System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21331, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21331
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:04 UTC
- **Last Updated**: April 02, 2025 at 13:24 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Installer Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Installer Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9596, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9596
- **State**: PUBLISHED
- **Published Date**: June 16, 2017 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 12, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The "CFB Mobile Banking" by Citizens First Bank Wisconsin app 3.0.1 -- aka cfb-mobile-banking/id1081102805 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-40689, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-40689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40689
- **State**: PUBLISHED
- **Published Date**: July 26, 2024 at 13:27 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 08, 2024 at 19:31 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. IBM X-Force ID: 297719.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**IBM - InfoSphere Information Server**
Affected versions:
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7160579)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/297719)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12803, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12803
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 07:21 UTC
- **Last Updated**: January 17, 2025 at 02:16 UTC
- **Reserved Date**: December 19, 2024 at 16:22 UTC
- **Assigned By**: sonicwall
### Vulnerability Description
A post-authentication stack-based buffer overflow vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**SonicWall - SonicOS**
Affected versions:
- 6.5.4.15-117n and older versions (Status: affected)
- 7.0.1-5161 and older version (Status: affected)
- 7.1.2-7019 (Status: affected)
- 8.0.0-8035 (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0004)
### Credits
- Catalpa of DBappSecurity Co. Ltd.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25413, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25413
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 00:00 UTC
- **Last Updated**: February 11, 2025 at 16:38 UTC
- **Reserved Date**: February 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. The device allows unauthenticated access to Telnet and SNMP credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1555, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1555
- **State**: PUBLISHED
- **Published Date**: April 01, 2011 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 18:43 UTC
- **Reserved Date**: April 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in saa.php in Andy's PHP Knowledgebase (Aphpkb) 0.95.3 and earlier allows remote attackers to execute arbitrary SQL commands via the aid parameter, a different vulnerability than CVE-2011-1546. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aphpkb.blogspot.com/2011/03/this-release-includes-security-fixes.html)
2. [ADV-2011-0802](http://www.vupen.com/english/advisories/2011/0802)
3. [34476](http://secunia.com/advisories/34476)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-1158, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-1158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1158
- **State**: PUBLISHED
- **Published Date**: December 10, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: December 08, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13486](http://secunia.com/advisories/13486)
2. [oval:org.mitre.oval:def:11056](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056)
3. [13254](http://secunia.com/advisories/13254)
4. [](http://secunia.com/multiple_browsers_window_injection_vulnerability_test/)
5. [13560](http://secunia.com/advisories/13560)
6. [](http://secunia.com/secunia_research/2004-13/advisory/)
7. [](http://www.kde.org/info/security/advisory-20041213-1.txt)
8. [SUSE-SR:2005:001](http://www.novell.com/linux/security/advisories/2005_01_sr.html)
9. [RHSA-2005:009](http://www.redhat.com/support/errata/RHSA-2005-009.html)
10. [20041213 KDE Security Advisory: Konqueror Window Injection Vulnerability](http://marc.info/?l=bugtraq&m=110296048613575&w=2)
11. [13477](http://secunia.com/advisories/13477)
12. [11853](http://www.securityfocus.com/bid/11853)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4435, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4435
- **State**: PUBLISHED
- **Published Date**: January 19, 2011 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability, related to CDE Calendar Manager Service Daemon and RPC. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from other software vendors that this affects other operating systems, such as HP-UX, or claims from a reliable third party that this is a buffer overflow in rpc.cmsd via long XDR-encoded ASCII strings in RPC call 10.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43258](http://secunia.com/advisories/43258)
2. [](http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc)
3. [solaris-cde-code-execution(64797)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64797)
4. [HPSBUX02628](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395)
5. [ADV-2011-0352](http://www.vupen.com/english/advisories/2011/0352)
6. [70569](http://osvdb.org/70569)
7. [20110208 CVE-2010-4435 - Multiple Vendor Calendar Manager Remote Code Execution](http://www.securityfocus.com/archive/1/516304/100/0/threaded)
8. [42984](http://secunia.com/advisories/42984)
9. [20110208 ZDI-11-062: Multiple Vendor Calendar Manager RPC Service Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/516284/100/0/threaded)
10. [16137](http://www.exploit-db.com/exploits/16137)
11. [8069](http://securityreason.com/securityalert/8069)
12. [](http://www.zerodayinitiative.com/advisories/ZDI-11-062/)
13. [SSRT090183](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395)
14. [1024975](http://www.securitytracker.com/id?1024975)
15. [ADV-2011-0151](http://www.vupen.com/english/advisories/2011/0151)
16. [45853](http://www.securityfocus.com/bid/45853)
17. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html)
18. [oval:org.mitre.oval:def:12794](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794)
19. [46261](http://www.securityfocus.com/bid/46261)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4038, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4038
- **State**: PUBLISHED
- **Published Date**: December 06, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in comentarii.php in Web4Future Portal Solutions News Portal allows remote attackers to execute arbitrary SQL commands via the idp parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2733](http://www.vupen.com/english/advisories/2005/2733)
2. [15716](http://www.securityfocus.com/bid/15716)
3. [portal-solutions-comentarii-sql-injection(23419)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23419)
4. [](http://pridels0.blogspot.com/2005/12/web4future-portal-solutions-news.html)
5. [21422](http://www.osvdb.org/21422)
6. [17880](http://secunia.com/advisories/17880)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3806, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3806
- **State**: PUBLISHED
- **Published Date**: July 21, 2023 at 02:00 UTC
- **Last Updated**: October 24, 2024 at 14:33 UTC
- **Reserved Date**: July 20, 2023 at 08:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester House Rental and Property Listing System 1.0. Affected is an unknown function of the file btn_functions.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-235074 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SourceCodester - House Rental and Property Listing System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.235074)
2. [](https://vuldb.com/?ctiid.235074)
3. [](https://github.com/GZRsecurity/Cve-System/blob/main/House%20Rental%20and%20Property%20Listing%20System%20register.php%20has%20%20File%20Upload(RCE)%20Vulnerability.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-7924, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-7924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7924
- **State**: PUBLISHED
- **Published Date**: January 22, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 06, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering duplicate BLOB references, related to content/browser/indexed_db/indexed_db_callbacks.cc and content/browser/indexed_db/indexed_db_dispatcher_host.cc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62665](http://secunia.com/advisories/62665)
2. [](http://googlechromereleases.blogspot.com/2015/01/stable-update.html)
3. [62575](http://secunia.com/advisories/62575)
4. [USN-2476-1](http://www.ubuntu.com/usn/USN-2476-1)
5. [72288](http://www.securityfocus.com/bid/72288)
6. [GLSA-201502-13](http://security.gentoo.org/glsa/glsa-201502-13.xml)
7. [](https://code.google.com/p/chromium/issues/detail?id=435880)
8. [](https://codereview.chromium.org/774593004)
9. [1031623](http://www.securitytracker.com/id/1031623)
10. [openSUSE-SU-2015:0441](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html)
11. [RHSA-2015:0093](http://rhn.redhat.com/errata/RHSA-2015-0093.html)
12. [62383](http://secunia.com/advisories/62383)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41653, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41653
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 21:08 UTC
- **Last Updated**: April 16, 2025 at 16:05 UTC
- **Reserved Date**: September 29, 2022 at 14:08 UTC
- **Assigned By**: icscert
### Vulnerability Description
Daikin SVMPC1 version 2.1.22 and prior and SVMPC2 version 1.2.3 and prior are vulnerable to an attacker obtaining user login credentials and control the system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**Daikin - SVMPC1 **
Affected versions:
- 0 (Status: affected)
**Daikin - SVMPC2**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-02)
### Credits
- Chizuru Toyama from TXOne Networks reported these vulnerabilities to CISA
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2844, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2844
- **State**: PUBLISHED
- **Published Date**: May 12, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: April 03, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cpanel function in go_site.php in GoAutoDial GoAdmin CE before 3.3-1420434000 allows remote attackers to execute arbitrary commands via the $action portion of the PATH_INFO.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150421 GoAutoDial 3.3 multiple vulnerabilities](http://www.securityfocus.com/archive/1/535319/100/1100/threaded)
2. [74281](http://www.securityfocus.com/bid/74281)
3. [](http://goautodial.org/news/21)
4. [36807](https://www.exploit-db.com/exploits/36807/)
5. [](http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3568, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3568
- **State**: PUBLISHED
- **Published Date**: January 18, 2012 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 01:11 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Web Services Manager component in Oracle Fusion Middleware 11.1.1.3, 11.1.1.4, and 11.1.1.5 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web Services Security.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-5919, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-5919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5919
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The SurDoc - 100GB+ FREE storage (aka com.jd.surdoc) application 1.3.4.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#361177](http://www.kb.cert.org/vuls/id/361177)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0879, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0879
- **State**: PUBLISHED
- **Published Date**: February 20, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 08, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
CREAR AL-Mail32 before 1.13d allows remote attackers to cause a denial of service (application crash) via a (1) CON, (2) AUX, or (3) NUL device name in the filename of an attachment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#55365709](http://jvn.jp/en/jp/JVN55365709/index.html)
2. [](http://www.almail.com/vulnerability.html)
3. [JVNDB-2015-000021](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000021)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8403, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8403
- **State**: PUBLISHED
- **Published Date**: August 15, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10.
### Affected Products
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows Server 2016 (Status: affected)
**Microsoft - Microsoft Edge**
Affected versions:
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
**Microsoft - Internet Explorer 10**
Affected versions:
- Windows Server 2012 (Status: affected)
### References
1. [1041457](http://www.securitytracker.com/id/1041457)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8403)
3. [105033](http://www.securityfocus.com/bid/105033)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-35349, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-35349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35349
- **State**: PUBLISHED
- **Published Date**: December 26, 2020 at 03:42 UTC
- **Last Updated**: August 04, 2024 at 17:02 UTC
- **Reserved Date**: December 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Savsoft Quiz 5 is affected by: Cross Site Scripting (XSS) via field_title (aka a title on the custom fields page).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/49196)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-40622, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-40622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-40622
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 10:40 UTC
- **Last Updated**: May 06, 2025 at 15:08 UTC
- **Reserved Date**: April 16, 2025 at 08:38 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘username’ parameter of the ‘GetLastDatePasswordChange’ endpoint.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**TCMAN - GIM**
Affected versions:
- v11 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcmans-gim)
### Credits
- Pablo Pardo
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46196, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46196
- **State**: REJECTED
- **Last Updated**: January 27, 2023 at 00:00 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8172, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8172
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 16:00 UTC
- **Last Updated**: August 28, 2024 at 14:31 UTC
- **Reserved Date**: August 26, 2024 at 07:44 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Attendance System 1.0. This issue affects some unknown processing of the file /endpoint/delete-student.php. The manipulation of the argument student/attendance leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - QR Code Attendance System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-275771 | SourceCodester QR Code Attendance System delete-student.php cross site scripting](https://vuldb.com/?id.275771)
2. [VDB-275771 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275771)
3. [Submit #397724 | SourceCodester QR Code Attendance System 1.0 Cross Site Scripting](https://vuldb.com/?submit.397724)
4. [](https://github.com/jadu101/CVE/blob/main/SourceCodester_QR_Code_Attendance_System_delete_student_XSS.md)
5. [](https://github.com/jadu101/CVE/blob/main/SourceCodester_QR_Code_Attendance_System_delete_attendance_XSS.md)
6. [](https://www.sourcecodester.com/)
### Credits
- jadu101 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-22875, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-22875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22875
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 14:43 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow vulnerability in function Jsi_ObjSetLength in jsish before 3.0.6, allows remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pcmacdon/jsish/commit/5408a6d93f45bf1f7acd9ae5d44e0ebd77379e98)
2. [](https://github.com/pcmacdon/jsish/issues/10)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-13242, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-13242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13242
- **State**: PUBLISHED
- **Published Date**: July 04, 2019 at 15:04 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 04, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.52 has a User Mode Write AV starting at image00400000+0x0000000000013a98.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/apriorit/pentesting/blob/master/bugs/irfanview/0x0000000000013a98.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-1398, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-1398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1398
- **State**: PUBLISHED
- **Published Date**: March 14, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 14:57 UTC
- **Reserved Date**: January 17, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pe_mcollective module in Puppet Enterprise (PE) before 2.7.1 does not properly restrict access to a catalog of private SSL keys, which allows remote authenticated users to obtain sensitive information and gain privileges by leveraging root access to a node, related to the master role.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://puppetlabs.com/security/cve/cve-2013-1398)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-24009, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-24009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24009
- **State**: PUBLISHED
- **Published Date**: April 06, 2022 at 09:15 UTC
- **Last Updated**: October 25, 2024 at 13:33 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C`
### Affected Products
**Fortinet - Fortinet FortiWAN**
Affected versions:
- FortiWAN before 4.5.9 (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-21-060)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-51562, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-51562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51562
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 14:44 UTC
- **Last Updated**: November 26, 2024 at 20:24 UTC
- **Reserved Date**: October 29, 2024 at 17:16 UTC
- **Assigned By**: freebsd
### Vulnerability Description
The NVMe driver function nvme_opc_get_log_page is vulnerable to a buffer over-read from a guest-controlled value.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- 14.1-RELEASE (Status: affected)
- 13.4-RELEASE (Status: affected)
- 13.3-RELEASE (Status: affected)
### References
1. [](https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc)
### Credits
- Synacktiv
- The FreeBSD Foundation
- The Alpha-Omega Project
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18821, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18821
- **State**: PUBLISHED
- **Published Date**: April 21, 2020 at 13:51 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by stored XSS. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000049044/Security-Advisory-for-Store-Cross-Site-Scripting-on-Some-Fully-Managed-Switches-PSV-2017-1948)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1795, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1795
- **State**: PUBLISHED
- **Published Date**: April 17, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in tablepublisher.cgi in UPDI Network Enterprise @1 Table Publisher 2006-03-23 allows remote attackers to inject arbitrary web script or HTML via the Title of Table field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17642](http://www.securityfocus.com/bid/17642)
2. [19723](http://secunia.com/advisories/19723)
3. [24238](http://www.osvdb.org/24238)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4460, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4460
- **State**: PUBLISHED
- **Published Date**: January 10, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inject arbitrary web script or HTML via a project name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mantisbt.org/bugs/view.php?id=16513)
2. [98823](http://osvdb.org/98823)
3. [](https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076)
4. [[oss-security] 20131022 Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability](http://seclists.org/oss-sec/2013/q4/168)
5. [55305](http://secunia.com/advisories/55305)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-5153, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-5153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5153
- **State**: PUBLISHED
- **Published Date**: February 25, 2020 at 15:48 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**n/a - Moxa**
Affected versions:
- Moxa AWK-3131A Firmware version 1.13 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0944)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-29862, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-29862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29862
- **State**: PUBLISHED
- **Published Date**: June 16, 2022 at 17:01 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://opcfoundation.org/security/)
2. [](https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29862.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0542, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0542
- **State**: PUBLISHED
- **Published Date**: January 15, 2024 at 05:00 UTC
- **Last Updated**: June 09, 2025 at 17:21 UTC
- **Reserved Date**: January 14, 2024 at 17:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. Affected by this issue is the function formWifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250712. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - W9**
Affected versions:
- 1.0.0.7(4456) (Status: affected)
### References
1. [](https://vuldb.com/?id.250712)
2. [](https://vuldb.com/?ctiid.250712)
3. [](https://github.com/jylsec/vuldb/blob/main/Tenda/W9/7/README.md)
### Credits
- jylsec (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1500, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1500
- **State**: PUBLISHED
- **Published Date**: February 13, 2020 at 16:02 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored XSS vulnerability in UpdateFieldJson.jspa in JIRA 4.4.3 and GreenHopper before 5.9.8 allows an attacker to inject arbitrary script code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://web.archive.org/web/20121014055829/http://www.cloudscan.me/2012/09/cve-2012-1500-ghs-5375-ghs-5642.html)
2. [21052](https://www.exploit-db.com/exploits/21052)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-5422, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-5422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5422
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 01:00 UTC
- **Last Updated**: June 02, 2025 at 03:28 UTC
- **Reserved Date**: June 01, 2025 at 10:47 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/logs/email of the component Email Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-266: Security Weakness
### Affected Products
**juzaweb - CMS**
Affected versions:
- 3.4.0 (Status: affected)
- 3.4.1 (Status: affected)
- 3.4.2 (Status: affected)
### References
1. [VDB-310755 | juzaweb CMS Email Logs Page email access control](https://vuldb.com/?id.310755)
2. [VDB-310755 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310755)
3. [Submit #584050 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Email Logs" Page](https://vuldb.com/?submit.584050)
4. [](https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_email_logs.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2811, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2811
- **State**: PUBLISHED
- **Published Date**: April 30, 2016 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: March 01, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2016:1211](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1252330)
3. [1035692](http://www.securitytracker.com/id/1035692)
4. [openSUSE-SU-2016:1251](http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html)
5. [USN-2936-2](http://www.ubuntu.com/usn/USN-2936-2)
6. [GLSA-201701-15](https://security.gentoo.org/glsa/201701-15)
7. [](http://www.mozilla.org/security/announce/2016/mfsa2016-42.html)
8. [USN-2936-1](http://www.ubuntu.com/usn/USN-2936-1)
9. [USN-2936-3](http://www.ubuntu.com/usn/USN-2936-3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-3853, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-3853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3853
- **State**: PUBLISHED
- **Published Date**: February 27, 2020 at 20:45 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. A malicious application may be able to execute arbitrary code with system privileges.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210919)
2. [](https://support.apple.com/HT210918)
3. [](https://support.apple.com/HT210921)
4. [](https://support.apple.com/HT210920)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-33096, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-33096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33096
- **State**: PUBLISHED
- **Published Date**: June 22, 2022 at 18:42 UTC
- **Last Updated**: August 03, 2024 at 08:01 UTC
- **Reserved Date**: June 13, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/resume/index.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/9)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7971, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7971
- **State**: PUBLISHED
- **Published Date**: September 25, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 22:15 UTC
- **Reserved Date**: April 19, 2017 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the use of outdated cipher suites and improper verification of peer SSL Certificate.
### Affected Products
**Schneider Electric SE - PowerSCADA Anywhere**
Affected versions:
- Version 1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 (Status: affected)
**Schneider Electric SE - Citect Anywhere**
Affected versions:
- version 1.0 (Status: affected)
### References
1. [99913](http://www.securityfocus.com/bid/99913)
2. [](https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9071-security-notification-citect-anywhere)
3. [](http://www.schneider-electric.com/en/download/document/SEVD-2017-173-01/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-6050, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-6050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6050
- **State**: PUBLISHED
- **Published Date**: November 22, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in ClickTech Texas Rank'em allow remote attackers to execute arbitrary SQL commands via the (1) selPlayer parameter to player.asp or the (2) tournament_id parameter to tournaments.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21168](http://www.securityfocus.com/bid/21168)
2. [texasrankem-player-sql-injection(30384)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30384)
3. [](http://www.aria-security.com/forum/showthread.php?t=34)
4. [20061118 [Aria-Security's Research Team] Texas Rank'em SQL Injection Vulnerabilite](http://www.securityfocus.com/archive/1/452017/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-14587, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-14587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14587
- **State**: PUBLISHED
- **Published Date**: November 23, 2020 at 16:15 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: August 03, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.
### Affected Products
**n/a - Extensible Firmware Interface Development Kit (EDK II)**
Affected versions:
- EDK II (Status: affected)
### References
1. [](https://bugzilla.tianocore.org/show_bug.cgi?id=1989)
2. [[debian-lts-announce] 20210429 [SECURITY] [DLA 2645-1] edk2 security update](https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-3130, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-3130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3130
- **State**: PUBLISHED
- **Published Date**: June 08, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in the OpenWiki (formerly JD-Wiki) component (com_jd-wiki) 1.0.2, and possibly earlier, for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) dwpage.php or (2) wantedpages.php, different vectors than CVE-2006-4074. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24342](http://www.securityfocus.com/bid/24342)
2. [37472](http://osvdb.org/37472)
3. [37473](http://osvdb.org/37473)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1912, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1912
- **State**: PUBLISHED
- **Published Date**: June 04, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: June 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.webspell.org/index.php?site=news_comments&newsID=130)
2. [webspell-awards-sql-injection(50395)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50395)
3. [34862](http://www.securityfocus.com/bid/34862)
4. [](http://www.webspell.org/index.php?site=files&file=30)
5. [54295](http://osvdb.org/54295)
6. [35016](http://secunia.com/advisories/35016)
7. [54296](http://www.osvdb.org/54296)
8. [](http://www.webspell.org/)
9. [8622](https://www.exploit-db.com/exploits/8622)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-4872, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-4872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4872
- **State**: PUBLISHED
- **Published Date**: October 31, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in bidhistory.php in iTechBids Gold 5.0 allows remote attackers to inject arbitrary web script or HTML via the item_id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [itechbids-bidhistory-xss(46320)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46320)
2. [28780](http://secunia.com/advisories/28780)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14414, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14414
- **State**: PUBLISHED
- **Published Date**: June 29, 2020 at 16:41 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 18, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NeDi 1.9C is vulnerable to Remote Command Execution. pwsec.php improperly escapes shell metacharacters from a POST request. An attacker can exploit this by crafting an arbitrary payload (any system commands) that contains shell metacharacters via a POST request with a pw parameter. (This can also be exploited via CSRF.)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/farid007/a3d96d305f028d221f729eb6ae681f5a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-34753, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-34753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34753
- **State**: PUBLISHED
- **Published Date**: July 13, 2022 at 21:10 UTC
- **Last Updated**: September 16, 2024 at 19:14 UTC
- **Reserved Date**: June 28, 2022 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote root exploit when the command is compromised. Affected Products: SpaceLogic C-Bus Home Controller (5200WHC2), formerly known as C-Bus Wiser Homer Controller MK2 (V1.31.460 and prior)
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Schneider Electric - SpaceLogic C-Bus Home Controller**
Affected versions:
- 5200WHC2 (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-02_SpaceLogic-C-Bus-Home-Controller-Wiser_MK2_Security_Notification.pdf)
2. [](http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-49263, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-49263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49263
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:56 UTC
- **Last Updated**: May 04, 2025 at 08:33 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
This avoids leaking memory if brcmf_chip_get_raminfo fails. Note that
the CLM blob is released in the device remove path.
### Affected Products
**Linux - Linux**
Affected versions:
- 82f93cf46d6007ffa003b2d4a2834563b6b84d21 (Status: affected)
- 82f93cf46d6007ffa003b2d4a2834563b6b84d21 (Status: affected)
- 82f93cf46d6007ffa003b2d4a2834563b6b84d21 (Status: affected)
- 82f93cf46d6007ffa003b2d4a2834563b6b84d21 (Status: affected)
- 82f93cf46d6007ffa003b2d4a2834563b6b84d21 (Status: affected)
- 82f93cf46d6007ffa003b2d4a2834563b6b84d21 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4 (Status: affected)
- 0 (Status: unaffected)
- 5.4.189 (Status: unaffected)
- 5.10.110 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d0ab87f8dcdfe72dc1d763be3392c1fc51a1ace2)
2. [](https://git.kernel.org/stable/c/f3820ddaf4f3ac80c7401ccc6a42e663c9317f31)
3. [](https://git.kernel.org/stable/c/a88337a06966f2d733ad9a97714b874469133f14)
4. [](https://git.kernel.org/stable/c/4e0b507597e1a86e9b4c056ab274c427223cf8ea)
5. [](https://git.kernel.org/stable/c/0347bdfdb1529994ac3a4cb425087c477a74eb2c)
6. [](https://git.kernel.org/stable/c/5e90f0f3ead014867dade7a22f93958119f5efab)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-26034, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-26034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26034
- **State**: PUBLISHED
- **Published Date**: May 26, 2021 at 10:22 UTC
- **Last Updated**: September 17, 2024 at 01:35 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: Joomla
### Vulnerability Description
An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in data download endpoints in com_banners and com_sysinfo.
### Affected Products
**Joomla! Project - Joomla! CMS**
Affected versions:
- 3.0.0-3.9.26 (Status: affected)
### References
1. [](https://developer.joomla.org/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-2696, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-2696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2696
- **State**: PUBLISHED
- **Published Date**: April 23, 2019 at 18:16 UTC
- **Last Updated**: October 02, 2024 at 15:57 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
2. [openSUSE-SU-2019:1814](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7287, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7287
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 04:31 UTC
- **Last Updated**: July 31, 2024 at 15:34 UTC
- **Reserved Date**: July 30, 2024 at 13:50 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Establishment Billing Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273156.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Establishment Billing Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-273156 | SourceCodester Establishment Billing Management System manage_user.php sql injection](https://vuldb.com/?id.273156)
2. [VDB-273156 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.273156)
3. [Submit #381469 | SourceCodester Establishment Billing Management System 1.0 SQL Injection](https://vuldb.com/?submit.381469)
4. [](https://gist.github.com/topsky979/d4684a6cf3ca446bb7c71c51ff6152ba)
### Credits
- topsky979 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5760, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5760
- **State**: PUBLISHED
- **Published Date**: December 30, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32863](http://www.securityfocus.com/bid/32863)
2. [32955](http://secunia.com/advisories/32955)
3. [](http://www.kerio.com/security_advisory.html)
4. [mailserver-error413-xss(47398)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47398)
5. [](http://www.kerio.com/kms_history.html)
6. [ADV-2008-3442](http://www.vupen.com/english/advisories/2008/3442)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-1333, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-1333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1333
- **State**: PUBLISHED
- **Published Date**: August 20, 2007 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 02:26 UTC
- **Reserved Date**: August 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Cache' Server Page (CSP) implementation in InterSystems Cache' 4.0.3 through 5.0.5 allows remote attackers to "gain complete control" of a server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/8bdc0e496226edd1/60e9179edb4a4d43)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0600, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0600
- **State**: PUBLISHED
- **Published Date**: February 16, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm)
2. [34344](http://secunia.com/advisories/34344)
3. [33872](http://secunia.com/advisories/33872)
4. [20090312 rPSA-2009-0040-1 tshark wireshark](http://www.securityfocus.com/archive/1/501763/100/0/threaded)
5. [34144](http://secunia.com/advisories/34144)
6. [oval:org.mitre.oval:def:15041](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15041)
7. [33690](http://www.securityfocus.com/bid/33690)
8. [SUSE-SR:2009:005](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html)
9. [1021697](http://www.securitytracker.com/id?1021697)
10. [](https://issues.rpath.com/browse/RPL-2984)
11. [FEDORA-2009-1877](https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00652.html)
12. [oval:org.mitre.oval:def:10853](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10853)
13. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1937)
14. [](http://wiki.rpath.com/Advisories:rPSA-2009-0040)
15. [RHSA-2009:0313](http://www.redhat.com/support/errata/RHSA-2009-0313.html)
16. [ADV-2009-0370](http://www.vupen.com/english/advisories/2009/0370)
17. [](http://www.wireshark.org/security/wnpa-sec-2009-01.html)
18. [34264](http://secunia.com/advisories/34264)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-30071, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-30071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30071
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:02 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Remote Access Connection Manager Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Remote Access Connection Manager Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-3984, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-3984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3984
- **State**: PUBLISHED
- **Published Date**: December 31, 2019 at 17:45 UTC
- **Last Updated**: August 04, 2024 at 19:26 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when the device retrieves updates scripts from the internet.
### Affected Products
**Amazon - Blink XT2 Sync Module firmware**
Affected versions:
- prior to 2.13.11 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2019-51)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-35789, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-35789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35789
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 12:24 UTC
- **Last Updated**: May 21, 2025 at 09:12 UTC
- **Reserved Date**: May 17, 2024 at 12:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
When moving a station out of a VLAN and deleting the VLAN afterwards, the
fast_rx entry still holds a pointer to the VLAN's netdev, which can cause
use-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx
after the VLAN change.
### Affected Products
**Linux - Linux**
Affected versions:
- a7f1721684628b8ae6015bca9a176046ee6f30cc (Status: affected)
- bd7e90c82850f49c23004d54de14e46d373748a6 (Status: affected)
- cc413b375c6d95e68a4629cb1ba9d099de78ebb9 (Status: affected)
- dd0b45538146cb6a54d6da7663b8c3afd16ebcfd (Status: affected)
- dd0b45538146cb6a54d6da7663b8c3afd16ebcfd (Status: affected)
- dd0b45538146cb6a54d6da7663b8c3afd16ebcfd (Status: affected)
- dd0b45538146cb6a54d6da7663b8c3afd16ebcfd (Status: affected)
- dd0b45538146cb6a54d6da7663b8c3afd16ebcfd (Status: affected)
- dd0b45538146cb6a54d6da7663b8c3afd16ebcfd (Status: affected)
- 22bc2a4814440c4a8979a381f46fec5d224f5c11 (Status: affected)
- 7cfe824f681e1aaac34ea64bb4def8a77801b672 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 4.19.312 (Status: unaffected)
- 5.4.274 (Status: unaffected)
- 5.10.215 (Status: unaffected)
- 5.15.154 (Status: unaffected)
- 6.1.84 (Status: unaffected)
- 6.6.24 (Status: unaffected)
- 6.7.12 (Status: unaffected)
- 6.8.3 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ea9a0cfc07a7d3601cc680718d9cff0d6927a921)
2. [](https://git.kernel.org/stable/c/be1dd9254fc115321d6fbee042026d42afc8d931)
3. [](https://git.kernel.org/stable/c/e8b067c4058c0121ac8ca71559df8e2e08ff1a7e)
4. [](https://git.kernel.org/stable/c/c8bddbd91bc8e42c961a5e2cec20ab879f21100f)
5. [](https://git.kernel.org/stable/c/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b)
6. [](https://git.kernel.org/stable/c/6b948b54c8bd620725e0c906e44b10c0b13087a7)
7. [](https://git.kernel.org/stable/c/2884a50f52313a7a911de3afcad065ddbb3d78fc)
8. [](https://git.kernel.org/stable/c/e8678551c0243f799b4859448781cbec1bd6f1cb)
9. [](https://git.kernel.org/stable/c/4f2bdb3c5e3189297e156b3ff84b140423d64685)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-35841, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-35841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35841
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:42 UTC
- **Last Updated**: March 11, 2025 at 16:10 UTC
- **Reserved Date**: July 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Enterprise App Management Service Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows Enterprise App Management Service Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35841)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5084, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5084
- **State**: REJECTED
- **Published Date**: January 05, 2021 at 19:02 UTC
- **Last Updated**: January 05, 2021 at 19:02 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0098, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0098
- **State**: PUBLISHED
- **Published Date**: January 08, 2008 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: January 07, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in RealPlayer 11 build 6.0.14.748 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: As of 20080103, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019153](http://www.securitytracker.com/id?1019153)
2. [ADV-2008-0016](http://www.vupen.com/english/advisories/2008/0016)
3. [](http://www.us-cert.gov/current/index.html#public_exploit_code_for_realplayer)
4. [27091](http://www.securityfocus.com/bid/27091)
5. [28276](http://secunia.com/advisories/28276)
6. [[Dailydave] 20080101 0day RealPlayer exploit demo](http://lists.immunitysec.com/pipermail/dailydave/2008-January/004811.html)
7. [](http://gleg.net/realplayer11.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16511, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16511
- **State**: PUBLISHED
- **Published Date**: September 05, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2018:3650](https://access.redhat.com/errata/RHSA-2018:3650)
2. [GLSA-201811-12](https://security.gentoo.org/glsa/201811-12)
3. [USN-3768-1](https://usn.ubuntu.com/3768-1/)
4. [](http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0edd3d6c634a577db261615a9dc2719bca7f6e01)
5. [](https://www.artifex.com/news/ghostscript-security-resolved/)
6. [DSA-4288](https://www.debian.org/security/2018/dsa-4288)
7. [](https://bugs.ghostscript.com/show_bug.cgi?id=699659)
8. [[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html)
9. [](http://seclists.org/oss-sec/2018/q3/182)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-0887, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-0887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0887
- **State**: PUBLISHED
- **Published Date**: February 25, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Eval injection vulnerability in sessions.inc in PHP Base Library (PHPLib) before 7.4a, when index.php3 from the PHPLib distribution is available on the server, allows remote attackers to execute arbitrary PHP code by including a base64-encoded representation of the code in a cookie. NOTE: this description was significantly updated on 20060605 to reflect new details after an initial vague advisory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phplib-code-execution(24873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24873)
2. [ADV-2006-0720](http://www.vupen.com/english/advisories/2006/0720)
3. [](http://sourceforge.net/project/shownotes.php?group_id=31885&release_id=396091)
4. [](http://www.gulftech.org/?node=research&article_id=00107-03052006)
5. [23466](http://www.osvdb.org/23466)
6. [16902](http://secunia.com/advisories/16902)
7. [1016123](http://securitytracker.com/id?1016123)
8. [16801](http://www.securityfocus.com/bid/16801)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-1000359, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-1000359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000359
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 01:06 UTC
- **Reserved Date**: April 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Java out of memory error and significant increase in resource consumption. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-6663, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-6663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6663
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 06:00 UTC
- **Last Updated**: February 10, 2025 at 22:09 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.
### Affected Products
**n/a - Cisco IOS and IOS XE**
Affected versions:
- Cisco IOS and IOS XE (Status: affected)
### References
1. [1038999](http://www.securitytracker.com/id/1038999)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos)
3. [99973](http://www.securityfocus.com/bid/99973)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-2741, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-2741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2741
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 30, 2024 at 15:43 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-498/)
3. [openSUSE-SU-2020:0925](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html)
4. [GLSA-202101-09](https://security.gentoo.org/glsa/202101-09)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3703, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3703
- **State**: PUBLISHED
- **Published Date**: June 08, 2016 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:1094](https://access.redhat.com/errata/RHSA-2016:1094)
2. [RHSA-2016:1095](https://access.redhat.com/errata/RHSA-2016:1095)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-20970, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-20970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20970
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 18:15 UTC
- **Last Updated**: August 05, 2024 at 12:19 UTC
- **Reserved Date**: August 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pdf-print plugin before 2.0.3 for WordPress has multiple XSS issues.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/pdf-print/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-47527, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-47527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47527
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 15:09 UTC
- **Last Updated**: May 04, 2025 at 07:12 UTC
- **Reserved Date**: May 24, 2024 at 15:02 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
serial: core: fix transmit-buffer reset and memleak
Commit 761ed4a94582 ("tty: serial_core: convert uart_close to use
tty_port_close") converted serial core to use tty_port_close() but
failed to notice that the transmit buffer still needs to be freed on
final close.
Not freeing the transmit buffer means that the buffer is no longer
cleared on next open so that any ioctl() waiting for the buffer to drain
might wait indefinitely (e.g. on termios changes) or that stale data can
end up being transmitted in case tx is restarted.
Furthermore, the buffer of any port that has been opened would leak on
driver unbind.
Note that the port lock is held when clearing the buffer pointer due to
the ldisc race worked around by commit a5ba1d95e46e ("uart: fix race
between uart_put_char() and uart_shutdown()").
Also note that the tty-port shutdown() callback is not called for
console ports so it is not strictly necessary to free the buffer page
after releasing the lock (cf. d72402145ace ("tty/serial: do not free
trasnmit buffer page under port lock")).
### Affected Products
**Linux - Linux**
Affected versions:
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
- 761ed4a94582ab291aa24dcbea4e01e8936488c8 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.9 (Status: affected)
- 0 (Status: unaffected)
- 4.9.292 (Status: unaffected)
- 4.14.257 (Status: unaffected)
- 4.19.220 (Status: unaffected)
- 5.4.164 (Status: unaffected)
- 5.10.84 (Status: unaffected)
- 5.15.7 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206)
2. [](https://git.kernel.org/stable/c/e74d9663fd57640fc3394abb5c76fa95b9cc2f2e)
3. [](https://git.kernel.org/stable/c/1179b168fa3f3a6aae3bd140000455a0e58457db)
4. [](https://git.kernel.org/stable/c/c5da8aa441053958594f94254592bb41264bdfbf)
5. [](https://git.kernel.org/stable/c/e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f)
6. [](https://git.kernel.org/stable/c/64e491c1634b73d3bddc081d08620bdc92ab2c12)
7. [](https://git.kernel.org/stable/c/00de977f9e0aa9760d9a79d1e41ff780f74e3424)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-28770, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-28770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28770
- **State**: PUBLISHED
- **Published Date**: April 12, 2022 at 16:11 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 06, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to insufficient input validation, SAPUI5 library(vbm) - versions 750, 753, 754, 755, 75, allows an unauthenticated attacker to inject a script into the URL and execute code. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SAP SE - SAPUI5 (vbm library)**
Affected versions:
- 750 (Status: affected)
- 753 (Status: affected)
- 754 (Status: affected)
- 755 (Status: affected)
- 756 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3126557)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-29060, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-29060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29060
- **State**: PUBLISHED
- **Published Date**: November 28, 2023 at 20:07 UTC
- **Last Updated**: June 03, 2025 at 13:56 UTC
- **Reserved Date**: March 30, 2023 at 21:10 UTC
- **Assigned By**: BD
### Vulnerability Description
The FACSChorus workstation operating system does not restrict what devices can interact with its USB ports. If exploited, a threat actor with physical access to the workstation could gain access to system information and potentially exfiltrate data.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-1299: Security Weakness
### Affected Products
**Becton, Dickinson and Company (BD) - FACSChorus**
Affected versions:
- 5.0 (Status: affected)
- 3.0 (Status: affected)
### References
1. [](https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0831, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0831
- **State**: PUBLISHED
- **Published Date**: February 20, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 20, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in the Rapid Recipe (com_rapidrecipe) 1.6.5 and earlier component for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) user_id or (2) category_id parameter. NOTE: this might overlap CVE-2008-0754.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5103](https://www.exploit-db.com/exploits/5103)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-10457, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-10457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10457
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 13:05 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniocannito.it/?p=137#afr)
2. [](https://antoniocannito.it/phpkb1#arbitrary-file-renaming-cve-2020-10457)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-2013, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-2013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2013
- **State**: PUBLISHED
- **Published Date**: April 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in page.php in SL_site 1.0 allows remote attackers to execute arbitrary SQL commands via the id_page parameter. NOTE: this issue could be used to produce resultant XSS from an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1015972](http://securitytracker.com/id?1015972)
2. [24896](http://www.osvdb.org/24896)
3. [ADV-2006-1487](http://www.vupen.com/english/advisories/2006/1487)
4. [19792](http://secunia.com/advisories/19792)
5. [17667](http://www.securityfocus.com/bid/17667)
6. [slsite-page-sql-injection(26036)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26036)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-33894, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-33894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33894
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 08:32 UTC
- **Last Updated**: December 04, 2024 at 16:42 UTC
- **Reserved Date**: May 23, 2023 at 06:38 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In fastDial service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8003**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-2286, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-2286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2286
- **State**: PUBLISHED
- **Published Date**: October 10, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Unspecified vulnerability in EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 before SP3 P3 allows remote attackers to obtain sensitive information via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55842](http://www.securityfocus.com/bid/55842)
2. [20121005 ESA-2012-035: RSAR Adaptive Authentication (On-Premise) Information Disclosure Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2012-10/0036.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-38883, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-38883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38883
- **State**: PUBLISHED
- **Published Date**: December 17, 2021 at 17:05 UTC
- **Last Updated**: September 16, 2024 at 19:25 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Business Automation Workflow 18.0, 19.0, 20,0 and 21.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209165.
### Affected Products
**IBM - Business Process Manager**
Affected versions:
- 8.5 (Status: affected)
- 8.6 (Status: affected)
**IBM - Business Automation Workflow**
Affected versions:
- 19.0.0 (Status: affected)
- 20.0.0 (Status: affected)
- 21.0 (Status: affected)
- 18.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6527270)
2. [ibm-baw-cve202138883-xss (209165)](https://exchange.xforce.ibmcloud.com/vulnerabilities/209165)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-30710, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-30710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30710
- **State**: PUBLISHED
- **Published Date**: June 07, 2022 at 17:52 UTC
- **Last Updated**: August 03, 2024 at 06:56 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper validation vulnerability in RemoteViews prior to SMR Jun-2022 Release 1 allows attackers to launch certain activities.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Q(10), R(11), S(12) (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-17201, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-17201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17201
- **State**: PUBLISHED
- **Published Date**: January 23, 2020 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. When a user requests elevation using the AdminByRequest.exe interface, the interface communicates with the underlying service (Audckq32.exe) using a .NET named pipe. If the underlying service responds that a user is permitted access to the elevation feature, the client then reinitiates communication with the underlying service and requests elevation. This elevation request has no local checks in the service, and depends on client-side validation in the AdminByRequest.exe interface, i.e., it is a vulnerable exposed functionality in the service. By communicating directly with the underlying service, any user can request elevation and obtain Administrator privilege regardless of group policies or permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://improsec.com/en/responsible-disclosure)
2. [](https://www.adminbyrequest.com/en/releasenotes)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1788, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1788
- **State**: PUBLISHED
- **Published Date**: November 02, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Protect Server 7.1 and 8.1 could disclose highly sensitive information via trace logs to a local privileged user. IBM X-Force ID: 148873.
### Affected Products
**IBM - Spectrum Protect**
Affected versions:
- 7.1 (Status: affected)
- 8.1 (Status: affected)
### References
1. [ibm-tivoli-cve20181788-info-disc(148873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/148873)
2. [105818](http://www.securityfocus.com/bid/105818)
3. [](http://www.ibm.com/support/docview.wss?uid=ibm10730357)
4. [1042032](http://www.securitytracker.com/id/1042032)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-17392, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-17392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17392
- **State**: PUBLISHED
- **Published Date**: August 25, 2020 at 20:20 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.3-47255. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handler for HOST_IOCTL_SET_KERNEL_SYMBOLS in the prl_hypervisor kext. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-10519.
### Weakness Classification (CWE)
- CWE-822: Security Weakness
### Affected Products
**Parallels - Desktop**
Affected versions:
- 15.1.3-47255 (Status: affected)
### References
1. [](https://kb.parallels.com/en/125013)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1010/)
### Credits
- Reno Robert
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-26836, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-26836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26836
- **State**: PUBLISHED
- **Published Date**: December 09, 2020 at 16:31 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.
### Affected Products
**SAP SE - SAP Solution Manager (Trace Analysis)**
Affected versions:
- < 720 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079)
2. [](https://launchpad.support.sap.com/#/notes/2938650)
3. [20210614 Onapsis Security Advisory 2021-0005: SAP Solution Manager Open Redirect from Trace Analysis](http://seclists.org/fulldisclosure/2021/Jun/25)
4. [](http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-28011, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-28011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28011
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 00:54 UTC
- **Last Updated**: January 14, 2025 at 03:57 UTC
- **Reserved Date**: February 29, 2024 at 08:40 UTC
- **Assigned By**: NEC
### Vulnerability Description
Hidden Functionality vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet
### Weakness Classification (CWE)
- CWE-912: Security Weakness
### Affected Products
**NEC Corporation - WG1800HP4**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1200HS3**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1900HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1200HP3**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1800HP3**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1200HS2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1900HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1200HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - W1200EX(-MS)**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1200HS**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1200HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WF300HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - W300P**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WF800HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8165N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG2200HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WF1200HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1800HP2**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WF1200HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG600HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG300HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WF300HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1800HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1400HP**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8175N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR9300N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8750N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8160N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR9500N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8600N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8370N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8170N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8700N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8300N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8150N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR4100N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR4500N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8100N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8500N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - CR2500P**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8400N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8200N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR1200H**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR7870S**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR6670S**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR7850S**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR6650S**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR6600H**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR7800H**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WM3400RN**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WM3450RN**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WM3500R**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WM3600R**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WM3800R**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WR8166N**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - MR01LN**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - MR02LN**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1810HP(JE)**
Affected versions:
- all versions (Status: affected)
**NEC Corporation - WG1810HP(MF)**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://jpn.nec.com/security-info/secinfo/nv24-001_en.html)
### Credits
- Katsuhiko Sato and Ryo Kashiro of 00One, Inc.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6852, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6852
- **State**: PUBLISHED
- **Published Date**: December 15, 2016 at 06:31 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 18, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Users can provide local file paths to the RSS reader; the response and error code give hints about whether the provided file exists or not. Attackers may discover specific system files or library versions on the middleware server to prepare further attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf)
2. [93459](http://www.securityfocus.com/bid/93459)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-7810, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-7810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7810
- **State**: PUBLISHED
- **Published Date**: August 07, 2020 at 15:21 UTC
- **Last Updated**: September 16, 2024 at 23:15 UTC
- **Reserved Date**: January 22, 2020 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
hslogin2.dll ActiveX Control in Groupware contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the activex method. This is due to a lack of integrity verification of the policy files referenced in the update process, and a remote attacker could induce a user to crafted web page, causing damage such as malicious code infection.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-353: Security Weakness
### Affected Products
**Handysoft, Inc. - hslogin2.dll**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](http://www.handysoft.co.kr/en/)
2. [](https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35551)
### Credits
- Thanks to Eunsol Lee for reporting this vulnerability.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-31761, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-31761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31761
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:51 UTC
- **Last Updated**: April 01, 2025 at 20:35 UTC
- **Reserved Date**: April 01, 2025 at 13:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DEJAN Hypotext allows Stored XSS. This issue affects Hypotext: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**DEJAN - Hypotext**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/hypotext/vulnerability/wordpress-hypotext-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3932, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3932
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 19:26 UTC
- **Last Updated**: June 11, 2021 at 19:26 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0423, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0423
- **State**: PUBLISHED
- **Published Date**: February 02, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 07, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57716](http://www.securityfocus.com/bid/57716)
2. [oval:org.mitre.oval:def:18869](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18869)
3. [SSRT101156](http://marc.info/?l=bugtraq&m=136570436423916&w=2)
4. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html)
5. [RHSA-2013:0236](http://rhn.redhat.com/errata/RHSA-2013-0236.html)
6. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html)
7. [VU#858729](http://www.kb.cert.org/vuls/id/858729)
8. [oval:org.mitre.oval:def:19425](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19425)
9. [RHSA-2013:0237](http://rhn.redhat.com/errata/RHSA-2013-0237.html)
10. [HPSBUX02857](http://marc.info/?l=bugtraq&m=136439120408139&w=2)
11. [oval:org.mitre.oval:def:16476](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16476)
12. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2)
13. [SSRT101103](http://marc.info/?l=bugtraq&m=136439120408139&w=2)
14. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html)
15. [HPSBUX02864](http://marc.info/?l=bugtraq&m=136570436423916&w=2)
16. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html)
17. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1110, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1110
- **State**: PUBLISHED
- **Published Date**: July 29, 2019 at 14:08 UTC
- **Last Updated**: August 04, 2024 at 18:06 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1111.
### Affected Products
**Microsoft - Microsoft Excel**
Affected versions:
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2016 (32-bit edition) (Status: affected)
- 2016 (64-bit edition) (Status: affected)
**Microsoft - Microsoft Office**
Affected versions:
- 2016 for Mac (Status: affected)
- 2019 for 32-bit editions (Status: affected)
- 2019 for 64-bit editions (Status: affected)
- 2019 for Mac (Status: affected)
**Microsoft - Office 365 ProPlus**
Affected versions:
- 32-bit Systems (Status: affected)
- 64-bit Systems (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1110)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-4501, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-4501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4501
- **State**: PUBLISHED
- **Published Date**: May 05, 2024 at 19:31 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 05, 2024 at 07:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been rated as critical. This issue affects some unknown processing of the file /view/bugSolve/captureData/commit.php. The manipulation of the argument tcpDump leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263105 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Ruijie - RG-UAC**
Affected versions:
- 20240428 (Status: affected)
### References
1. [VDB-263105 | Ruijie RG-UAC commit.php os command injection](https://vuldb.com/?id.263105)
2. [VDB-263105 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263105)
3. [Submit #323810 | Ruijie Ruijie RG-UAC Unified Internet Behavior Management Audit System Ruijie RG-UAC Unified Internet Behavior Management Audit System Command Injection](https://vuldb.com/?submit.323810)
4. [](https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-view_bugSolve_captureData_commit.php.pdf)
### Credits
- H0e4a0r1t (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5543, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5543
- **State**: PUBLISHED
- **Published Date**: December 03, 2012 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Feeds module 7.x-2.x before 7.x-2.0-alpha6 for Drupal, when a field is mapped to the node's author, does not properly check permissions, which allows remote attackers to create arbitrary nodes via a crafted source feed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupalcode.org/project/feeds.git/commitdiff/a538c20)
2. [[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/11/20/4)
3. [](http://drupal.org/node/1808832)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-4070, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-4070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4070
- **State**: PUBLISHED
- **Published Date**: May 06, 2019 at 18:15 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_Get_Task.cgi endpoint.
### Affected Products
**n/a - Sierra Wireless**
Affected versions:
- Sierra Wireless AirLink ES450 FW 4.9.3 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1461, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1461
- **State**: PUBLISHED
- **Published Date**: May 28, 2025 at 17:26 UTC
- **Last Updated**: May 29, 2025 at 19:02 UTC
- **Reserved Date**: February 18, 2025 at 20:50 UTC
- **Assigned By**: HeroDevs
### Vulnerability Description
Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation.
This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.
Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**N/A - Vuetify**
Affected versions:
- >=2.0.0 <3.0.0 (Status: affected)
### References
1. [](https://www.herodevs.com/vulnerability-directory/cve-2025-1461)
2. [](https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461)
### Credits
- abze
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-3186, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-3186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3186
- **State**: PUBLISHED
- **Published Date**: September 15, 2009 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:50 UTC
- **Reserved Date**: September 15, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in VideoGirls BiZ allow remote attackers to inject arbitrary web script or HTML via the (1) t parameter to forum.php, (2) profile_name parameter to profile.php, and (3) p parameter to view.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36168](http://www.securityfocus.com/bid/36168)
2. [ADV-2009-2437](http://www.vupen.com/english/advisories/2009/2437)
3. [36480](http://secunia.com/advisories/36480)
4. [](http://packetstormsecurity.org/0908-exploits/videogirls-xss.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-27724, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-27724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27724
- **State**: PUBLISHED
- **Published Date**: December 24, 2020 at 15:00 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 26, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In BIG-IP APM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, on systems running more than one TMM instance, authenticated VPN users may consume excessive resources by sending specially-crafted malicious traffic over the tunnel.
### Affected Products
**n/a - BIG-IP APM**
Affected versions:
- 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, 11.6.1-11.6.5.2 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K04518313)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-48573, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-48573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48573
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:15 UTC
- **Last Updated**: October 07, 2024 at 13:42 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-8278, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-8278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8278
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 12, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-35043, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-35043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35043
- **State**: PUBLISHED
- **Published Date**: July 25, 2023 at 12:57 UTC
- **Last Updated**: September 25, 2024 at 16:59 UTC
- **Reserved Date**: June 12, 2023 at 15:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Neha Goel Recent Posts Slider plugin <= 1.1 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Neha Goel - Recent Posts Slider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/recent-posts-slider/wordpress-recent-posts-slider-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LEE SE HYOUNG (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-43564, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-43564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43564
- **State**: PUBLISHED
- **Published Date**: November 10, 2021 at 15:04 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://typo3.org/security/advisory/typo3-ext-sa-2021-018)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18088, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18088
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 21:13 UTC
- **Reserved Date**: February 01, 2018 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [103040](http://www.securityfocus.com/bid/103040)
2. [](https://jira.atlassian.com/browse/BSERV-10594)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-2620, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-2620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2620
- **State**: PUBLISHED
- **Published Date**: July 27, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**QEMU - Qemu:**
Affected versions:
- 2.8 (Status: affected)
### References
1. [RHSA-2017:0329](http://rhn.redhat.com/errata/RHSA-2017-0329.html)
2. [RHSA-2017:0334](http://rhn.redhat.com/errata/RHSA-2017-0334.html)
3. [1037870](http://www.securitytracker.com/id/1037870)
4. [RHSA-2017:0328](http://rhn.redhat.com/errata/RHSA-2017-0328.html)
5. [[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html)
6. [RHSA-2017:0333](http://rhn.redhat.com/errata/RHSA-2017-0333.html)
7. [RHSA-2017:0351](http://rhn.redhat.com/errata/RHSA-2017-0351.html)
8. [RHSA-2017:0454](http://rhn.redhat.com/errata/RHSA-2017-0454.html)
9. [](https://xenbits.xen.org/xsa/advisory-209.html)
10. [RHSA-2017:0331](http://rhn.redhat.com/errata/RHSA-2017-0331.html)
11. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2620)
12. [[oss-security] 20170221 CVE-2017-2620 Qemu: display: cirrus: out-of-bounds access issue while in cirrus_bitblt_cputovideo](http://www.openwall.com/lists/oss-security/2017/02/21/1)
13. [RHSA-2017:0350](http://rhn.redhat.com/errata/RHSA-2017-0350.html)
14. [[debian-lts-announce] 20180206 [SECURITY] [DLA 1270-1] xen security update](https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html)
15. [RHSA-2017:0396](http://rhn.redhat.com/errata/RHSA-2017-0396.html)
16. [GLSA-201704-01](https://security.gentoo.org/glsa/201704-01)
17. [[qemu-devel] 20170221 [PATCH] cirrus: add blit_is_unsafe call to cirrus_bitblt_cputovideo (CVE-2017-2620)](https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html)
18. [RHSA-2017:0352](http://rhn.redhat.com/errata/RHSA-2017-0352.html)
19. [RHSA-2017:0330](http://rhn.redhat.com/errata/RHSA-2017-0330.html)
20. [RHSA-2017:0332](http://rhn.redhat.com/errata/RHSA-2017-0332.html)
21. [96378](http://www.securityfocus.com/bid/96378)
22. [](https://support.citrix.com/article/CTX220771)
23. [GLSA-201703-07](https://security.gentoo.org/glsa/201703-07)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-30873, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-30873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30873
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:55 UTC
- **Last Updated**: March 27, 2025 at 18:57 UTC
- **Reserved Date**: March 26, 2025 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpsoul Greenshift allows Stored XSS. This issue affects Greenshift: from n/a through 11.0.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**wpsoul - Greenshift**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/greenshift-animation-and-page-builder-blocks/vulnerability/wordpress-greenshift-plugin-11-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Peter Thaleikis (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-6702, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-6702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6702
- **State**: REJECTED
- **Published Date**: January 12, 2021 at 20:02 UTC
- **Last Updated**: January 12, 2021 at 20:02 UTC
- **Reserved Date**: January 09, 2020 at 00:00 UTC
- **Assigned By**: Eaton
### Vulnerability Description
No description available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.