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32790 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32790 - **State**: PUBLISHED - **Published Date**: October 03, 2023 at 12:40 UTC - **Last Updated**: September 05, 2024 at 18:16 UTC - **Reserved Date**: May 15, 2023 at 09:38 UTC - **Assigned By**: INCIBE ### Vulnerability Description Cross-Site Scripting (XSS) vulnerability in NXLog Manager 5.6.5633 version. This vulnerability allows an attacker to inject a malicious JavaScript payload into the 'Full Name' field during a user edit, due to improper sanitization of the input parameter. ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **NXLog - NXLog Manager** Affected versions: - 5.6.5633 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-nxlog-manager) ### Credits - Juampa Rodríguez
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20164 - **State**: PUBLISHED - **Published Date**: December 30, 2019 at 23:56 UTC - **Last Updated**: August 05, 2024 at 02:39 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_box_del() in isomedia/box_funcs.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1332)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32858 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 17:38 UTC - **Last Updated**: April 17, 2025 at 14:16 UTC - **Reserved Date**: April 11, 2025 at 13:04 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateWebServerGatewaySettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Siemens - TeleControl Server Basic** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-443402.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49514 - **State**: PUBLISHED - **Published Date**: November 12, 2024 at 16:59 UTC - **Last Updated**: November 12, 2024 at 17:23 UTC - **Reserved Date**: October 15, 2024 at 15:35 UTC - **Assigned By**: adobe ### Vulnerability Description Photoshop Desktop versions 24.7.3, 25.11 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **Adobe - Photoshop Desktop** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/photoshop/apsb24-89.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4729, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4729 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4729 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 01:11 UTC - **Last Updated**: January 30, 2025 at 20:44 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Counter Fraud Management for Safer Payments 5.7.0.00 through 5.7.0.10, 6.0.0.00 through 6.0.0.07, 6.1.0.00 through 6.1.0.05, and 6.2.0.00 through 6.2.1.00 could allow an authenticated attacker under special circumstances to send multiple specially crafted API requests that could cause the application to crash. IBM X-Force ID: 188052. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **IBM - Safer Payments** Affected versions: - 5.7.0.00 (Status: affected) - 6.0.0.00 (Status: affected) - 6.1.0.00 (Status: affected) - 6.2.0.00 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6985595) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/188052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0206, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0206 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0206 - **State**: PUBLISHED - **Published Date**: May 03, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier, and possibly other versions before 5.5, allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#221683](http://www.kb.cert.org/vuls/id/221683) 2. [phpnuke-index-command-execution(7914)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7914) 3. [3889](http://www.securityfocus.com/bid/3889) 4. [20020116 PHP-Nuke allows Command Execution & Much more](http://marc.info/?l=bugtraq&m=101121913914205&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1735 - **State**: PUBLISHED - **Published Date**: April 29, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 08:32 UTC - **Reserved Date**: April 11, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BitDefender Antivirus 2008 20080118 and earlier allows local users to cause a denial of service (system crash) via an invalid pointer to the CLIENT_ID structure in a call to the NtOpenProcess hooked System Service Descriptor Table (SSDT) function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-1384](http://www.vupen.com/english/advisories/2008/1384) 2. [3838](http://securityreason.com/securityalert/3838) 3. [30005](http://secunia.com/advisories/30005) 4. [](http://kb.bitdefender.com/KB419-en--Security-vulnerability-in-BitDefender-2008.html) 5. [bitdefender-ssdt-dos(42081)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42081) 6. [](http://www.coresecurity.com/?action=item&id=2249) 7. [20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls](http://www.securityfocus.com/archive/1/491405/100/0/threaded) 8. [28741](http://www.securityfocus.com/bid/28741) 9. [1019943](http://securitytracker.com/id?1019943)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1649, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1649 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1649 - **State**: PUBLISHED - **Published Date**: January 12, 2021 at 19:42 UTC - **Last Updated**: October 08, 2024 at 16:17 UTC - **Reserved Date**: December 02, 2020 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Active Template Library Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) ### References 1. [Active Template Library Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1649)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4655 - **State**: PUBLISHED - **Published Date**: February 26, 2010 at 18:09 UTC - **Last Updated**: August 07, 2024 at 07:08 UTC - **Reserved Date**: February 26, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie) 2. [60035](http://osvdb.org/60035) 3. [edirectory-dhost-session-hijacking(56613)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56613) 4. [](http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0093, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0093 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0093 - **State**: PUBLISHED - **Published Date**: March 09, 2016 at 11:00 UTC - **Last Updated**: August 05, 2024 at 22:08 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0094, CVE-2016-0095, and CVE-2016-0096. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [84054](http://www.securityfocus.com/bid/84054) 2. [39648](https://www.exploit-db.com/exploits/39648/) 3. [MS16-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-034) 4. [1035212](http://www.securitytracker.com/id/1035212)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31814 - **State**: PUBLISHED - **Published Date**: September 05, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 07:26 UTC - **Reserved Date**: May 31, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html) 2. [](https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/) 3. [](http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html) 4. [](http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html) 5. [](https://github.com/pfsense/FreeBSD-ports/pull/1169) 6. [](https://github.com/pfsense/FreeBSD-ports/pull/1169/commits/071bdcf2d918c3e51cde11cf81fbd9b6f0379d7e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39787 - **State**: PUBLISHED - **Published Date**: March 30, 2022 at 16:02 UTC - **Last Updated**: August 04, 2024 at 02:20 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In SystemUI, there is a possible arbitrary Activity launch due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-202506934 ### Affected Products **n/a - Android** Affected versions: - Android-12L (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-12l)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12544, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12544 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12544 - **State**: PUBLISHED - **Published Date**: October 10, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 08:38 UTC - **Reserved Date**: June 18, 2018 at 00:00 UTC - **Assigned By**: eclipse ### Vulnerability Description In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema. ### Weakness Classification (CWE) - CWE-611: Security Weakness ### Affected Products **The Eclipse Foundation - Eclipse Vert.x** Affected versions: - 3.5.0 (Status: affected) - unspecified (Status: affected) ### References 1. [RHSA-2018:2946](https://access.redhat.com/errata/RHSA-2018:2946) 2. [](https://github.com/vert-x3/vertx-web/issues/1021) 3. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568) 4. [[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list](https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37068, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37068 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37068 - **State**: PUBLISHED - **Published Date**: August 09, 2023 at 00:00 UTC - **Last Updated**: October 10, 2024 at 15:57 UTC - **Reserved Date**: June 28, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Code-Projects Gym Management System V1.0 allows remote attackers to execute arbitrary SQL commands via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username and password fields, enabling SQL Injection attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Mr-Secure-Code/My-CVE/blob/main/CVE-2023-37068-Exploit.md) 2. [](https://github.com/riteshs4hu/My-CVE/blob/main/CVE-2023-37068-Exploit.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29076, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29076 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29076 - **State**: PUBLISHED - **Published Date**: November 23, 2023 at 03:45 UTC - **Last Updated**: December 02, 2024 at 20:32 UTC - **Reserved Date**: March 30, 2023 at 21:27 UTC - **Assigned By**: autodesk ### Vulnerability Description A maliciously crafted MODEL, SLDASM, SAT or CATPART file when parsed through Autodesk AutoCAD 2024 and 2023 could cause memory corruption vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. ### Affected Products **Autodesk - AutoCAD, Advance Steel and Civil 3D** Affected versions: - 2024, 2023 (Status: affected) ### References 1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4879 - **State**: PUBLISHED - **Published Date**: May 12, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 00:46 UTC - **Reserved Date**: May 17, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. ### Affected Products **baserCMS Users Community - baserCMS plugin Mail** Affected versions: - version 3.0.10 and earlier (Status: affected) ### References 1. [](http://basercms.net/security/JVN92765814) 2. [JVN#92765814](https://jvn.jp/en/jp/JVN92765814/index.html) 3. [93217](http://www.securityfocus.com/bid/93217)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0827 - **State**: PUBLISHED - **Published Date**: February 19, 2008 at 21:00 UTC - **Last Updated**: August 07, 2024 at 08:01 UTC - **Reserved Date**: February 19, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Books module of PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [books-cid-sql-injection(40857)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40857) 2. [5147](https://www.exploit-db.com/exploits/5147) 3. [27863](http://www.securityfocus.com/bid/27863)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10441 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 13:04 UTC - **Last Updated**: August 04, 2024 at 10:58 UTC - **Reserved Date**: March 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-monthly.php by adding a question mark (?) followed by the payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antoniocannito.it/?p=137#uxss) 2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1919 - **State**: REJECTED - **Published Date**: January 05, 2018 at 14:00 UTC - **Last Updated**: January 05, 2018 at 13:57 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27799 - **State**: PUBLISHED - **Published Date**: February 26, 2021 at 21:31 UTC - **Last Updated**: August 03, 2024 at 21:33 UTC - **Reserved Date**: February 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.9.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/zint/tickets/218/) 2. [](http://zint.org.uk/Manual.aspx?type=p&page=3) 3. [](http://zint.org.uk/Manual.aspx?type=p&page=4) 4. [](http://zint.org.uk/Manual.aspx?type=p&page=5) 5. [](https://sourceforge.net/p/zint/code/ci/7f8c8114f31c09a986597e0ba63a49f96150368a/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2408, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2408 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2408 - **State**: PUBLISHED - **Published Date**: April 17, 2013 at 14:00 UTC - **Last Updated**: August 06, 2024 at 15:36 UTC - **Reserved Date**: March 05, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect integrity via vectors related to PIA Core Technology and use of Internet Explorer 6. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html) 2. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2005, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2005 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2005 - **State**: PUBLISHED - **Published Date**: April 25, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Eval injection vulnerability in index.php in ClanSys 1.1 allows remote attackers to execute arbitrary PHP code via PHP code in the page parameter, as demonstrated by using an "include" statement that is injected into the eval statement. NOTE: this issue has been described as file inclusion by some sources, but that is just one attack; the primary vulnerability is eval injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [clansys-index-file-include(25976)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25976) 2. [](http://www.nukedx.com/?getxpl=29) 3. [20060423 Advisory: Clansys <= 1.1 PHP Code Insertion Vulnerability.](http://www.securityfocus.com/archive/1/431873/100/0/threaded) 4. [782](http://securityreason.com/securityalert/782) 5. [1015988](http://securitytracker.com/id?1015988) 6. [25083](http://www.osvdb.org/25083) 7. [17660](http://www.securityfocus.com/bid/17660)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33882, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33882 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33882 - **State**: PUBLISHED - **Published Date**: July 12, 2023 at 08:32 UTC - **Last Updated**: December 03, 2024 at 17:04 UTC - **Reserved Date**: May 23, 2023 at 06:38 UTC - **Assigned By**: Unisoc ### Vulnerability Description In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2290, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2290 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2290 - **State**: PUBLISHED - **Published Date**: October 18, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 19:26 UTC - **Reserved Date**: April 19, 2012 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description The client in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375 allows remote attackers to execute arbitrary code by sending a crafted message over a TCP communication channel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50957](http://secunia.com/advisories/50957) 2. [86158](http://osvdb.org/86158) 3. [55883](http://www.securityfocus.com/bid/55883) 4. [1027647](http://www.securitytracker.com/id?1027647) 5. [20121010 ESA-2012-025: EMC NetWorker Module for Microsoft Applications (NMM) Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2012-10/0068.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38895 - **State**: PUBLISHED - **Published Date**: January 07, 2022 at 17:55 UTC - **Last Updated**: September 16, 2024 at 23:55 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209563. ### Affected Products **IBM - Security Verify Access** Affected versions: - 10.0.0 (Status: affected) - 10.0.2.0 (Status: affected) - 10.0.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6538418) 2. [ibm-sv-cve202138895-xss (209563)](https://exchange.xforce.ibmcloud.com/vulnerabilities/209563)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30706 - **State**: PUBLISHED - **Published Date**: July 26, 2022 at 05:10 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: July 19, 2022 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Open redirect vulnerability in Booked versions prior to 3.3 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL. ### Affected Products **Twinkle Toes Software - Booked** Affected versions: - versions prior to 3.3 (Status: affected) ### References 1. [](https://www.bookedscheduler.com/) 2. [](https://jvn.jp/en/jp/JVN75063798/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17217 - **State**: PUBLISHED - **Published Date**: October 06, 2019 at 15:23 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 06, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. There is no CSRF protection established on the web service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.140464)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-17384, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-17384 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-17384 - **State**: PUBLISHED - **Published Date**: August 25, 2020 at 07:35 UTC - **Last Updated**: May 08, 2025 at 09:12 UTC - **Reserved Date**: August 07, 2020 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With the cookie of the system administrator, attackers can inject and remotely execute arbitrary command to manipulate the system. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Cellopoint - CelloOS** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-3845-be6bf-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26820 - **State**: PUBLISHED - **Published Date**: November 10, 2020 at 16:14 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver AS JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it. ### Affected Products **SAP SE - SAP NetWeaver AS JAVA** Affected versions: - < 7.20 (Status: affected) - < 7.30 (Status: affected) - < 7.31 (Status: affected) - < 7.40 (Status: affected) - < 7.50 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571) 2. [](https://launchpad.support.sap.com/#/notes/2979062) 3. [20210405 Onapsis Security Advisory 2021-0004: [CVE-2020-26820] - SAP Java OS Remote Code Execution](http://seclists.org/fulldisclosure/2021/Apr/7) 4. [](http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28007 - **State**: PUBLISHED - **Published Date**: March 28, 2024 at 00:52 UTC - **Last Updated**: January 14, 2025 at 03:51 UTC - **Reserved Date**: February 29, 2024 at 08:40 UTC - **Assigned By**: NEC ### Vulnerability Description Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary command with the root privilege via the internet. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **NEC Corporation - WG1800HP4** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HS3** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1900HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HP3** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1800HP3** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HS2** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1900HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - W1200EX(-MS)** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HS** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WF300HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - W300P** Affected versions: - all versions (Status: affected) **NEC Corporation - WF800HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8165N** Affected versions: - all versions (Status: affected) **NEC Corporation - WG2200HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WF1200HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1800HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - WF1200HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG600HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG300HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WF300HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1800HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1400HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8175N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR9300N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8750N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8160N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR9500N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8600N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8370N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8170N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8700N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8300N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8150N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR4100N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR4500N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8100N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8500N** Affected versions: - all versions (Status: affected) **NEC Corporation - CR2500P** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8400N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8200N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR1200H** Affected versions: - all versions (Status: affected) **NEC Corporation - WR7870S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR6670S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR7850S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR6650S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR6600H** Affected versions: - all versions (Status: affected) **NEC Corporation - WR7800H** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3400RN** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3450RN** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3500R** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3600R** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3800R** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8166N** Affected versions: - all versions (Status: affected) **NEC Corporation - MR01LN** Affected versions: - all versions (Status: affected) **NEC Corporation - MR02LN** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1810HP(JE)** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1810HP(MF)** Affected versions: - all versions (Status: affected) ### References 1. [](https://jpn.nec.com/security-info/secinfo/nv24-001_en.html) ### Credits - Katsuhiko Sato and Ryo Kashiro of 00One, Inc.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6844 - **State**: PUBLISHED - **Published Date**: December 15, 2016 at 06:31 UTC - **Last Updated**: August 06, 2024 at 01:43 UTC - **Reserved Date**: August 18, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Script code within SVG files is maintained when opening such files "in browser" based on our Mail or Drive app. In case of "a" tags, this may include link targets with base64 encoded "data" references. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93457](http://www.securityfocus.com/bid/93457) 2. [](https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7806, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7806 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7806 - **State**: PUBLISHED - **Published Date**: May 06, 2020 at 12:50 UTC - **Last Updated**: August 04, 2024 at 09:41 UTC - **Reserved Date**: January 22, 2020 at 00:00 UTC - **Assigned By**: krcert ### Vulnerability Description Tobesoft Xplatform 9.2.2.250 and earlier version have an arbitrary code execution vulnerability by using method supported by Xplatform ActiveX Control. It allows attacker to cause remote code execution. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-494: Security Weakness ### Affected Products **Tobesoft - Xplatform** Affected versions: - 9.2.2.250 (Status: affected) ### References 1. [](http://support.tobesoft.co.kr/Support/index.html) 2. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35359) ### Credits - Thanks to Jeongun Baek for reporting this vulnerability
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3924 - **State**: REJECTED - **Published Date**: June 11, 2021 at 19:25 UTC - **Last Updated**: June 11, 2021 at 19:25 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31777 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 14:51 UTC - **Last Updated**: April 02, 2025 at 15:22 UTC - **Reserved Date**: April 01, 2025 at 13:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in BeastThemes Clockinator Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Clockinator Lite: from n/a through 1.0.7. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **BeastThemes - Clockinator Lite** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/clockify-lite/vulnerability/wordpress-clockinator-lite-plugin-1-0-7-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0435, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0435 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0435 - **State**: PUBLISHED - **Published Date**: February 02, 2013 at 00:00 UTC - **Last Updated**: August 06, 2024 at 14:25 UTC - **Reserved Date**: December 07, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 2. [MDVSA-2013:095](http://www.mandriva.com/security/advisories?name=MDVSA-2013:095) 3. [SSRT101156](http://marc.info/?l=bugtraq&m=136570436423916&w=2) 4. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html) 5. [oval:org.mitre.oval:def:19520](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19520) 6. [RHSA-2013:0236](http://rhn.redhat.com/errata/RHSA-2013-0236.html) 7. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html) 8. [VU#858729](http://www.kb.cert.org/vuls/id/858729) 9. [RHSA-2013:0237](http://rhn.redhat.com/errata/RHSA-2013-0237.html) 10. [HPSBUX02857](http://marc.info/?l=bugtraq&m=136439120408139&w=2) 11. [57729](http://www.securityfocus.com/bid/57729) 12. [RHSA-2013:0247](http://rhn.redhat.com/errata/RHSA-2013-0247.html) 13. [](http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/c1fa21042291) 14. [oval:org.mitre.oval:def:16489](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16489) 15. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2) 16. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906892) 17. [SSRT101103](http://marc.info/?l=bugtraq&m=136439120408139&w=2) 18. [openSUSE-SU-2013:0312](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html) 19. [openSUSE-SU-2013:0377](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html) 20. [RHSA-2013:0246](http://rhn.redhat.com/errata/RHSA-2013-0246.html) 21. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html) 22. [HPSBUX02864](http://marc.info/?l=bugtraq&m=136570436423916&w=2) 23. [RHSA-2013:0245](http://rhn.redhat.com/errata/RHSA-2013-0245.html) 24. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html) 25. [](http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS) 26. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2) 27. [oval:org.mitre.oval:def:19078](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19078) 28. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1106 - **State**: PUBLISHED - **Published Date**: July 29, 2019 at 14:08 UTC - **Last Updated**: August 04, 2024 at 18:06 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107. ### Affected Products **Microsoft - Microsoft Edge** Affected versions: - Windows Server 2016 (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) - Windows Server 2019 (Status: affected) - Windows 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - Microsoft Edge on Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge on Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Edge on Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - ChakraCore** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0038 - **State**: PUBLISHED - **Published Date**: March 22, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 16:18 UTC - **Reserved Date**: December 20, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [linux-netfilter-doreplace-overflow(25400)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25400) 2. [ADV-2006-2554](http://www.vupen.com/english/advisories/2006/2554) 3. [20716](http://secunia.com/advisories/20716) 4. [ADV-2006-1046](http://www.vupen.com/english/advisories/2006/1046) 5. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=186295) 6. [USN-302-1](http://www.ubuntu.com/usn/usn-302-1) 7. [DSA-1097](http://www.debian.org/security/2006/dsa-1097) 8. [RHSA-2006:0575](http://www.redhat.com/support/errata/RHSA-2006-0575.html) 9. [oval:org.mitre.oval:def:10945](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10945) 10. [](http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee4bb818ae35f68d1f848eae0a7b150a38eb4168) 11. [DSA-1103](http://www.debian.org/security/2006/dsa-1103) 12. [21465](http://secunia.com/advisories/21465) 13. [](http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm) 14. [22417](http://secunia.com/advisories/22417) 15. [19330](http://secunia.com/advisories/19330) 16. [17178](http://www.securityfocus.com/bid/17178) 17. [20671](http://secunia.com/advisories/20671) 18. [20914](http://secunia.com/advisories/20914)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4517 - **State**: PUBLISHED - **Published Date**: May 06, 2024 at 03:00 UTC - **Last Updated**: August 01, 2024 at 20:40 UTC - **Reserved Date**: May 05, 2024 at 11:29 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /view/teacher_salary_invoice1.php. The manipulation of the argument date leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263121 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-263121 | Campcodes Complete Web-Based School Management System teacher_salary_invoice1.php cross site scripting](https://vuldb.com/?id.263121) 2. [VDB-263121 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263121) 3. [Submit #329698 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.329698) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%205.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5555 - **State**: REJECTED - **Published Date**: November 05, 2020 at 22:04 UTC - **Last Updated**: November 05, 2020 at 22:04 UTC - **Reserved Date**: October 24, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4066 - **State**: PUBLISHED - **Published Date**: May 06, 2019 at 18:38 UTC - **Last Updated**: August 05, 2024 at 05:04 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable cross-site request forgery vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an authenticated user to perform privileged requests unknowingly, resulting in unauthenticated requests being requested through an authenticated user. An attacker can get an authenticated user to request authenticated pages on the attacker's behalf to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **n/a - Sierra Wireless** Affected versions: - Sierra Wireless AirLink ES450 FW 4.9.3 (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03) 3. [108147](http://www.securityfocus.com/bid/108147) 4. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5158 - **State**: PUBLISHED - **Published Date**: October 01, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: September 30, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The focus handling for the onkeydown event in Microsoft Internet Explorer 6.0 allows remote attackers to change field focus and copy keystrokes via a certain use of a JavaScript htmlFor attribute, as demonstrated by changing focus from a textarea to a file upload field, a related issue to CVE-2007-3511. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [41382](http://osvdb.org/41382) 2. [ie-onkeydown-information-disclosure(36848)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36848) 3. [25836](http://www.securityfocus.com/bid/25836) 4. [27007](http://secunia.com/advisories/27007) 5. [](http://www.0x000000.com/index.php?i=437)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4648, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4648 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4648 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5776, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5776 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5776 - **State**: PUBLISHED - **Published Date**: December 30, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 11:04 UTC - **Reserved Date**: December 30, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7482](https://www.exploit-db.com/exploits/7482) 2. [32850](http://www.securityfocus.com/bid/32850)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1728 - **State**: PUBLISHED - **Published Date**: February 01, 2016 at 11:00 UTC - **Last Updated**: August 05, 2024 at 23:02 UTC - **Reserved Date**: January 13, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The Cascading Style Sheets (CSS) implementation in Apple iOS before 9.2.1 and Safari before 9.0.3 mishandles the "a:visited button" selector during height processing, which makes it easier for remote attackers to obtain sensitive browser-history information via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html) 2. [81263](http://www.securityfocus.com/bid/81263) 3. [20160311 WebKitGTK+ Security Advisory WSA-2016-0002](http://www.securityfocus.com/archive/1/537771/100/0/threaded) 4. [1034737](http://www.securitytracker.com/id/1034737) 5. [](https://support.apple.com/HT205730) 6. [APPLE-SA-2016-01-19-1](http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html) 7. [GLSA-201706-15](https://security.gentoo.org/glsa/201706-15) 8. [](https://support.apple.com/HT205732) 9. [APPLE-SA-2016-01-19-3](http://lists.apple.com/archives/security-announce/2016/Jan/msg00004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1325, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1325 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1325 - **State**: PUBLISHED - **Published Date**: April 12, 2007 at 19:00 UTC - **Last Updated**: September 16, 2024 at 16:14 UTC - **Reserved Date**: April 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SV_CheckForDuplicateNames function in Valve Software Half-Life CSTRIKE Dedicated Server 1.1.1.0 and earlier allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) via a certain connection string to UDP port 27015 that represents "absence of player informations," a related issue to CVE-2006-0734. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/0304-exploits/hl-headnut.c) 2. [](http://aluigi.altervista.org/adv/csdos.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0616 - **State**: PUBLISHED - **Published Date**: February 26, 2009 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:57 UTC - **Reserved Date**: February 18, 2009 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Application Networking Manager (ANM) before 2.0 uses default usernames and passwords, which makes it easier for remote attackers to access the application, or cause a denial of service via configuration changes, related to "default user credentials during installation." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33903](http://www.securityfocus.com/bid/33903) 2. [1021771](http://www.securitytracker.com/id?1021771) 3. [20090225 Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30067, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30067 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30067 - **State**: PUBLISHED - **Published Date**: June 11, 2024 at 16:59 UTC - **Last Updated**: June 05, 2025 at 01:08 UTC - **Reserved Date**: March 22, 2024 at 23:12 UTC - **Assigned By**: microsoft ### Vulnerability Description Winlogon Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Winlogon Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30067)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3992, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3992 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3992 - **State**: PUBLISHED - **Published Date**: December 17, 2019 at 21:55 UTC - **Last Updated**: August 04, 2024 at 19:26 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **n/a - ELOG** Affected versions: - ELOG 3.1.4-57bea22 and below (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2019-53) 2. [FEDORA-2020-9f8bc040c8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2IN3FP6VXYSD4OMUCFZNOL7MKPWRQFAL/) 3. [FEDORA-2020-f49fe7f011](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4IAS4HI24H2ERKBZTDEVJ3LEQEFWYSCT/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35857 - **State**: PUBLISHED - **Published Date**: July 13, 2022 at 21:22 UTC - **Last Updated**: August 03, 2024 at 09:44 UTC - **Reserved Date**: July 13, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description kvf-admin through 2022-02-12 allows remote attackers to execute arbitrary code because deserialization is mishandled. The rememberMe parameter is encrypted with a hardcoded key from the com.kalvin.kvf.common.shiro.ShiroConfig file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kalvinGit/kvf-admin/issues/16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5092 - **State**: REJECTED - **Published Date**: January 05, 2021 at 19:06 UTC - **Last Updated**: January 05, 2021 at 19:06 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0891, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0891 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0891 - **State**: PUBLISHED - **Published Date**: February 25, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:48 UTC - **Reserved Date**: February 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in NOCC Webmail 1.0 allow remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing NULL (%00) byte in (1) the _SESSION['nocc_theme'] parameter in (a) html/footer.php; and (2) the lang and (3) theme parameters and the (4) Accept-Language HTTP header field, when force_default_lang is disabled, in (b) index.php, as demonstrated by injecting PHP code into a profile and accessing it using the lang parameter in index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1015671](http://securitytracker.com/id?1015671) 2. [nocc-index-file-include(24934)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24934) 3. [23416](http://www.osvdb.org/23416) 4. [20060223 NOCC Webmail <= 1.0 multiple vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html) 5. [23417](http://www.osvdb.org/23417) 6. [16921](http://secunia.com/advisories/16921) 7. [](http://retrogod.altervista.org/noccw_10_incl_xpl.html) 8. [16793](http://www.securityfocus.com/bid/16793) 9. [23418](http://www.osvdb.org/23418) 10. [23419](http://www.osvdb.org/23419)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31016 - **State**: PUBLISHED - **Published Date**: November 02, 2023 at 18:36 UTC - **Last Updated**: September 06, 2024 at 19:36 UTC - **Reserved Date**: April 22, 2023 at 02:38 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA GPU Display Driver for Windows contains a vulnerability where an uncontrolled search path element may allow an attacker to execute arbitrary code, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **nvidia - NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver** Affected versions: - All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5491)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6675 - **State**: PUBLISHED - **Published Date**: June 13, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 09, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web interface of Cisco Industrial Network Director could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against an affected system. More Information: CSCvd25405. Known Affected Releases: 1.1(0.176). ### Affected Products **n/a - Cisco Industrial Network Director** Affected versions: - Cisco Industrial Network Director (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ind) 2. [98962](http://www.securityfocus.com/bid/98962)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2757 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 30, 2024 at 15:41 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 7u251, 8u241, 11.0.6, 14 (Status: affected) - Java SE Embedded: 8u241 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 2. [](https://security.netapp.com/advisory/ntap-20200416-0004/) 3. [DSA-4662](https://www.debian.org/security/2020/dsa-4662) 4. [USN-4337-1](https://usn.ubuntu.com/4337-1/) 5. [[debian-lts-announce] 20200429 [SECURITY] [DLA 2193-1] openjdk-7 security update](https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html) 6. [DSA-4668](https://www.debian.org/security/2020/dsa-4668) 7. [FEDORA-2020-5386fe3bbb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/) 8. [FEDORA-2020-21ca991b3b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/) 9. [FEDORA-2020-a60ad9d4ec](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/) 10. [openSUSE-SU-2020:0757](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html) 11. [openSUSE-SU-2020:0800](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html) 12. [GLSA-202006-22](https://security.gentoo.org/glsa/202006-22) 13. [openSUSE-SU-2020:0841](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html) 14. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10332) 15. [GLSA-202209-15](https://security.gentoo.org/glsa/202209-15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3715 - **State**: PUBLISHED - **Published Date**: May 05, 2016 at 18:00 UTC - **Last Updated**: February 07, 2025 at 13:27 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog) 2. [openSUSE-SU-2016:1266](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html) 3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html) 4. [](https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588) 5. [openSUSE-SU-2016:1326](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html) 6. [USN-2990-1](http://www.ubuntu.com/usn/USN-2990-1) 7. [openSUSE-SU-2016:1261](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html) 8. [20160513 May 2016 - HipChat Server - Critical Security Advisory](http://www.securityfocus.com/archive/1/538378/100/0/threaded) 9. [39767](https://www.exploit-db.com/exploits/39767/) 10. [SUSE-SU-2016:1260](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html) 11. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html) 12. [[oss-security] 20160504 Re: ImageMagick Is On Fire -- CVE-2016-3714](http://www.openwall.com/lists/oss-security/2016/05/03/18) 13. [DSA-3746](http://www.debian.org/security/2016/dsa-3746) 14. [GLSA-201611-21](https://security.gentoo.org/glsa/201611-21) 15. [SUSE-SU-2016:1275](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html) 16. [SSA:2016-132-01](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568) 17. [](https://www.imagemagick.org/script/changelog.php) 18. [DSA-3580](http://www.debian.org/security/2016/dsa-3580) 19. [RHSA-2016:0726](http://rhn.redhat.com/errata/RHSA-2016-0726.html) 20. [89852](http://www.securityfocus.com/bid/89852)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20966, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20966 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20966 - **State**: PUBLISHED - **Published Date**: August 12, 2019 at 15:19 UTC - **Last Updated**: August 05, 2024 at 12:19 UTC - **Reserved Date**: August 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The woocommerce-jetpack plugin before 3.8.0 for WordPress has XSS in the Products Per Page feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/woocommerce-jetpack/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47531 - **State**: PUBLISHED - **Published Date**: May 24, 2024 at 15:09 UTC - **Last Updated**: May 04, 2025 at 07:12 UTC - **Reserved Date**: May 24, 2024 at 15:02 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP In commit 510410bfc034 ("drm/msm: Implement mmap as GEM object function") we switched to a new/cleaner method of doing things. That's good, but we missed a little bit. Before that commit, we used to _first_ run through the drm_gem_mmap_obj() case where `obj->funcs->mmap()` was NULL. That meant that we ran: vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP; vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags)); vma->vm_page_prot = pgprot_decrypted(vma->vm_page_prot); ...and _then_ we modified those mappings with our own. Now that `obj->funcs->mmap()` is no longer NULL we don't run the default code. It looks like the fact that the vm_flags got VM_IO / VM_DONTDUMP was important because we're now getting crashes on Chromebooks that use ARC++ while logging out. Specifically a crash that looks like this (this is on a 5.10 kernel w/ relevant backports but also seen on a 5.15 kernel): Unable to handle kernel paging request at virtual address ffffffc008000000 Mem abort info: ESR = 0x96000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 swapper pgtable: 4k pages, 39-bit VAs, pgdp=000000008293d000 [ffffffc008000000] pgd=00000001002b3003, p4d=00000001002b3003, pud=00000001002b3003, pmd=0000000000000000 Internal error: Oops: 96000006 [#1] PREEMPT SMP [...] CPU: 7 PID: 15734 Comm: crash_dump64 Tainted: G W 5.10.67 #1 [...] Hardware name: Qualcomm Technologies, Inc. sc7280 IDP SKU2 platform (DT) pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--) pc : __arch_copy_to_user+0xc0/0x30c lr : copyout+0xac/0x14c [...] Call trace: __arch_copy_to_user+0xc0/0x30c copy_page_to_iter+0x1a0/0x294 process_vm_rw_core+0x240/0x408 process_vm_rw+0x110/0x16c __arm64_sys_process_vm_readv+0x30/0x3c el0_svc_common+0xf8/0x250 do_el0_svc+0x30/0x80 el0_svc+0x10/0x1c el0_sync_handler+0x78/0x108 el0_sync+0x184/0x1c0 Code: f8408423 f80008c3 910020c6 36100082 (b8404423) Let's add the two flags back in. While we're at it, the fact that we aren't running the default means that we _don't_ need to clear out VM_PFNMAP, so remove that and save an instruction. NOTE: it was confirmed that VM_IO was the important flag to fix the problem I was seeing, but adding back VM_DONTDUMP seems like a sane thing to do so I'm doing that too. ### Affected Products **Linux - Linux** Affected versions: - 510410bfc034c57cc3caf1572aa47c1017bab2f9 (Status: affected) - 510410bfc034c57cc3caf1572aa47c1017bab2f9 (Status: affected) **Linux - Linux** Affected versions: - 5.15 (Status: affected) - 0 (Status: unaffected) - 5.15.7 (Status: unaffected) - 5.16 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/8e2b7fe5e8a4be5e571561d9afcfbd92097288ba) 2. [](https://git.kernel.org/stable/c/3466d9e217b337bf473ee629c608e53f9f3ab786)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28766 - **State**: PUBLISHED - **Published Date**: November 17, 2022 at 22:36 UTC - **Last Updated**: April 29, 2025 at 19:37 UTC - **Reserved Date**: April 06, 2022 at 00:00 UTC - **Assigned By**: Zoom ### Vulnerability Description Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Zoom Video Communications Inc - Zoom Client for Meetings for Windows (32-bit)** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom VDI Windows Meeting Client for Windows (32-bit)** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom Rooms for Conference Room for Windows (32-bit)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://explore.zoom.us/en/trust/security/security-bulletin/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36778 - **State**: PUBLISHED - **Published Date**: September 13, 2022 at 14:58 UTC - **Last Updated**: September 17, 2024 at 03:38 UTC - **Reserved Date**: July 26, 2022 at 00:00 UTC - **Assigned By**: INCD ### Vulnerability Description insert HTML / js code inside input how to get to the vulnerable input : Workers &gt; worker nickname &gt; inject in this input the code. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Synel - eHarmony** Affected versions: - v11 (Status: affected) ### References 1. [](https://www.gov.il/en/departments/faq/cve_advisories) ### Credits - Moriel Harush - Sophtix Security LTD
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13254, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13254 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13254 - **State**: PUBLISHED - **Published Date**: July 04, 2019 at 15:06 UTC - **Last Updated**: August 04, 2024 at 23:49 UTC - **Reserved Date**: July 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XnView Classic 2.48 has a User Mode Write AV starting at xnview+0x000000000032e808. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/apriorit/pentesting/blob/master/bugs/xnview/0x000000000032e808.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51574 - **State**: PUBLISHED - **Published Date**: November 11, 2024 at 05:46 UTC - **Last Updated**: November 11, 2024 at 11:48 UTC - **Reserved Date**: October 30, 2024 at 15:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Simple Goods allows Stored XSS.This issue affects Simple Goods: from n/a through 0.1.3. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Simple Goods - Simple Goods** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/simple-goods/wordpress-simple-goods-plugin-0-1-3-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1783 - **State**: PUBLISHED - **Published Date**: April 13, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:27 UTC - **Reserved Date**: April 13, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in PatroNet CMS allows remote attackers to inject arbitrary web script or HTML via the URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060412 PatroNet CMS Xss Vuln](http://www.securityfocus.com/archive/1/430868/100/0/threaded) 2. [17495](http://www.securityfocus.com/bid/17495)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18837 - **State**: PUBLISHED - **Published Date**: April 20, 2020 at 16:03 UTC - **Last Updated**: August 05, 2024 at 21:37 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by vertical privilege escalation. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000049025/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Fully-Managed-Switches-PSV-2017-1973)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4476, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4476 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4476 - **State**: PUBLISHED - **Published Date**: November 13, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 16:45 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.samba.org/samba/history/samba-4.1.1.html) 2. [](http://www.samba.org/samba/history/samba-4.0.11.html) 3. [GLSA-201502-15](http://security.gentoo.org/glsa/glsa-201502-15.xml) 4. [openSUSE-SU-2013:1742](http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html) 5. [openSUSE-SU-2013:1921](http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html) 6. [](http://www.samba.org/samba/security/CVE-2013-4476)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5145, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5145 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5145 - **State**: PUBLISHED - **Published Date**: January 16, 2020 at 22:01 UTC - **Last Updated**: August 04, 2024 at 19:47 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **n/a - Foxit** Affected versions: - Foxit Software Foxit PDF Reader 9.7.0.29435 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0934)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29874 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 09:47 UTC - **Last Updated**: August 03, 2024 at 06:33 UTC - **Reserved Date**: April 28, 2022 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device. ### Weakness Classification (CWE) - CWE-319: Security Weakness ### Affected Products **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P850** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) **Siemens - SICAM P855** Affected versions: - All versions < V3.00 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52538 - **State**: PUBLISHED - **Published Date**: April 08, 2024 at 08:43 UTC - **Last Updated**: March 25, 2025 at 13:39 UTC - **Reserved Date**: February 27, 2024 at 03:41 UTC - **Assigned By**: huawei ### Vulnerability Description Vulnerability of package name verification being bypassed in the HwIms module. Impact: Successful exploitation of this vulnerability will affect availability. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 4.0.0 (Status: affected) - 3.1.0 (Status: affected) - 3.0.0 (Status: affected) - 2.1.0 (Status: affected) - 2.0.0 (Status: affected) **Huawei - EMUI** Affected versions: - 13.0.0 (Status: affected) - 12.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2024/3/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0554, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0554 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0554 - **State**: PUBLISHED - **Published Date**: January 16, 2024 at 10:08 UTC - **Last Updated**: June 02, 2025 at 15:11 UTC - **Reserved Date**: January 15, 2024 at 08:35 UTC - **Assigned By**: INCIBE ### Vulnerability Description A Cross-site scripting (XSS) vulnerability has been found on WIC1200, affecting version 1.1. An authenticated user could store a malicious javascript payload in the device model parameter via '/setup/diags_ir_learn.asp', allowing the attacker to retrieve the session details of another user. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Full Compass Systems - WIC1200** Affected versions: - 1.1 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-full-compass-systems-wic1200) ### Credits - HADESS
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1516 - **State**: PUBLISHED - **Published Date**: May 04, 2012 at 16:00 UTC - **Last Updated**: August 06, 2024 at 19:01 UTC - **Reserved Date**: March 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16810](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16810) 2. [](http://www.vmware.com/security/advisories/VMSA-2012-0009.html) 3. [1027018](http://www.securitytracker.com/id?1027018) 4. [vmware-esxserver-rpc-priv-esc(75373)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75373) 5. [53369](http://www.securityfocus.com/bid/53369)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0025, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0025 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0025 - **State**: PUBLISHED - **Published Date**: July 11, 2018 at 18:00 UTC - **Last Updated**: September 16, 2024 at 17:18 UTC - **Reserved Date**: November 16, 2017 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-the-middle attack or by authentic servers subverted by malicious actors. FTP, and Telnet pass-through authentication services are not affected. Affected releases are Juniper Networks SRX Series: 12.1X46 versions prior to 12.1X46-D67 on SRX Series; 12.3X48 versions prior to 12.3X48-D25 on SRX Series; 15.1X49 versions prior to 15.1X49-D35 on SRX Series. ### Weakness Classification (CWE) - CWE-319: Security Weakness - CWE-300: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 12.1X46 (Status: affected) - 12.3X48 (Status: affected) - 15.1X49 (Status: affected) ### References 1. [](https://www.juniper.net/documentation/en_US/junos/topics/concept/firewall-user-authentication-pass-through-understanding.html) 2. [104719](http://www.securityfocus.com/bid/104719) 3. [1041316](http://www.securitytracker.com/id/1041316) 4. [](https://www.juniper.net/documentation/en_US/junos/topics/example/security-https-traffic-to-trigger-pass-through-authentication-configuring.html) 5. [](https://www.juniper.net/documentation/en_US/junos/topics/example/firewall-user-authentication-pass-through-configuring-cli.html) 6. [](https://kb.juniper.net/JSA10858)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48204 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 00:00 UTC - **Last Updated**: May 21, 2025 at 19:57 UTC - **Reserved Date**: May 17, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ns_backup extension through 13.0.0 for TYPO3 allows command injection. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **TYPO3 - ns backup extension** Affected versions: - 0 (Status: affected) ### References 1. [](https://typo3.org/security/advisory/typo3-ext-sa-2025-007)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5434 - **State**: PUBLISHED - **Published Date**: June 02, 2025 at 07:00 UTC - **Last Updated**: June 02, 2025 at 13:34 UTC - **Reserved Date**: June 01, 2025 at 10:58 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Aem Solutions CMS up to 1.0. It has been classified as critical. This affects an unknown part of the file /page.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **Aem Solutions - CMS** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-310767 | Aem Solutions CMS page.php sql injection](https://vuldb.com/?id.310767) 2. [VDB-310767 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310767) 3. [Submit #584261 | https://www.aemsolutions.com/ Aem Solutions CMS v1.0 Authorization Bypass Through User-Controlled SQL Primary Key](https://vuldb.com/?submit.584261) 4. [](https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20Aem%20Solutions%20CMS%20v1.0.md) ### Credits - XU17 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3939 - **State**: PUBLISHED - **Published Date**: November 16, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 06:45 UTC - **Reserved Date**: November 16, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38276](http://secunia.com/advisories/38276) 2. [SUSE-SA:2009:061](http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html) 3. [USN-864-1](http://www.ubuntu.com/usn/usn-864-1) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=526068) 5. [SUSE-SA:2010:001](http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html) 6. [38779](http://secunia.com/advisories/38779) 7. [37019](http://www.securityfocus.com/bid/37019) 8. [](http://support.avaya.com/css/P8/documents/100073666) 9. [SUSE-SA:2010:012](http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html) 10. [37909](http://secunia.com/advisories/37909) 11. [SUSE-SA:2010:014](http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html) 12. [SUSE-SA:2009:064](http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html) 13. [DSA-1996](http://www.debian.org/security/2010/dsa-1996) 14. [[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files](http://www.openwall.com/lists/oss-security/2009/11/13/1) 15. [oval:org.mitre.oval:def:10310](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310) 16. [RHSA-2010:0095](https://rhn.redhat.com/errata/RHSA-2010-0095.html) 17. [SUSE-SA:2010:005](http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html) 18. [60201](http://osvdb.org/60201) 19. [RHSA-2010:0046](https://rhn.redhat.com/errata/RHSA-2010-0046.html) 20. [oval:org.mitre.oval:def:7540](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540) 21. [SUSE-SA:2010:010](http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html) 22. [38017](http://secunia.com/advisories/38017) 23. [38492](http://secunia.com/advisories/38492)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2807 - **State**: PUBLISHED - **Published Date**: April 30, 2016 at 17:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: March 01, 2016 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1252707) 2. [DSA-3576](http://www.debian.org/security/2016/dsa-3576) 3. [](http://www.mozilla.org/security/announce/2016/mfsa2016-39.html) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1254622) 5. [openSUSE-SU-2016:1211](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html) 6. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html) 7. [RHSA-2016:0695](http://rhn.redhat.com/errata/RHSA-2016-0695.html) 8. [openSUSE-SU-2016:1767](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html) 9. [1035692](http://www.securitytracker.com/id/1035692) 10. [SUSE-SU-2016:1374](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html) 11. [openSUSE-SU-2016:1778](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html) 12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1254876) 13. [openSUSE-SU-2016:1251](http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html) 14. [USN-2936-2](http://www.ubuntu.com/usn/USN-2936-2) 15. [SUSE-SU-2016:1352](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html) 16. [USN-2973-1](http://www.ubuntu.com/usn/USN-2973-1) 17. [openSUSE-SU-2016:1769](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html) 18. [GLSA-201701-15](https://security.gentoo.org/glsa/201701-15) 19. [DSA-3559](http://www.debian.org/security/2016/dsa-3559) 20. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1187420) 21. [USN-2936-1](http://www.ubuntu.com/usn/USN-2936-1) 22. [USN-2936-3](http://www.ubuntu.com/usn/USN-2936-3) 23. [SUSE-SU-2016:1258](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html) 24. [RHSA-2016:1041](http://rhn.redhat.com/errata/RHSA-2016-1041.html) 25. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1254164)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3845 - **State**: PUBLISHED - **Published Date**: February 27, 2020 at 20:45 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.3. An application may be able to execute arbitrary code with system privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT210919)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6859, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6859 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6859 - **State**: PUBLISHED - **Published Date**: July 14, 2009 at 14:00 UTC - **Last Updated**: August 07, 2024 at 11:42 UTC - **Reserved Date**: July 14, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Xigla Software Absolute Control Panel XE 1.5 allows remote attackers to bypass authentication and gain administrative access by setting a cookie to a certain value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6893](https://www.exploit-db.com/exploits/6893) 2. [32025](http://www.securityfocus.com/bid/32025) 3. [32472](http://secunia.com/advisories/32472) 4. [absolutecontrolpanel-xlacpadmin-auth-bypass(46247)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7967, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7967 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7967 - **State**: PUBLISHED - **Published Date**: May 09, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 16:19 UTC - **Reserved Date**: April 19, 2017 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol. ### Affected Products **Schneider Electric SE - VAMPSET** Affected versions: - All versions prior to 2.2.189 (Status: affected) ### References 1. [97124](http://www.securityfocus.com/bid/97124) 2. [](http://www.schneider-electric.com/en/download/document/SEVD-2017-061-01/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7178, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7178 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7178 - **State**: PUBLISHED - **Published Date**: September 25, 2020 at 03:26 UTC - **Last Updated**: August 04, 2024 at 20:38 UTC - **Reserved Date**: January 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pexip Infinity before 20.1 allows privilege escalation by restoring a system backup. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.pexip.com/admin/release_notes.htm) 2. [](https://docs.pexip.com/admin/security_bulletins.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2569, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2569 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2569 - **State**: PUBLISHED - **Published Date**: March 17, 2024 at 23:31 UTC - **Last Updated**: August 02, 2024 at 17:22 UTC - **Reserved Date**: March 17, 2024 at 08:25 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Employee Task Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin-manage-user.php. The manipulation leads to execution after redirect. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257072. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-698: Security Weakness ### Affected Products **SourceCodester - Employee Task Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-257072 | SourceCodester Employee Task Management System admin-manage-user.php redirect](https://vuldb.com/?id.257072) 2. [VDB-257072 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.257072) 3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20admin-manage-user.php.md) ### Credits - Joshua Lictan - nochizplz (VulDB User) - nochizplz (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6046, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6046 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6046 - **State**: PUBLISHED - **Published Date**: November 22, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 20:12 UTC - **Reserved Date**: November 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in eggblog 3.1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) edit parameter to (a) admin/articles.php or (b) admin/comments.php, or the (2) add parameter to admin/users.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1017246](http://securitytracker.com/id?1017246) 2. [eggblog-articles-xss(30351)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30351) 3. [20061116 eggblog=> 3.1.0 Cross Site Scripting](http://marc.info/?l=bugtraq&m=116373125308955&w=2) 4. [21134](http://www.securityfocus.com/bid/21134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14591, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14591 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14591 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 19:05 UTC - **Last Updated**: August 05, 2024 at 00:19 UTC - **Reserved Date**: August 03, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access. ### Affected Products **n/a - 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html) 2. [](https://security.netapp.com/advisory/ntap-20200320-0005/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3126 - **State**: PUBLISHED - **Published Date**: June 08, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 14:05 UTC - **Reserved Date**: June 07, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gimp before 2.8.22 allows context-dependent attackers to cause a denial of service (crash) via an ICO file with an InfoHeader containing a Height of zero, a similar issue to CVE-2007-2237. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43453](http://osvdb.org/43453) 2. [](https://bugzilla.gnome.org/show_bug.cgi?id=778604) 3. [](https://git.gnome.org/browse/gimp/commit/?id=323ecb73f7bf36788fb7066eb2d6678830cd5de7) 4. [20070607 Re: CSIS Advisory: Microsoft GDI+ Integer division by zero flaw handling .ICO files](http://www.securityfocus.com/archive/1/470751/100/0/threaded) 5. [gimp-ico-file-dos(34789)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34789) 6. [](https://www.gimp.org/news/2017/05/11/gimp-2-8-22-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1904 - **State**: PUBLISHED - **Published Date**: June 11, 2009 at 21:00 UTC - **Last Updated**: August 07, 2024 at 05:27 UTC - **Reserved Date**: June 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2009-1563](http://www.vupen.com/english/advisories/2009/1563) 2. [35937](http://secunia.com/advisories/35937) 3. [35593](http://secunia.com/advisories/35593) 4. [](http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/) 5. [](http://redmine.ruby-lang.org/issues/show/794) 6. [](https://bugs.launchpad.net/bugs/cve/2009-1904) 7. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689) 8. [RHSA-2009:1140](http://www.redhat.com/support/errata/RHSA-2009-1140.html) 9. [[pkgsrc-changes] 20090610 CVS commit: pkgsrc/lang/ruby18-base](http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html) 10. [[rubyonrails-security] 20090610 DoS Vulnerability in Ruby (CVE-2009-1904)](http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source) 11. [1022371](http://www.securitytracker.com/id?1022371) 12. [oval:org.mitre.oval:def:9780](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780) 13. [APPLE-SA-2010-03-29-1](http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html) 14. [35399](http://secunia.com/advisories/35399) 15. [](http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master) 16. [](http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/) 17. [USN-805-1](http://www.ubuntu.com/usn/USN-805-1) 18. [FEDORA-2009-13066](https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html) 19. [55031](http://osvdb.org/55031) 20. [35278](http://www.securityfocus.com/bid/35278) 21. [](http://bugs.gentoo.org/show_bug.cgi?id=273213) 22. [37705](http://secunia.com/advisories/37705) 23. [](http://support.apple.com/kb/HT4077) 24. [35699](http://secunia.com/advisories/35699) 25. [](https://bugs.launchpad.net/bugs/385436) 26. [GLSA-200906-02](http://security.gentoo.org/glsa/glsa-200906-02.xml) 27. [MDVSA-2009:160](http://www.mandriva.com/security/advisories?name=MDVSA-2009:160) 28. [](http://www.ruby-forum.com/topic/189071) 29. [ruby-bigdecimal-dos(51032)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51032) 30. [35527](http://secunia.com/advisories/35527) 31. [SSA:2009-170-02](http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4864, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4864 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4864 - **State**: PUBLISHED - **Published Date**: October 31, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 10:31 UTC - **Reserved Date**: October 31, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://svn.python.org/view/python/trunk/Modules/imageop.c?rev=66689&view=diff&r1=66689&r2=66688&p1=python/trunk/Modules/imageop.c&p2=/python/trunk/Modules/imageop.c) 2. [oval:org.mitre.oval:def:10702](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10702) 3. [33937](http://secunia.com/advisories/33937) 4. [oval:org.mitre.oval:def:8354](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8354) 5. [](http://scary.beasts.org/security/CESA-2008-008.html) 6. [python-image-module-bo(46606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46606) 7. [37471](http://secunia.com/advisories/37471) 8. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html) 9. [](http://support.apple.com/kb/HT3438) 10. [APPLE-SA-2009-02-12](http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html) 11. [](http://svn.python.org/view?rev=66689&view=rev) 12. [31976](http://www.securityfocus.com/bid/31976) 13. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded) 14. [31932](http://www.securityfocus.com/bid/31932) 15. [[oss-security] 20081027 CVE request -- Python imageop#3](http://www.openwall.com/lists/oss-security/2008/10/27/2) 16. [[oss-security] 20081029 CVE Request - Python imageop](http://www.openwall.com/lists/oss-security/2008/10/29/3) 17. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14402 - **State**: PUBLISHED - **Published Date**: June 17, 2020 at 15:12 UTC - **Last Updated**: August 04, 2024 at 12:46 UTC - **Reserved Date**: June 17, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13) 2. [](https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff) 3. [[debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html) 4. [openSUSE-SU-2020:0988](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html) 5. [openSUSE-SU-2020:1025](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html) 6. [openSUSE-SU-2020:1056](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html) 7. [USN-4434-1](https://usn.ubuntu.com/4434-1/) 8. [[debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html) 9. [USN-4573-1](https://usn.ubuntu.com/4573-1/) 10. [](https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1878, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1878 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1878 - **State**: PUBLISHED - **Published Date**: March 20, 2020 at 14:50 UTC - **Last Updated**: August 04, 2024 at 06:53 UTC - **Reserved Date**: November 29, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Huawei smartphone OxfordS-AN00A with versions earlier than 10.0.1.152D(C735E152R3P3),versions earlier than 10.0.1.160(C00E160R4P1) have an improper authentication vulnerability. Authentication to target component is improper when device performs an operation. Attackers exploit this vulnerability to obtain some information by loading malicious application, leading to information leak. ### Affected Products **n/a - OxfordS-AN00A** Affected versions: - Versions earlier than 10.0.1.152D(C735E152R3P3),Versions earlier than 10.0.1.160(C00E160R4P1) (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200311-01-informationleak-en) 2. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200415-02-dos-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11269, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11269 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11269 - **State**: PUBLISHED - **Published Date**: June 12, 2019 at 14:46 UTC - **Last Updated**: September 16, 2024 at 23:11 UTC - **Reserved Date**: April 18, 2019 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **Spring - Spring Security OAuth** Affected versions: - 2.2 (Status: affected) - 2.1 (Status: affected) - 2.0 (Status: affected) - 2.3 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2021.html) 2. [](https://pivotal.io/security/cve-2019-11269) 3. [](http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html)