System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12610 - **State**: PUBLISHED - **Published Date**: July 26, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 01:10 UTC - **Reserved Date**: August 07, 2017 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka. ### Affected Products **Apache Software Foundation - Apache Kafka** Affected versions: - 0.10.0.0 to 0.10.2.1 (Status: affected) - 0.11.0.0 to 0.11.0.1 (Status: affected) ### References 1. [[kafka-users] 20180726 CVE-2017-12610: Authenticated Kafka clients may impersonate other users](https://lists.apache.org/thread.html/b6157be1a09df332294213bd21e90dcf9fe4c1810193be54620e4210%40%3Cusers.kafka.apache.org%3E) 2. [104899](http://www.securityfocus.com/bid/104899) 3. [[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities](https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E) 4. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E) 5. [[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E) 6. [](https://www.oracle.com/security-alerts/cpujul2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2278 - **State**: PUBLISHED - **Published Date**: June 02, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 05:10 UTC - **Reserved Date**: March 10, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The LZH decompression implementation (CsObjectInt::BuildHufTree function in vpa108csulzh.cpp) in SAP MaxDB 7.5 and 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, SAPCAR archive tool, and other products allows context-dependent attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to look-ups of non-simple codes, aka SAP Security Note 2124806, 2121661, 2127995, and 2125316. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20150513 [CORE-2015-0009] - SAP LZC/LZH Compression Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2015/May/50) 2. [74643](http://www.securityfocus.com/bid/74643) 3. [](http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html) 4. [20150513 [CORE-2015-0009] - SAP LZC/LZH Compression Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/535535/100/0/threaded) 5. [20150522 SAP Security Notes May 2015](http://seclists.org/fulldisclosure/2015/May/96) 6. [](http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5325, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5325 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5325 - **State**: PUBLISHED - **Published Date**: November 24, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 11:41 UTC - **Reserved Date**: August 18, 2014 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVNDB-2014-000117](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000117) 2. [JVN#91502163](http://jvn.jp/en/jp/JVN91502163/index.html) 3. [71093](http://www.securityfocus.com/bid/71093)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1207, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1207 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1207 - **State**: PUBLISHED - **Published Date**: May 15, 2023 at 12:15 UTC - **Last Updated**: January 24, 2025 at 20:14 UTC - **Reserved Date**: March 06, 2023 at 19:02 UTC - **Assigned By**: WPScan ### Vulnerability Description This HTTP Headers WordPress plugin before 1.18.8 has an import functionality which executes arbitrary SQL on the server, leading to an SQL Injection vulnerability. ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - HTTP Headers** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/6f3f460b-542a-4d32-8feb-afa1aef57e37) ### Credits - qerogram(at Kakao Style Corp.) - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22622 - **State**: PUBLISHED - **Published Date**: February 19, 2025 at 03:51 UTC - **Last Updated**: February 19, 2025 at 15:08 UTC - **Reserved Date**: January 07, 2025 at 16:26 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description Age Verification for your checkout page. Verify your customer's identity 1.20.0 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/class-wc-integration-agechecker-integration.php. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Age Checker - Age Verification** Affected versions: - 1.20.0 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/skims-5/) 2. [](https://wordpress.org/plugins/agecheckernet/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24196, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24196 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24196 - **State**: PUBLISHED - **Published Date**: February 01, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: January 31, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description iText v7.1.17, up to (exluding)": 7.1.18 and 7.2.2 was discovered to contain an out-of-memory error via the component readStreamBytesRaw, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/itext/itext7/pull/78) 2. [](https://github.com/itext/itext7/pull/78#issuecomment-1089279222) 3. [](https://github.com/itext/itext7/releases/tag/7.1.18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0245, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0245 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0245 - **State**: PUBLISHED - **Published Date**: February 13, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 04:03 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html) 2. [openSUSE-SU-2015:0300](http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html) 3. [DSA-3161](http://www.debian.org/security/2015/dsa-3161) 4. [[oss-security] 20150209 CVE-2015-0245: denial of service in dbus >= 1.4 systemd activation](http://www.openwall.com/lists/oss-security/2015/02/09/6) 5. [](http://advisories.mageia.org/MGASA-2015-0071.html) 6. [MDVSA-2015:176](http://www.mandriva.com/security/advisories?name=MDVSA-2015:176)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4367, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4367 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4367 - **State**: REJECTED - **Last Updated**: August 21, 2023 at 12:53 UTC - **Reserved Date**: December 08, 2022 at 19:30 UTC - **Assigned By**: Wordfence ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0648, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0648 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0648 - **State**: PUBLISHED - **Published Date**: August 03, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: August 02, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WFTPD and WFTPD Pro 2.41 allows local users to cause a denial of service by executing the RENAME TO (RNTO) command before a RENAME FROM (RNFR) command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000711 WFTPD/WFTPD Pro 2.41 RC10 denial-of-service](http://www.securityfocus.com/templates/archive.pike?list=1&msg=E13BvU6-0007d8-00%40dwarf.box.sk) 2. [1456](http://www.securityfocus.com/bid/1456)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33109 - **State**: REJECTED - **Last Updated**: February 13, 2025 at 16:28 UTC - **Reserved Date**: May 18, 2021 at 00:31 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46462 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 00:00 UTC - **Last Updated**: November 25, 2024 at 19:59 UTC - **Reserved Date**: September 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description By default, dedicated folders of ZEDMAIL for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZEDMAIL has to be modified to prevent this vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.primx.eu/en/bulletins/security-bulletin-24931936/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10202 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 03:19 UTC - **Last Updated**: November 06, 2024 at 15:50 UTC - **Reserved Date**: October 21, 2024 at 02:32 UTC - **Assigned By**: twcert ### Vulnerability Description Administrative Management System from Wellchoose has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Wellchoose - Administrative Management System** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-8162-dc491-1.html) 2. [](https://www.twcert.org.tw/en/cp-139-8163-b701e-2.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15002 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 09:46 UTC - **Reserved Date**: August 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort, the user's touch coordinates can be mapped to key presses on a keyboard. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf) 2. [](https://www.kryptowire.com/portal/android-firmware-defcon-2018/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6597 - **State**: REJECTED - **Last Updated**: May 12, 2023 at 00:00 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: forcepoint ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22249 - **State**: PUBLISHED - **Published Date**: July 06, 2021 at 19:47 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Remote Code Execution vulnerability in phplist 3.5.1. The application does not check any file extensions stored in the plugin zip file, Uploading a malicious plugin which contains the php files with extensions like PHP,phtml,php7 will be copied to the plugins directory which would lead to the remote code execution ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8675 - **State**: PUBLISHED - **Published Date**: January 15, 2016 at 19:00 UTC - **Last Updated**: August 06, 2024 at 08:29 UTC - **Reserved Date**: December 25, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160112-01-switch-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5886, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5886 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5886 - **State**: REJECTED - **Last Updated**: June 20, 2024 at 10:14 UTC - **Reserved Date**: June 11, 2024 at 21:41 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46009 - **State**: PUBLISHED - **Published Date**: March 30, 2022 at 22:18 UTC - **Last Updated**: August 04, 2024 at 04:54 UTC - **Reserved Date**: January 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Totolink A3100R V5.9c.4577, multiple pages can be read by curl or Burp Suite without authentication. Additionally, admin configurations can be set without cookies. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://totolink.com) 2. [](http://a3100r.com) 3. [](https://hackmd.io/-riYp6Q-ReCx-dKKWFBTLg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33562, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33562 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33562 - **State**: PUBLISHED - **Published Date**: April 29, 2024 at 05:14 UTC - **Last Updated**: August 02, 2024 at 02:36 UTC - **Reserved Date**: April 24, 2024 at 10:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 8theme XStore allows Reflected XSS.This issue affects XStore: from n/a through 9.3.5. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **8theme - XStore** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3313, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3313 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3313 - **State**: PUBLISHED - **Published Date**: September 23, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 06:22 UTC - **Reserved Date**: September 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in FMyClone 2.3 allow remote attackers to execute arbitrary SQL commands via the comp parameter to (1) index.php and (2) editComments.php, and (3) allow remote authenticated administrators to execute arbitrary SQL commands via the id parameter in a comment action to edit.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [58183](http://osvdb.org/58183) 2. [9711](http://www.exploit-db.com/exploits/9711) 3. [58182](http://osvdb.org/58182) 4. [58184](http://osvdb.org/58184) 5. [36778](http://secunia.com/advisories/36778) 6. [fmyclone-index-sql-injection(53329)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53329) 7. [fmyclone-edit-sql-injection(53330)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53330)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6273 - **State**: PUBLISHED - **Published Date**: February 25, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 11:27 UTC - **Reserved Date**: February 25, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in configuration_script.php in MyKtools 3.0 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the langage parameter, a different vulnerability than CVE-2008-4781. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32432](http://secunia.com/advisories/32432) 2. [myktools-configurationscript-file-include(48957)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48957)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0210 - **State**: PUBLISHED - **Published Date**: February 08, 2017 at 22:00 UTC - **Last Updated**: August 05, 2024 at 22:08 UTC - **Reserved Date**: December 08, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to obtain sensitive information. By allowing HTTP OPTIONS method, a remote attacker could send a specially-crafted query to a vulnerable server running to cause the server to disclose sensitive information in the HTTP response. ### Affected Products **IBM Corporation - Sterling B2B Integrator** Affected versions: - 5.1 (Status: affected) - 5.2 (Status: affected) - 4.3 (Status: affected) - 5.0 (Status: affected) - 5.2.4 (Status: affected) - - (Status: affected) - 5.2.1 (Status: affected) - 5.2.2 (Status: affected) - 5.2.3 (Status: affected) - 5.2.4.1 (Status: affected) - 5.2.4.2 (Status: affected) - 5.2.5 (Status: affected) - 5.2.6 (Status: affected) ### References 1. [90527](http://www.securityfocus.com/bid/90527) 2. [](http://www.ibm.com/support/docview.wss?uid=swg21981549)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4332 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 14:16 UTC - **Last Updated**: January 13, 2025 at 17:01 UTC - **Reserved Date**: March 07, 2023 at 14:16 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **posimyththemes - The Plus Addons for Elementor | FREE Elementor Widgets & Elementor Templates, Header Menu, Blog Post Builder, Dark Mode, Full-Page Scroll, Cross Domain Copy** Affected versions: - * (Status: affected) - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/aa698e7e-b1c7-4ead-aa2e-7fbfc9dfac80) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2523506%40the-plus-addons-for-elementor-page-builder&new=2523506%40the-plus-addons-for-elementor-page-builder&sfp_email=&sfph_mail=) ### Credits - Chloe Chamberland
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1252 - **State**: PUBLISHED - **Published Date**: September 11, 2020 at 17:09 UTC - **Last Updated**: November 18, 2024 at 16:24 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description <p>A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.</p> <p>An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>The updates address the vulnerability by correcting how Windows handles objects in memory.</p> ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1252)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0488 - **State**: PUBLISHED - **Published Date**: March 08, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 13:11 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-34097213. ### Affected Products **Google Inc. - Android** Affected versions: - Android-6.0 (Status: affected) - Android-6.0.1 (Status: affected) - Android-7.0 (Status: affected) - Android-7.1.1 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-03-01) 2. [1037968](http://www.securitytracker.com/id/1037968) 3. [96733](http://www.securityfocus.com/bid/96733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49797 - **State**: PUBLISHED - **Published Date**: February 05, 2025 at 23:48 UTC - **Last Updated**: February 22, 2025 at 22:06 UTC - **Reserved Date**: October 20, 2024 at 13:40 UTC - **Assigned By**: ibm ### Vulnerability Description IBM ApplinX 11.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-327: Security Weakness ### Affected Products **IBM - ApplinX** Affected versions: - 11.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7182522)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0085, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0085 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0085 - **State**: PUBLISHED - **Published Date**: March 07, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:35 UTC - **Reserved Date**: March 06, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cachefsd in Solaris 2.6, 7, and 8 allows remote attackers to cause a denial of service (crash) via an invalid procedure call in an RPC request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [solaris-cachefsd-rpc-dos(8956)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8956) 2. [oval:org.mitre.oval:def:4329](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4329) 3. [20020429 eSecurityOnline Security Advisory 4197 - Sun Solaris cachefsd denial of service vulnerability](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0047.html) 4. [](http://www.esecurityonline.com/advisories/eSO4197.asp) 5. [4634](http://www.securityfocus.com/bid/4634) 6. [20020429 eSecurityOnline Security Advisory 2397 - Sun Solaris admintool -d and PRODVERS buffer overflow vulnerabilities](http://online.securityfocus.com/archive/1/270122)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32513 - **State**: PUBLISHED - **Published Date**: December 28, 2023 at 10:46 UTC - **Last Updated**: August 02, 2024 at 15:18 UTC - **Reserved Date**: May 09, 2023 at 11:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Deserialization of Untrusted Data vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform.This issue affects GiveWP – Donation Plugin and Fundraising Platform: from n/a through 2.25.3. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **GiveWP - GiveWP – Donation Plugin and Fundraising Platform** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/give/wordpress-give-donation-plugin-plugin-2-25-3-php-object-injection-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11843 - **State**: PUBLISHED - **Published Date**: June 02, 2020 at 16:45 UTC - **Last Updated**: August 04, 2024 at 23:03 UTC - **Reserved Date**: May 09, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The MailPoet plugin before 3.23.2 for WordPress allows remote attackers to inject arbitrary web script or HTML using extra parameters in the URL (Reflective Server-Side XSS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/mailpoet/#developers) 2. [](https://github.com/mailpoet/mailpoet/releases/tag/3.23.2) 3. [](https://pluginarchive.com/wordpress/mailpoet/v/3-23-2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3999, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3999 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3999 - **State**: PUBLISHED - **Published Date**: July 24, 2013 at 14:00 UTC - **Last Updated**: August 06, 2024 at 16:30 UTC - **Reserved Date**: June 07, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in IBM Social Media Analytics 1.2 before FP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21644427) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg24034591) 3. [smanalytics-cve20133999-xss(85253)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85253)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30585 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 19:18 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: May 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The REST API in Archer Platform 6.x before 6.11 (6.11.0.0) contains an Authorization Bypass Vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to view sensitive information. 6.10 P3 (6.10.0.3) and 6.9 SP3 P4 (6.9.3.4) are also fixed releases. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:N/I:H/PR:N/S:U/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.archerirm.community/t5/releases/tkb-p/releases) 2. [](https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2013, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2013 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2013 - **State**: PUBLISHED - **Published Date**: June 29, 2012 at 22:00 UTC - **Last Updated**: September 17, 2024 at 02:21 UTC - **Reserved Date**: April 02, 2012 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in HP System Management Homepage (SMH) before 7.1.1 allows remote attackers to cause a denial of service, or possibly obtain sensitive information or modify data, via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBMU02786](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041) 2. [SSRT100877](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7173, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7173 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7173 - **State**: PUBLISHED - **Published Date**: February 13, 2020 at 22:19 UTC - **Last Updated**: August 06, 2024 at 18:01 UTC - **Reserved Date**: December 19, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Belkin n750 routers have a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.youtube.com/watch?v=RG1k8S3VHnQ) 2. [](https://pixels.camp/marcovazpt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6440 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 04:00 UTC - **Last Updated**: September 17, 2024 at 01:51 UTC - **Reserved Date**: January 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zemana AntiMalware before 3.0.658 Beta mishandles update logic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.zemana.com/whats-new?ProductID=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3051, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3051 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3051 - **State**: PUBLISHED - **Published Date**: April 26, 2024 at 21:26 UTC - **Last Updated**: September 27, 2024 at 16:09 UTC - **Reserved Date**: March 28, 2024 at 19:04 UTC - **Assigned By**: Silabs ### Vulnerability Description Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-248: Security Weakness - CWE-419: Security Weakness ### Affected Products **silabs.com - Z/IP Gateway SDK** Affected versions: - 0 (Status: affected) ### References 1. [](https://community.silabs.com/068Vm0000045w2j)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2286, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2286 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2286 - **State**: PUBLISHED - **Published Date**: May 09, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 17:43 UTC - **Reserved Date**: May 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in claro_init_global.inc.php in Dokeos 1.6.3 and earlier, and Dokeos community release 2.0.3, allow remote attackers to execute arbitrary PHP code via a URL in the (1) rootSys and (2) clarolineRepositorySys parameters, and possibly the (3) lang_path, (4) extAuthSource, (5) thisAuthSource, (6) main_configuration_file_path, (7) phpDigIncCn, and (8) drs parameters to (a) testheaderpage.php and (b) resourcelinker.inc.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-1303](http://www.vupen.com/english/advisories/2006/1303) 2. [](http://www.dokeos.com/forum/viewtopic.php?t=6848) 3. [dokeos-multiple-file-include(25740)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25740) 4. [19576](http://secunia.com/advisories/19576) 5. [](http://www.dokeos.com/wiki/index.php/Security)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10751 - **State**: PUBLISHED - **Published Date**: August 23, 2019 at 16:38 UTC - **Last Updated**: August 04, 2024 at 22:32 UTC - **Reserved Date**: April 03, 2019 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control. ### Affected Products **n/a - HTTPIE** Affected versions: - All versions prior to version 1.0.3 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107) 2. [](https://github.com/jakubroztocil/httpie/releases/tag/1.0.3) 3. [openSUSE-SU-2019:2050](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00003.html) 4. [openSUSE-SU-2019:2089](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00022.html) 5. [[debian-lts-announce] 20190928 [SECURITY] [DLA 1937-1] httpie security update](https://lists.debian.org/debian-lts-announce/2019/09/msg00031.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48885 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 09:01 UTC - **Last Updated**: January 16, 2025 at 14:16 UTC - **Reserved Date**: October 09, 2024 at 09:03 UTC - **Assigned By**: fortinet ### Vulnerability Description A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets. ### CVSS Metrics - **CVSS Base Score**: 5.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:F/RL:U/RC:C` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Fortinet - FortiRecorder** Affected versions: - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) **Fortinet - FortiWeb** Affected versions: - 7.6.0 (Status: affected) - 7.4.0 (Status: affected) - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) **Fortinet - FortiVoice** Affected versions: - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) - 6.0.0 (Status: affected) ### References 1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-259](https://fortiguard.fortinet.com/psirt/FG-IR-24-259)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1385, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1385 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1385 - **State**: PUBLISHED - **Published Date**: November 12, 2019 at 18:52 UTC - **Last Updated**: February 07, 2025 at 16:18 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'. ### Affected Products **Microsoft - Windows** Affected versions: - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1385) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-979/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25527 - **State**: PUBLISHED - **Published Date**: December 08, 2021 at 14:20 UTC - **Last Updated**: August 03, 2024 at 20:11 UTC - **Reserved Date**: January 19, 2021 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper export of Android application components vulnerability in Samsung Pay (India only) prior to version 4.1.77 allows attacker to access Bill Pay and Recharge menu without authentication. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-926: Security Weakness ### Affected Products **Samsung Mobile - Samsung Pay** Affected versions: - - (Status: affected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4794 - **State**: PUBLISHED - **Published Date**: May 12, 2024 at 03:31 UTC - **Last Updated**: August 01, 2024 at 20:55 UTC - **Reserved Date**: May 11, 2024 at 06:18 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in Campcodes Online Laundry Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_receiving.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263893 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Campcodes - Online Laundry Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-263893 | Campcodes Online Laundry Management System manage_receiving.php sql injection](https://vuldb.com/?id.263893) 2. [VDB-263893 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263893) 3. [Submit #332536 | Campcodes Online Laundry Management System 1.0 SQL Injection](https://vuldb.com/?submit.332536) 4. [](https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md) ### Credits - yylm (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37240 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 14:56 UTC - **Last Updated**: August 03, 2024 at 10:29 UTC - **Reserved Date**: August 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to HTTP Response splitting via the format parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://files.mdaemon.com/securitygateway/release/relnotes_en.htm) 2. [](https://gtn.com.np/wp-content/uploads/2022/07/HTTP-Response-splitting-through-format-parameter.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-17107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-17107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-17107 - **State**: PUBLISHED - **Published Date**: November 11, 2020 at 06:48 UTC - **Last Updated**: September 10, 2024 at 15:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description HEVC Video Extensions Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - HEVC Video Extensions** Affected versions: - N/A (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17107)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17094 - **State**: PUBLISHED - **Published Date**: January 27, 2020 at 17:14 UTC - **Last Updated**: September 16, 2024 at 22:34 UTC - **Reserved Date**: October 02, 2019 at 00:00 UTC - **Assigned By**: Bitdefender ### Vulnerability Description A Stack-based Buffer Overflow vulnerability in libbelkin_api.so component of Belkin WeMo Insight Switch firmware allows a local attacker to obtain code execution on the device. This issue affects: Belkin WeMo Insight Switch firmware version 2.00.11396 and prior versions. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Belkin - Belkin WeMo Insight Switch** Affected versions: - 2.00.11396 and prior (Status: affected) ### References 1. [](https://labs.bitdefender.com/2019/12/multiple-vulnerabilities-in-belkin-wemo-insight-switch/) ### Credits - Bitdefender Labs
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0423, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0423 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0423 - **State**: PUBLISHED - **Published Date**: January 23, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:19 UTC - **Reserved Date**: January 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BEA WebLogic Portal 9.2 does not properly handle when an administrator deletes entitlements for a role, which causes other role entitlements to be "inadvertently affected," which has an unknown impact. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32857](http://osvdb.org/32857) 2. [23750](http://secunia.com/advisories/23750) 3. [22082](http://www.securityfocus.com/bid/22082) 4. [1017521](http://securitytracker.com/id?1017521) 5. [ADV-2007-0213](http://www.vupen.com/english/advisories/2007/0213) 6. [BEA07-151.00](http://dev2dev.bea.com/pub/advisory/218)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-53000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-53000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-53000 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 16:43 UTC - **Last Updated**: May 04, 2025 at 07:47 UTC - **Reserved Date**: March 27, 2025 at 16:40 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if (type == 0 || type > maxtype) { /* error or continue */ } @type is then used as an array index and can be used as a Spectre v1 gadget. array_index_nospec() can be used to prevent leaking content of kernel memory to malicious users. This should take care of vast majority of netlink uses, but an audit is needed to take care of others where validation is not yet centralized in core netlink functions. ### Affected Products **Linux - Linux** Affected versions: - bfa83a9e03cf8d501c6272999843470afecb32ed (Status: affected) - bfa83a9e03cf8d501c6272999843470afecb32ed (Status: affected) - bfa83a9e03cf8d501c6272999843470afecb32ed (Status: affected) - bfa83a9e03cf8d501c6272999843470afecb32ed (Status: affected) - bfa83a9e03cf8d501c6272999843470afecb32ed (Status: affected) **Linux - Linux** Affected versions: - 2.6.15 (Status: affected) - 0 (Status: unaffected) - 5.4.231 (Status: unaffected) - 5.10.166 (Status: unaffected) - 5.15.91 (Status: unaffected) - 6.1.9 (Status: unaffected) - 6.2 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff) 2. [](https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d) 3. [](https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45) 4. [](https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184) 5. [](https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5543 - **State**: PUBLISHED - **Published Date**: October 26, 2006 at 17:00 UTC - **Last Updated**: August 07, 2024 at 19:55 UTC - **Reserved Date**: October 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in misc/function.php3 in PHP Generator of Object SQL Database (PGOSD), when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20668](http://www.securityfocus.com/bid/20668) 2. [2612](https://www.exploit-db.com/exploits/2612) 3. [20677](http://www.securityfocus.com/bid/20677) 4. [pgosd-function-file-include(29696)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29696) 5. [20061026 Source VERIFY: PHP Generator of Object SQL Database RFI](http://www.attrition.org/pipermail/vim/2006-October/001097.html) 6. [1783](http://securityreason.com/securityalert/1783) 7. [20061022 PHP Generator of Object SQL Database (path) Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/449475/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2371 - **State**: PUBLISHED - **Published Date**: March 15, 2013 at 14:00 UTC - **Last Updated**: September 17, 2024 at 03:07 UTC - **Reserved Date**: March 04, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Web API in the Statistics Server in TIBCO Spotfire Statistics Services 3.3.x before 3.3.1, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to obtain sensitive information via an unspecified HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.tibco.com/services/support/advisories/spotfire-advisory_20130313.jsp) 2. [](http://www.tibco.com/mk/advisory.jsp) 3. [](http://www.tibco.com/multimedia/spotfire-statistics-services-advisory-2013-03-12_tcm8-18479.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6253, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6253 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6253 - **State**: PUBLISHED - **Published Date**: June 22, 2024 at 14:00 UTC - **Last Updated**: August 01, 2024 at 21:33 UTC - **Reserved Date**: June 21, 2024 at 16:36 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in itsourcecode Online Food Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /purchase.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269420. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **itsourcecode - Online Food Ordering System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-269420 | itsourcecode Online Food Ordering System purchase.php sql injection](https://vuldb.com/?id.269420) 2. [VDB-269420 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.269420) 3. [Submit #361840 | its Online Food Ordering System Project V1.0 SQL Injection](https://vuldb.com/?submit.361840) 4. [](https://github.com/Desenchanted/cve/issues/1) ### Credits - Decenchanted (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3333, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3333 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3333 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 03:00 UTC - **Last Updated**: April 07, 2025 at 15:27 UTC - **Reserved Date**: April 06, 2025 at 12:31 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in codeprojects Online Restaurant Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/menu_update.php. The manipulation of the argument menu leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **codeprojects - Online Restaurant Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-303547 | codeprojects Online Restaurant Management System menu_update.php sql injection](https://vuldb.com/?id.303547) 2. [VDB-303547 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.303547) 3. [Submit #551907 | codeprojects Online Restaurant Management System 1.0 SQL Injection](https://vuldb.com/?submit.551907) 4. [](https://github.com/p1026/CVE/issues/47) ### Credits - p_key (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35787 - **State**: PUBLISHED - **Published Date**: August 09, 2022 at 20:03 UTC - **Last Updated**: January 02, 2025 at 19:34 UTC - **Reserved Date**: July 13, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure Site Recovery Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Azure Site Recovery VMWare to Azure** Affected versions: - 9.0 (Status: affected) ### References 1. [Azure Site Recovery Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4998 - **State**: PUBLISHED - **Published Date**: July 07, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 14:47 UTC - **Reserved Date**: December 29, 2016 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC RSA Archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is potentially affected by a cross-site request forgery vulnerability. A remote low privileged attacker may potentially exploit the vulnerability to execute unauthorized requests on behalf of the victim, using the authenticated user's privileges. ### Affected Products **n/a - RSA Archer version 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1** Affected versions: - RSA Archer version 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 (Status: affected) ### References 1. [99354](http://www.securityfocus.com/bid/99354) 2. [1038815](http://www.securitytracker.com/id/1038815) 3. [](http://seclists.org/fulldisclosure/2017/Jun/49)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15553 - **State**: PUBLISHED - **Published Date**: August 26, 2019 at 14:33 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the memoffset crate before 0.5.0 for Rust. offset_of and span_of can cause exposure of uninitialized memory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2019-0011.html) 2. [](https://github.com/Gilnaa/memoffset/issues/9#issuecomment-505461490)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36803 - **State**: PUBLISHED - **Published Date**: September 12, 2023 at 16:58 UTC - **Last Updated**: January 01, 2025 at 02:04 UTC - **Reserved Date**: June 27, 2023 at 15:11 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Kernel Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) ### References 1. [Windows Kernel Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36803)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7489, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7489 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7489 - **State**: PUBLISHED - **Published Date**: June 26, 2020 at 19:41 UTC - **Last Updated**: August 06, 2024 at 18:09 UTC - **Reserved Date**: June 26, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bbangert/beaker/issues/191) 2. [](https://www.openwall.com/lists/oss-security/2020/05/14/11) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1850105)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57273 - **State**: PUBLISHED - **Published Date**: May 14, 2025 at 00:00 UTC - **Last Updated**: May 20, 2025 at 14:27 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Netgate pfSense CE (prior to 2.8.0 beta release) and corresponding Plus builds is vulnerable to Cross-site scripting (XSS) in the Automatic Configuration Backup (ACB) service, allowing remote attackers to execute arbitrary JavaScript, delete backups, or leak sensitive information via an unsanitized "reason" field and a derivable device key generated from the public SSH key. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://netgate.com) 2. [](https://blog.brillantit.com/exploiting-pfsense-xss-command-injection-cloud-hijack/) 3. [](https://www.netgate.com/blog/important-security-updates-for-pfsense-plus-24.11-and-ce-2.7.2) 4. [](https://docs.netgate.com/downloads/pfSense-SA-25_03.webgui.asc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22718 - **State**: PUBLISHED - **Published Date**: April 13, 2021 at 18:31 UTC - **Last Updated**: August 03, 2024 at 18:51 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when restoring project files. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **n/a - C-Bus Toolkit V1.15.7 and prior** Affected versions: - C-Bus Toolkit V1.15.7 and prior (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-103-01) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-448/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7084 - **State**: REJECTED - **Published Date**: February 27, 2007 at 18:00 UTC - **Last Updated**: August 22, 2007 at 09:00 UTC - **Reserved Date**: February 27, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2887, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2887 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2887 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 27, 2024 at 18:54 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Customer Interaction History product of Oracle E-Business Suite (component: Outcome-Result). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). ### Affected Products **Oracle Corporation - Customer Interaction History** Affected versions: - 12.1.1-12.1.3 (Status: affected) - 12.2.3-12.2.9 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20725 - **State**: PUBLISHED - **Published Date**: May 24, 2021 at 03:20 UTC - **Last Updated**: August 03, 2024 at 17:53 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Reflected cross-site scripting vulnerability in the admin page of [Calendar01] free edition ver1.0.1 and earlier allows a remote attacker to inject an arbitrary script via unspecified vectors. ### Affected Products **PHP Factory - [Calendar01] free edition** Affected versions: - ver1.0.1 and earlier (Status: affected) ### References 1. [](https://www.php-factory.net/calendar/01.php) 2. [](https://jvn.jp/en/jp/JVN53910556/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1596, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1596 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1596 - **State**: PUBLISHED - **Published Date**: September 07, 2024 at 11:17 UTC - **Last Updated**: September 09, 2024 at 14:57 UTC - **Reserved Date**: February 16, 2024 at 22:13 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Ninja Forms - File Uploads plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded file (e.g. RTX file) in all versions up to, and including, 3.3.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SaturdayDrive - Ninja Forms - File Uploads** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/499a1892-12b7-49d5-b65f-4f53a968a23a?source=cve) 2. [](https://ninjaforms.com/extensions/file-uploads/) 3. [](https://ninjaforms.com/extensions/file-uploads/?changelog=1/) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0741, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0741 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0741 - **State**: PUBLISHED - **Published Date**: March 07, 2006 at 02:00 UTC - **Last Updated**: August 07, 2024 at 16:48 UTC - **Reserved Date**: February 17, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service ("endless recursive fault") via unknown attack vectors related to a "bad elf entry address." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2006-131](http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00003.html) 2. [](http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm) 3. [RHSA-2006:0493](http://www.redhat.com/support/errata/RHSA-2006-0493.html) 4. [RHSA-2006:0437](http://www.redhat.com/support/errata/RHSA-2006-0437.html) 5. [MDKSA-2007:025](http://www.mandriva.com/security/advisories?name=MDKSA-2007:025) 6. [ADV-2006-2554](http://www.vupen.com/english/advisories/2006/2554) 7. [19220](http://secunia.com/advisories/19220) 8. [21745](http://secunia.com/advisories/21745) 9. [21136](http://secunia.com/advisories/21136) 10. [16925](http://www.securityfocus.com/bid/16925) 11. [21983](http://secunia.com/advisories/21983) 12. [DSA-1097](http://www.debian.org/security/2006/dsa-1097) 13. [ADV-2006-0804](http://www.vupen.com/english/advisories/2006/0804) 14. [SUSE-SA:2006:028](http://www.novell.com/linux/security/advisories/2006-05-31.html) 15. [](http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm) 16. [DSA-1103](http://www.debian.org/security/2006/dsa-1103) 17. [](http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5) 18. [oval:org.mitre.oval:def:10518](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10518) 19. [1015724](http://securitytracker.com/id?1015724) 20. [20237](http://secunia.com/advisories/20237) 21. [20398](http://secunia.com/advisories/20398) 22. [23607](http://www.osvdb.org/23607) 23. [MDKSA-2006:059](http://www.mandriva.com/security/advisories?name=MDKSA-2006:059) 24. [19083](http://secunia.com/advisories/19083) 25. [20671](http://secunia.com/advisories/20671) 26. [19108](http://secunia.com/advisories/19108) 27. [USN-263-1](https://usn.ubuntu.com/263-1/) 28. [kernel-elf-dos(25001)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25001) 29. [20914](http://secunia.com/advisories/20914)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5621, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5621 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5621 - **State**: PUBLISHED - **Published Date**: October 22, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 15:39 UTC - **Reserved Date**: October 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38073](http://osvdb.org/38073) 2. [drupal-tokenmodule-xss(37275)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37275) 3. [](http://drupal.org/node/184336) 4. [27291](http://secunia.com/advisories/27291)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37872, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37872 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37872 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 03:57 UTC - **Reserved Date**: June 10, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in process.php in Itsourcecode Billing System in PHP 1.0 allows remote attackers to execute arbitrary SQL commands via the username parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TThuyyy/cve1/issues/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12305, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12305 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12305 - **State**: REJECTED - **Last Updated**: March 22, 2023 at 00:00 UTC - **Reserved Date**: April 28, 2020 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8517 - **State**: PUBLISHED - **Published Date**: November 17, 2014 at 16:00 UTC - **Last Updated**: August 06, 2024 at 13:18 UTC - **Reserved Date**: October 28, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [NetBSD-SA2014-013](http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc) 2. [62028](http://secunia.com/advisories/62028) 3. [43112](https://www.exploit-db.com/exploits/43112/) 4. [[oss-security] 20141028 Re: ftp(1) can be made execute arbitrary commands by malicious webserver](http://seclists.org/oss-sec/2014/q4/464) 5. [](http://support.apple.com/HT204244) 6. [GLSA-201611-05](https://security.gentoo.org/glsa/201611-05) 7. [openSUSE-SU-2014:1383](http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html) 8. [APPLE-SA-2015-01-27-4](http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html) 9. [62260](http://secunia.com/advisories/62260) 10. [[oss-security] 20141028 ftp(1) can be made execute arbitrary commands by malicious webserver](http://seclists.org/oss-sec/2014/q4/459)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21837 - **State**: PUBLISHED - **Published Date**: August 18, 2021 at 12:43 UTC - **Last Updated**: August 03, 2024 at 18:23 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-680: Security Weakness ### Affected Products **n/a - GPAC** Affected versions: - GPAC Project Advanced Content commit a8a8d412dabcb129e695c3e7d861fcc81f608304, GPAC Project Advanced Content v1.0.1 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297) 2. [DSA-4966](https://www.debian.org/security/2021/dsa-4966) 3. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1297)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3795 - **State**: PUBLISHED - **Published Date**: March 25, 2020 at 15:58 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - , 2020.006.20034 and earlier, 2017.011.30158  and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb20-13.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6789, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6789 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6789 - **State**: PUBLISHED - **Published Date**: May 04, 2009 at 18:22 UTC - **Last Updated**: August 07, 2024 at 11:42 UTC - **Reserved Date**: May 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in MindDezign Photo Gallery 2.2 allows remote attackers to execute arbitrary SQL commands via the username parameter in a login action to the admin module in index.php, a different vector than CVE-2008-6788. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [photogallery-id-username-sql-injection(46075)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46075) 2. [32358](http://secunia.com/advisories/32358) 3. [6820](https://www.exploit-db.com/exploits/6820) 4. [photogallery-username-sql-injection(50344)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50344)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3071, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3071 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3071 - **State**: PUBLISHED - **Published Date**: July 08, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 09:21 UTC - **Reserved Date**: July 08, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in inc/class_language.php in MyBB before 1.2.13 has unknown impact and attack vectors related to the $language variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://community.mybboard.net/attachment.php?aid=9272) 2. [31013](http://secunia.com/advisories/31013) 3. [](http://community.mybboard.net/showthread.php?tid=31666)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36760 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 03:43 UTC - **Reserved Date**: May 30, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stack overflow vulnerability was found in version 1.18.0 of rhai. The flaw position is: (/ SRC/rhai/SRC/eval/STMT. Rs in rhai: : eval: : STMT: : _ $LT $impl $u20 $rhai.. engine.. Engine$GT$::eval_stmt::h3f1d68ce37fc6e96). Due to the stack overflow is a recursive call/SRC/rhai/SRC/eval/STMT. Rs file eval_stmt_block function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36760/info.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4933 - **State**: PUBLISHED - **Published Date**: September 18, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 15:17 UTC - **Reserved Date**: September 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Direct static code injection vulnerability in includes/admin/sub/conf_appearence.php in Shop-Script FREE 2.0 and earlier allows remote attackers to inject arbitrary PHP code into cfg/appearence.inc.php via a save_appearence action in admin.php, as demonstrated with the (1) productscount, (2) colscount, and (3) darkcolor parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26840](http://secunia.com/advisories/26840) 2. [25695](http://www.securityfocus.com/bid/25695) 3. [4419](https://www.exploit-db.com/exploits/4419)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1853, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1853 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1853 - **State**: PUBLISHED - **Published Date**: April 19, 2006 at 16:00 UTC - **Last Updated**: August 07, 2024 at 17:27 UTC - **Reserved Date**: April 19, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in ModernBill 4.3.2 and earlier allow remote attackers or administrators to execute arbitrary SQL commands via the (1) id parameter in (a) user.php, or (2) where and (3) order parameters to (b) admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [modernbill-user-sql-injection(25926)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25926) 2. [17596](http://www.securityfocus.com/bid/17596) 3. [ADV-2006-1415](http://www.vupen.com/english/advisories/2006/1415) 4. [](http://pridels0.blogspot.com/2006/04/modernbill-multiple-sql-inj-vuln.html) 5. [19641](http://secunia.com/advisories/19641)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4050 - **State**: PUBLISHED - **Published Date**: June 12, 2020 at 16:00 UTC - **Last Updated**: August 04, 2024 at 07:52 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34). ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **WordPress - wordpress-develop** Affected versions: - >= 5.4.0, < 5.4.2 (Status: affected) - >= 5.3.0, < 5.3.4 (Status: affected) - >= 5.2.0, < 5.2.7 (Status: affected) - >= 5.1.0, < 5.1.6 (Status: affected) - >= 5.0.0, < 5.0.10 (Status: affected) - >= 4.9.0, < 4.9.15 (Status: affected) - >= 4.8.0, < 4.8.14 (Status: affected) - >= 4.7.0, < 4.7.18 (Status: affected) - >= 4.6.0, < 4.6.19 (Status: affected) - >= 4.5.0, < 4.5.22 (Status: affected) - >= 4.4.0, < 4.4.23 (Status: affected) - >= 4.3.0, < 4.3.24 (Status: affected) - >= 4.2.0, < 4.2.28 (Status: affected) - >= 4.1.0, < 4.1.31 (Status: affected) - >= 4.0.0, < 4.0.31 (Status: affected) - >= 3.9.0, < 3.9.32 (Status: affected) - >= 3.8.0, < 3.8.34 (Status: affected) - >= 3.7.0, < 3.7.34 (Status: affected) ### References 1. [](https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/) 2. [](https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-4vpv-fgg2-gcqc) 3. [](https://github.com/WordPress/wordpress-develop/commit/b8dea76b495f0072523106c6ec46b9ea0d2a0920) 4. [FEDORA-2020-8447a3e195](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODNHXVJS25YVWYQHOCICXTLIN5UYJFDN/) 5. [FEDORA-2020-bbedd29391](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/773N2ZV7QEMBGKH6FBKI6Q5S3YJMW357/) 6. [DSA-4709](https://www.debian.org/security/2020/dsa-4709) 7. [[debian-lts-announce] 20200701 [SECURITY] [DLA 2269-1] wordpress security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html) 8. [[debian-lts-announce] 20200911 [SECURITY] [DLA 2371-1] wordpress security update](https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5012 - **State**: PUBLISHED - **Published Date**: January 20, 2017 at 08:39 UTC - **Last Updated**: August 06, 2024 at 00:46 UTC - **Reserved Date**: May 24, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Moodle 3.x, glossary search displays entries without checking user permissions to view them. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92041](http://www.securityfocus.com/bid/92041) 2. [](https://moodle.org/mod/forum/discuss.php?d=336697)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1130 - **State**: PUBLISHED - **Published Date**: January 13, 2021 at 21:20 UTC - **Last Updated**: November 12, 2024 at 20:47 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco DNA Center software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have administrative credentials on the affected device. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cisco - Cisco Digital Network Architecture Center (DNA Center)** Affected versions: - n/a (Status: affected) ### References 1. [20210113 Cisco DNA Center Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-xss-HfV73cS3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41236 - **State**: PUBLISHED - **Published Date**: January 04, 2022 at 19:00 UTC - **Last Updated**: April 23, 2025 at 19:15 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OroPlatform is a PHP Business Application Platform. In affected versions the email template preview is vulnerable to XSS payload added to email template content. An attacker must have permission to create or edit an email template. For successful payload, execution the attacked user must preview a vulnerable email template. There are no workarounds that address this vulnerability. Users are advised to upgrade as soon as is possible. ### CVSS Metrics - **CVSS Base Score**: 6.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **oroinc - platform** Affected versions: - >= 3.1.0, < 3.1.21 (Status: affected) - >= 4.1.0, < 4.1.14 (Status: affected) - >= 4.2.0, < 4.2.8 (Status: affected) ### References 1. [](https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7) 2. [](https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7830 - **State**: PUBLISHED - **Published Date**: November 30, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 06:37 UTC - **Reserved Date**: March 08, 2018 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a denial of service can occur for ~1 minute by sending a specially crafted HTTP request. ### Affected Products **Schneider Electric SE - Embedded Web Servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200** Affected versions: - Embedded Web Servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2018-38) 2. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2950, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2950 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2950 - **State**: PUBLISHED - **Published Date**: October 16, 2019 at 17:40 UTC - **Last Updated**: October 01, 2024 at 16:29 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.16 and prior (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) 2. [](https://security.netapp.com/advisory/ntap-20191017-0002/) 3. [USN-4195-1](https://usn.ubuntu.com/4195-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37711 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 00:00 UTC - **Last Updated**: November 12, 2024 at 14:33 UTC - **Reserved Date**: July 10, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC1206 V15.03.06.23 and AC10 V15.03.06.47 were discovered to contain a stack overflow in the deviceId parameter in the saveParentControlInfo function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/saveParentControlInfo)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8542, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8542 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8542 - **State**: PUBLISHED - **Published Date**: May 26, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 16:41 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8539. ### Affected Products **Microsoft Corporation - Malware Protection** Affected versions: - Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016. (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8542) 2. [98707](http://www.securityfocus.com/bid/98707) 3. [1038571](http://www.securitytracker.com/id/1038571)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26451 - **State**: PUBLISHED - **Published Date**: September 06, 2022 at 17:19 UTC - **Last Updated**: August 03, 2024 at 05:03 UTC - **Reserved Date**: March 04, 2022 at 00:00 UTC - **Assigned By**: MediaTek ### Vulnerability Description In ged, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07202966; Issue ID: ALPS07202966. ### Affected Products **MediaTek, Inc. - MT6789, MT6855, MT6879, MT6895, MT6983, MT8168, MT8365** Affected versions: - Android 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/September-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41995 - **State**: PUBLISHED - **Published Date**: January 02, 2025 at 14:51 UTC - **Last Updated**: January 03, 2025 at 18:57 UTC - **Reserved Date**: October 19, 2022 at 11:40 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Galleryape Gallery Images Ape allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gallery Images Ape: from n/a through 2.2.8. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Galleryape - Gallery Images Ape** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/gallery-images-ape/vulnerability/wordpress-gallery-images-ape-plugin-2-2-8-auth-broken-access-control-vulnerability?_s_id=cve) ### Credits - thiennv (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2782 - **State**: PUBLISHED - **Published Date**: April 08, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 29, 2015 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Buffer overflow in Open-source ARJ archiver 3.10.22 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ARJ archive. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20150328 CVE Request: arj: free on invalid pointer due to to buffer overflow](http://www.openwall.com/lists/oss-security/2015/03/28/5) 2. [[oss-security] 20150329 Re: CVE Request: arj: free on invalid pointer due to to buffer overflow](http://www.openwall.com/lists/oss-security/2015/03/29/1) 3. [MDVSA-2015:201](http://www.mandriva.com/security/advisories?name=MDVSA-2015:201) 4. [FEDORA-2015-5546](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html) 5. [GLSA-201612-15](https://security.gentoo.org/glsa/201612-15) 6. [73413](http://www.securityfocus.com/bid/73413) 7. [FEDORA-2015-5524](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html) 8. [DSA-3213](http://www.debian.org/security/2015/dsa-3213) 9. [FEDORA-2015-5603](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19989 - **State**: PUBLISHED - **Published Date**: February 26, 2020 at 15:13 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 26, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Several PHP pages, and other type of files, are reachable by any user without checking for user identity and authorization. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html) 2. [](https://www.seling.it/) 3. [](https://www.seling.it/product/vam/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39495 - **State**: PUBLISHED - **Published Date**: July 12, 2024 at 12:20 UTC - **Last Updated**: May 04, 2025 at 09:17 UTC - **Reserved Date**: June 25, 2024 at 14:23 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Then it will be started by gb_interface_request_mode_switch. Here is the relevant code. if (!queue_work(system_long_wq, &intf->mode_switch_work)) { ... } If we call gb_interface_release to make cleanup, there may be an unfinished work. This function will call kfree to free the object "intf". However, if gb_interface_mode_switch_work is scheduled to run after kfree, it may cause use-after-free error as gb_interface_mode_switch_work will use the object "intf". The possible execution flow that may lead to the issue is as follows: CPU0 CPU1 | gb_interface_create | gb_interface_request_mode_switch gb_interface_release | kfree(intf) (free) | | gb_interface_mode_switch_work | mutex_lock(&intf->mutex) (use) Fix it by canceling the work before kfree. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.4.279 (Status: unaffected) - 5.10.221 (Status: unaffected) - 5.15.162 (Status: unaffected) - 6.1.95 (Status: unaffected) - 6.6.35 (Status: unaffected) - 6.9.6 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/74cd0a421896b2e07eafe7da4275302bfecef201) 2. [](https://git.kernel.org/stable/c/2b6bb0b4abfd79b8698ee161bb73c0936a2aaf83) 3. [](https://git.kernel.org/stable/c/fb071f5c75d4b1c177824de74ee75f9dd34123b9) 4. [](https://git.kernel.org/stable/c/9a733d69a4a59c2d08620e6589d823c24be773dc) 5. [](https://git.kernel.org/stable/c/0b8fba38bdfb848fac52e71270b2aa3538c996ea) 6. [](https://git.kernel.org/stable/c/03ea2b129344152157418929f06726989efc0445) 7. [](https://git.kernel.org/stable/c/5c9c5d7f26acc2c669c1dcf57d1bb43ee99220ce)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3158 - **State**: PUBLISHED - **Published Date**: October 17, 2022 at 00:00 UTC - **Last Updated**: May 14, 2025 at 18:11 UTC - **Reserved Date**: September 07, 2022 at 00:00 UTC - **Assigned By**: Rockwell ### Vulnerability Description Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an input validation vulnerability. The FactoryTalk VantagePoint SQL Server lacks input validation when users enter SQL statements to retrieve information from the back-end database. If successfully exploited, this could allow a user with basic user privileges to perform remote code execution on the server. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **n/a - FactoryTalk VantagePoint** Affected versions: - 8.0, 8.10, 8.20, 8.30, 8.31 (Status: affected) ### References 1. [](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137043)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17412 - **State**: PUBLISHED - **Published Date**: February 08, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 20:51 UTC - **Reserved Date**: December 05, 2017 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of GET method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute arbitrary code in the context of the underlying database. Was ZDI-CAN-4223. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Quest - Quest NetVault Backup** Affected versions: - 11.3.0.12 (Status: affected) ### References 1. [](https://zerodayinitiative.com/advisories/ZDI-17-974)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6038 - **State**: PUBLISHED - **Published Date**: November 16, 2023 at 16:06 UTC - **Last Updated**: August 29, 2024 at 14:49 UTC - **Reserved Date**: November 08, 2023 at 18:15 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default installation and does not require user interaction. The vulnerability can be exploited by making specific GET or POST requests to the ImportFiles and ParseSetup endpoints, respectively. This issue was identified in version 3.40.0.4 of h2o-3. ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **h2oai - h2oai/h2o-3** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1806, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1806 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1806 - **State**: PUBLISHED - **Published Date**: June 01, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:06 UTC - **Reserved Date**: June 01, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code via format strings in the URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-200506-15](http://www.gentoo.org/security/en/glsa/glsa-200506-15.xml) 2. [15753](http://secunia.com/advisories/15753) 3. [20050528 Format String Vulnerability In Peercast 0.1211 And Earlier](http://marc.info/?l=bugtraq&m=111746603629979&w=2) 4. [](http://www.gulftech.org/?node=research&article_id=00077-05282005) 5. [ADV-2005-0651](http://www.vupen.com/english/advisories/2005/0651) 6. [15536](http://secunia.com/advisories/15536) 7. [](http://www.peercast.org/forum/viewtopic.php?p=11596)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9398 - **State**: PUBLISHED - **Published Date**: February 25, 2020 at 20:23 UTC - **Last Updated**: August 04, 2024 at 10:26 UTC - **Reserved Date**: February 25, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ispconfig.org/blog/ispconfig-3-1-15p3-released-security-bugfix-release/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1165, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1165 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1165 - **State**: PUBLISHED - **Published Date**: April 04, 2022 at 15:36 UTC - **Last Updated**: August 02, 2024 at 23:55 UTC - **Reserved Date**: March 30, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more. ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Unknown - Blackhole for Bad Bots** Affected versions: - 3.3.2 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710) 2. [](https://plugins.trac.wordpress.org/changeset/2666486) ### Credits - Daniel Ruf
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0127, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0127 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0127 - **State**: PUBLISHED - **Published Date**: March 22, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 09:05 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The time-validation implementation in (1) mod/feedback/complete.php and (2) mod/feedback/complete_guest.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote authenticated users to bypass intended restrictions on starting a Feedback activity by choosing an unavailable time. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20140317 Moodle security notifications public](http://openwall.com/lists/oss-security/2014/03/17/1) 2. [](https://moodle.org/mod/forum/discuss.php?d=256417) 3. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-43656)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21394 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:26 UTC - **Last Updated**: September 24, 2024 at 20:15 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N` ### Affected Products **Oracle Corporation - VM VirtualBox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-128/) 3. [GLSA-202208-36](https://security.gentoo.org/glsa/202208-36)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4005, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4005 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4005 - **State**: PUBLISHED - **Published Date**: July 31, 2023 at 00:00 UTC - **Last Updated**: October 11, 2024 at 19:42 UTC - **Reserved Date**: July 31, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Insufficient Session Expiration in GitHub repository fossbilling/fossbilling prior to 0.5.5. ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **fossbilling - fossbilling/fossbilling** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/f0aacce1-79bc-4765-95f1-7e824433b9e4) 2. [](https://github.com/fossbilling/fossbilling/commit/20c23b051eb690cb4ae60a257f6bb46eb3aae2d1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27420 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 16:05 UTC - **Last Updated**: March 04, 2025 at 16:44 UTC - **Reserved Date**: February 24, 2025 at 15:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the atendido_parentesco_adicionar.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the descricao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability fix in 3.2.16. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **LabRedesCefetRJ - WeGIA** Affected versions: - < 3.2.16 (Status: affected) ### References 1. [https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw](https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3wr-75qx-55cw) 2. [https://github.com/LabRedesCefetRJ/WeGIA/commit/add78bb177cbb29477ff2121b533651a9d673918](https://github.com/LabRedesCefetRJ/WeGIA/commit/add78bb177cbb29477ff2121b533651a9d673918)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1200 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vintra SMTP MailServer allows remote attackers to cause a denial of service via a malformed "EXPN *@" command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19980720 DOS in Vintra systems Mailserver software.](http://marc.info/?l=ntbugtraq&m=90222454131610&w=2) 2. [vintra-mail-dos(1617)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18630 - **State**: PUBLISHED - **Published Date**: September 06, 2019 at 16:24 UTC - **Last Updated**: August 05, 2024 at 11:15 UTC - **Reserved Date**: October 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability was found in McKesson Cardiology product 13.x and 14.x. Insecure file permissions in the default installation may allow an attacker with local system access to execute unauthorized arbitrary code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsma-19-241-01) 2. [](https://www.hipaajournal.com/code-execution-vulnerability-identified-in-change-healthcare-cardiology-devices/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43660 - **State**: PUBLISHED - **Published Date**: January 09, 2025 at 07:56 UTC - **Last Updated**: March 11, 2025 at 13:07 UTC - **Reserved Date**: August 14, 2024 at 09:27 UTC - **Assigned By**: DIVD ### Vulnerability Description The CGI script <redacted>.sh can be used to download any file on the filesystem. This issue affects Iocharger firmware for AC model chargers beforeversion 24120701. Likelihood: High, but credentials required. Impact: Critical – The script can be used to download any file on the filesystem, including sensitive files such as /etc/shadow, the CGI script source code or binaries and configuration files. CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/S:P/AU:Y CVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The confidentiality of all files of the devicd can be compromised (VC:H/VI:N/VA:N). There is no impact on subsequent systems. (SC:N/SI:N/SA:N). While this device is an EV charger handing significant amounts of power, this attack in isolation does not have a safety impact. The attack can be automated (AU:Y). ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **Iocharger - Iocharger firmware for AC models** Affected versions: - 0 (Status: affected) ### References 1. [](https://csirt.divd.nl/DIVD-2024-00035/) 2. [](https://csirt.divd.nl/CVE-2024-43660/) 3. [](https://iocharger.com) ### Credits - Wilco van Beijnum - Harm van den Brink (DIVD) - Frank Breedijk (DIVD)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19922 - **State**: PUBLISHED - **Published Date**: December 06, 2018 at 22:00 UTC - **Last Updated**: September 16, 2024 at 17:14 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Persistent Cross-Site Scripting (XSS) in the advancedsetup_websiteblocking.html Website Blocking page of the Actiontec C1000A router with firmware through CAC004-31.30L.95 allows a remote attacker to inject arbitrary HTML into the Website Blocking page by inserting arbitrary HTML into the 'TodUrlAdd' URL parameter in a /urlfilter.cmd POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/logern5/c1000a_xss/blob/master/README.md)