System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-1754, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-1754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1754
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 05:00 UTC
- **Last Updated**: December 02, 2024 at 15:08 UTC
- **Reserved Date**: February 22, 2024 at 14:42 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The NPS computy WordPress plugin through 2.7.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - NPS computy**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c061e792-e37a-4cf6-b46b-ff111c5a5c84/)
### Credits
- Bob Matyas
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-5676, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-5676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5676
- **State**: PUBLISHED
- **Published Date**: December 13, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 03, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Jenkins Plugin for SonarQube 3.7 and earlier allows remote authenticated users to obtain sensitive information (cleartext passwords) by reading the value in the sonar.sonarPassword parameter from jenkins/configure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20131206 [CVE-2013-5676] Plain Text Password In SonarQube Jenkins Plugin](http://seclists.org/fulldisclosure/2013/Dec/37)
2. [100666](http://www.osvdb.org/100666)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-49004, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-49004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49004
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 20:25 UTC
- **Last Updated**: June 10, 2025 at 15:30 UTC
- **Reserved Date**: May 29, 2025 at 16:34 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Caido is a web security auditing toolkit. Prior to version 0.48.0, due to the lack of protection for DNS rebinding, Caido can be loaded on an attacker-controlled domain. This allows a malicious website to hijack the authentication flow of Caido and achieve code execution. A malicious website loaded in the browser can hijack the locally running Caido instance and achieve remote command execution during the initial setup. Even if the Caido instance is already configured, an attacker can initiate the authentication flow by performing DNS rebinding. In this case, the victim needs to authorize the request on dashboard.caido.io. Users should upgrade to version 0.48.0 to receive a patch.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**caido - caido**
Affected versions:
- < 0.48.0 (Status: affected)
### References
1. [https://github.com/caido/caido/security/advisories/GHSA-jmxf-xw2r-vjrg](https://github.com/caido/caido/security/advisories/GHSA-jmxf-xw2r-vjrg)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-4634, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-4634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4634
- **State**: PUBLISHED
- **Published Date**: May 30, 2025 at 08:21 UTC
- **Last Updated**: May 30, 2025 at 13:54 UTC
- **Reserved Date**: May 13, 2025 at 01:42 UTC
- **Assigned By**: GovTech CSG
### Vulnerability Description
The web portal on airpointer 2.4.107-2 was vulnerable local file inclusion. A malicious user with administrative privileges in the web portal would be able to manipulate requests to view files on the filesystem
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**JCT - Airpointer**
Affected versions:
- 2.4.107-2 (Status: affected)
### References
1. [](https://jct-aq.com/products/airpointer2d/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-0716, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-0716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0716
- **State**: PUBLISHED
- **Published Date**: June 20, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 17, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Administration Console in IBM WebSphere Application Server 7.0 before 7.0.0.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [PM53132](http://www.ibm.com/support/docview.wss?uid=swg1PM53132)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21595172)
3. [52722](http://www.securityfocus.com/bid/52722)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1225, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1225
- **State**: REJECTED
- **Published Date**: March 19, 2018 at 20:00 UTC
- **Last Updated**: March 19, 2018 at 19:57 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-15602, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-15602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15602
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 19:15 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 07, 2020 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.
### Affected Products
**Trend Micro - Trend Micro Security (Consumer)**
Affected versions:
- 2020 (v16) (Status: affected)
### References
1. [](https://helpcenter.trendmicro.com/en-us/article/TMKA-09644)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3769, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3769
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 04:00 UTC
- **Last Updated**: August 12, 2024 at 13:08 UTC
- **Reserved Date**: April 14, 2024 at 19:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in PHPGurukul Student Record System 3.20. Affected is an unknown function of the file /login.php. The manipulation of the argument id/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260616.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**PHPGurukul - Student Record System**
Affected versions:
- 3.20 (Status: affected)
### References
1. [VDB-260616 | PHPGurukul Student Record System login.php sql injection](https://vuldb.com/?id.260616)
2. [VDB-260616 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.260616)
3. [Submit #316302 | PHPGurukul Student Record System 3.20 Authentication Bypass](https://vuldb.com/?submit.316302)
4. [](https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md)
### Credits
- Burak (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-7246, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-7246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7246
- **State**: PUBLISHED
- **Published Date**: January 27, 2020 at 14:56 UTC
- **Last Updated**: August 07, 2024 at 20:57 UTC
- **Reserved Date**: October 18, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.gnome.org/show_bug.cgi?id=341323)
2. [](http://www.openwall.com/lists/oss-security/2010/04/22/2)
3. [](https://bugzilla.novell.com/show_bug.cgi?id=574266)
4. [](https://lwn.net/Articles/468868/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-2326, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-2326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2326
- **State**: PUBLISHED
- **Published Date**: April 27, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in HYIP Manager Pro allow remote attackers to execute arbitrary PHP code via a URL in the plugin_file parameter to (1) Smarty.class.php and (2) Smarty_Compiler.class.php in inc/libs/; (3) core.display_debug_console.php, (4) core.load_plugins.php, (5) core.load_resource_plugin.php, (6) core.process_cached_inserts.php, (7) core.process_compiled_include.php, and (8) core.read_cache_file.php in inc/libs/core/; and other unspecified files. NOTE: (1) and (2) might be incorrectly reported vectors in Smarty.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2634](http://securityreason.com/securityalert/2634)
2. [hyipmanager-pluginfile-file-include(33882)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33882)
3. [20070425 HYIP Manager Pro Script >> Remote file Include](http://www.securityfocus.com/archive/1/466837/100/0/threaded)
4. [23663](http://www.securityfocus.com/bid/23663)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-15791, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-15791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15791
- **State**: PUBLISHED
- **Published Date**: April 23, 2020 at 23:55 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: August 29, 2019 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-672: Security Weakness
### Affected Products
**Ubuntu - Shiftfs in the Linux kernel**
Affected versions:
- 5.3.0-11.12 (Status: affected)
- 5.0 kernel (Status: affected)
### References
1. [](https://usn.ubuntu.com/usn/usn-4183-1)
2. [](https://usn.ubuntu.com/usn/usn-4184-1)
3. [](https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=601a64857b3d7040ca15c39c929e6b9db3373ec1)
### Credits
- Jann Horn of Google Project Zero
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-3218, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-3218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3218
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:35 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.3 (Status: affected)
- 8.5.4 (Status: affected)
### References
1. [105603](http://www.securityfocus.com/bid/105603)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10069, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10069
- **State**: PUBLISHED
- **Published Date**: May 31, 2019 at 21:36 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://godotengine.org/news)
2. [](https://github.com/godotengine/godot/pull/27398)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6091, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6091
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 12:49 UTC
- **Last Updated**: September 11, 2024 at 18:23 UTC
- **Reserved Date**: June 17, 2024 at 18:16 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**significant-gravitas - significant-gravitas/autogpt**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050)
2. [](https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-27222, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-27222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27222
- **State**: PUBLISHED
- **Published Date**: March 08, 2021 at 14:01 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the "Time in Status" app before 4.13.0 for Jira, remote authenticated attackers can cause Stored XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://marketplace.atlassian.com/apps/1211756/time-in-status/version-history)
2. [](https://dev.obss.com.tr/confluence/display/MD/2021-02-25+Time+in+Status+for+Jira+Server+and+Data+Center+Security+Advisory)
3. [](https://dev.obss.com.tr/jira/browse/APDTIS-1097?src=confmacro)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-3480, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-3480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3480
- **State**: PUBLISHED
- **Published Date**: March 25, 2019 at 16:03 UTC
- **Last Updated**: August 04, 2024 at 19:12 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Mitigates a stored/reflected XSS issue in ArcSight Logger versions prior to 6.7.
### Affected Products
**n/a - ArcSight Logger**
Affected versions:
- Versions prior to 6.7 (Status: affected)
### References
1. [](https://softwaresupport.softwaregrp.com/doc/KM03355866)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-26861, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-26861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26861
- **State**: REJECTED
- **Last Updated**: October 13, 2022 at 00:00 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-28046, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-28046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28046
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 13:45 UTC
- **Last Updated**: August 14, 2024 at 14:39 UTC
- **Reserved Date**: March 01, 2024 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path in some Intel(R) GPA software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) GPA software**
Affected versions:
- before version 2024.1 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-5781, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-5781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5781
- **State**: PUBLISHED
- **Published Date**: November 07, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the handshake function in iodine 0.3.2 allows remote attackers to execute arbitrary code via a crafted DNS response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061102 iodine client 0.3.2 buffer overflow](http://www.securityfocus.com/archive/1/450399/100/0/threaded)
2. [20883](http://www.securityfocus.com/bid/20883)
3. [30182](http://www.osvdb.org/30182)
4. [22674](http://secunia.com/advisories/22674)
5. [ADV-2006-4333](http://www.vupen.com/english/advisories/2006/4333)
6. [1017155](http://securitytracker.com/id?1017155)
7. [iodine-handshake-bo(29995)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29995)
8. [](http://code.kryo.se/iodine/CHANGELOG.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-17256, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-17256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17256
- **State**: PUBLISHED
- **Published Date**: October 08, 2019 at 11:20 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.53 allows a User Mode Write AV starting at DPX!ReadDPX_W+0x0000000000001203.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.irfanview.com/main_history.htm)
2. [](https://github.com/linhlhq/research/blob/master/README.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1436, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1436
- **State**: PUBLISHED
- **Published Date**: March 13, 2025 at 06:00 UTC
- **Last Updated**: March 14, 2025 at 16:05 UTC
- **Reserved Date**: February 18, 2025 at 15:01 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Limit Bio WordPress plugin through 1.0 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Limit Bio**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/)
### Credits
- Bob Matyas
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-5119, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-5119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5119
- **State**: PUBLISHED
- **Published Date**: September 27, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 15:17 UTC
- **Reserved Date**: September 27, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JSPWiki 2.4.103 and 2.5.139-beta allows remote attackers to obtain sensitive information (full path) via an invalid integer in the version parameter to the default URI under attach/Main/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [jspwiki-version-information-disclosure(36768)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36768)
2. [20070925 JSPWiki Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/480570/100/0/threaded)
3. [](http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog)
4. [3167](http://securityreason.com/securityalert/3167)
5. [20070924 JSPWiki Multiple Input Validation Vulnerabilities](http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html)
6. [26961](http://secunia.com/advisories/26961)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5514, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5514
- **State**: PUBLISHED
- **Published Date**: December 13, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55082](http://secunia.com/advisories/55082)
2. [openSUSE-SU-2013:0133](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html)
3. [openSUSE-SU-2013:0637](http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html)
4. [56803](http://www.securityfocus.com/bid/56803)
5. [](http://support.citrix.com/article/CTX135777)
6. [GLSA-201309-24](http://security.gentoo.org/glsa/glsa-201309-24.xml)
7. [DSA-2582](http://www.debian.org/security/2012/dsa-2582)
8. [xen-guestphysmapmark-dos(80483)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80483)
9. [[oss-security] 20121203 Xen Security Advisory 30 (CVE-2012-5514) - Broken error handling in guest_physmap_mark_populate_on_demand()](http://www.openwall.com/lists/oss-security/2012/12/03/12)
10. [51397](http://secunia.com/advisories/51397)
11. [openSUSE-SU-2012:1685](http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html)
12. [51486](http://secunia.com/advisories/51486)
13. [51487](http://secunia.com/advisories/51487)
14. [88130](http://www.osvdb.org/88130)
15. [51468](http://secunia.com/advisories/51468)
16. [openSUSE-SU-2013:0636](http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html)
17. [SUSE-SU-2014:0446](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html)
18. [openSUSE-SU-2012:1687](http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html)
19. [SUSE-SU-2012:1615](http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-4027, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-4027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4027
- **State**: PUBLISHED
- **Published Date**: May 13, 2019 at 15:40 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable denial-of-service vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a semaphore deadlock, which prevents the device from receiving any physical or network inputs. An attacker can send a specially crafted packet to trigger this vulnerability.
### Affected Products
**n/a - Novatek**
Affected versions:
- Anker Roav A1 Dashcam RoavA1SWV1.9 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0699)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-4556, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-4556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4556
- **State**: PUBLISHED
- **Published Date**: August 28, 2024 at 06:27 UTC
- **Last Updated**: August 28, 2024 at 13:27 UTC
- **Reserved Date**: May 06, 2024 at 17:46 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in OpenText NetIQ Access Manager allows access the sensitive information. This issue affects NetIQ Access Manager before 5.0.4 and before 5.1.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**OpenText - NetIQ Access Manager**
Affected versions:
- 5.0.4.1 (Status: affected)
- 5.1 (Status: affected)
### References
1. [](https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html)
2. [](https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-0079, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-0079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0079
- **State**: PUBLISHED
- **Published Date**: January 04, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: January 04, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in auth.php in ScozNet ScozBook BETA 1.1 allows remote attackers to execute arbitrary SQL commands via the username field (adminname variable).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22221](http://www.osvdb.org/22221)
2. [8476](http://secunia.com/advisories/8476)
3. [16115](http://www.securityfocus.com/bid/16115)
4. [ADV-2006-0027](http://www.vupen.com/english/advisories/2006/0027)
5. [](http://evuln.com/vulns/11/summary.html)
6. [20060102 [eVuln] ScozBook "adminname" Authentication Bypass](http://www.securityfocus.com/archive/1/420675/100/0/threaded)
7. [318](http://securityreason.com/securityalert/318)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0474, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0474
- **State**: PUBLISHED
- **Published Date**: March 29, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The Manual Explore browser plug-in in IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 allows remote attackers to discover test Platform Authentication credentials via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21631304)
2. [appscan-manual-explore-csrf(81338)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81338)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21626264)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1147, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1147
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 18:06 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1703**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Systems Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1147)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3965, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3965
- **State**: PUBLISHED
- **Published Date**: April 04, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 16:38 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Cross-Site Request Forgery (CSRF) (aka Session Riding) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to perform unauthorized tasks such as retrieving internal system information or manipulating the database via specially crafted URLs.
### Affected Products
**McAfee - Network Security Management (NSM)**
Affected versions:
- 8.2 (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10192)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-31736, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-31736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31736
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 13:27 UTC
- **Last Updated**: April 03, 2025 at 15:06 UTC
- **Reserved Date**: April 01, 2025 at 13:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in richtexteditor Rich Text Editor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Rich Text Editor: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**richtexteditor - Rich Text Editor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/richtexteditor/vulnerability/wordpress-rich-text-editor-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-37082, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-37082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37082
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:03 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the host_time parameter at the function NTPSyncWithHost.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-7847, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-7847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7847
- **State**: PUBLISHED
- **Published Date**: February 23, 2021 at 15:39 UTC
- **Last Updated**: August 04, 2024 at 09:41 UTC
- **Reserved Date**: January 22, 2020 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
The ipTIME NAS product allows an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. This issue affects: pTIME NAS 1.4.36.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**EFM Networks - ipTIME NAS **
Affected versions:
- 1.4.36 (Status: affected)
### References
1. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35921)
### Credits
- JaeHyung Lee, InHyung Lee
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6805, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6805
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 12, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apache Ignite before 1.9 allows man-in-the-middle attackers to read arbitrary files via XXE in modified update-notifier documents.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97509](http://www.securityfocus.com/bid/97509)
2. [](http://seclists.org/oss-sec/2017/q2/31)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10593, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10593
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer overflow can occur when processing non standard SDP video Image attribute parameter in a VILTE\VOLTE call in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-2044, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-2044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2044
- **State**: PUBLISHED
- **Published Date**: April 26, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has a default username of admin and a default password of admin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-1540](http://www.vupen.com/english/advisories/2006/1540)
2. [ip3-na75-default-account(26112)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26112)
3. [793](http://securityreason.com/securityalert/793)
4. [20060424 Multiple vulnerabilities in IP3 Networks 'NetAccess' NA75 appliance](http://www.securityfocus.com/archive/1/432007/100/0/threaded)
5. [17698](http://www.securityfocus.com/bid/17698)
6. [19818](http://secunia.com/advisories/19818)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-2449, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-2449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2449
- **State**: PUBLISHED
- **Published Date**: June 18, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 15:36 UTC
- **Reserved Date**: March 05, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=975145)
2. [RHSA-2013:1060](http://rhn.redhat.com/errata/RHSA-2013-1060.html)
3. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
4. [](http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/b1a2b9ac9714)
5. [](http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html)
6. [SUSE-SU-2013:1257](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html)
7. [HPSBUX02907](http://marc.info/?l=bugtraq&m=137545505800971&w=2)
8. [oval:org.mitre.oval:def:17192](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17192)
9. [54154](http://secunia.com/advisories/54154)
10. [TA13-169A](http://www.us-cert.gov/ncas/alerts/TA13-169A)
11. [](http://advisories.mageia.org/MGASA-2013-0185.html)
12. [RHSA-2013:0963](http://rhn.redhat.com/errata/RHSA-2013-0963.html)
13. [oval:org.mitre.oval:def:18717](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18717)
14. [MDVSA-2013:183](http://www.mandriva.com/security/advisories?name=MDVSA-2013:183)
15. [](http://www-01.ibm.com/support/docview.wss?uid=swg21642336)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-1958, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-1958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1958
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-10400, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-10400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10400
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 13:03 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/article-collaboration.php by adding a question mark (?) followed by the payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniocannito.it/?p=137#uxss)
2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0866, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0866
- **State**: PUBLISHED
- **Published Date**: February 21, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 20, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019441](http://www.securitytracker.com/id?1019441)
2. [BEA08-185.00](http://dev2dev.bea.com/pub/advisory/258)
3. [29041](http://secunia.com/advisories/29041)
4. [ADV-2008-0611](http://www.vupen.com/english/advisories/2008/0611)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-4838, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-4838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4838
- **State**: PUBLISHED
- **Published Date**: May 12, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 17, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
The Android Apps Money Forward (prior to v7.18.0), Money Forward for The Gunma Bank (prior to v1.2.0), Money Forward for SHIGA BANK (prior to v1.2.0), Money Forward for SHIZUOKA BANK (prior to v1.4.0), Money Forward for SBI Sumishin Net Bank (prior to v1.6.0), Money Forward for Tokai Tokyo Securities (prior to v1.4.0), Money Forward for THE TOHO BANK (prior to v1.3.0), Money Forward for YMFG (prior to v1.5.0) provided by Money Forward, Inc. and Money Forward for AppPass (prior to v7.18.3), Money Forward for au SMARTPASS (prior to v7.18.0), Money Forward for Chou Houdai (prior to v7.18.3) provided by SOURCENEXT CORPORATION allows an attacker to execute unintended operations via a specially crafted application.
### Affected Products
**Money Foward, Inc. - Money Forward**
Affected versions:
- prior to v7.18.0 (Status: affected)
**Money Foward, Inc. - Money Forward for The Gunma Bank**
Affected versions:
- prior to v1.2.0 (Status: affected)
**Money Foward, Inc. - Money Forward for SHIGA BANK**
Affected versions:
- prior to v1.2.0 (Status: affected)
**Money Foward, Inc. - Money Forward for SHIZUOKA BANK**
Affected versions:
- prior to v1.4.0 (Status: affected)
**Money Foward, Inc. - Money Forward for SBI Sumishin Net Bank**
Affected versions:
- prior to v1.6.0 (Status: affected)
**Money Foward, Inc. - Money Forward for Tokai Tokyo Securities**
Affected versions:
- prior to v1.4.0 (Status: affected)
**Money Foward, Inc. - Money Forward for THE TOHO BANK**
Affected versions:
- prior to v1.3.0 (Status: affected)
**Money Foward, Inc. - Money Forward for YMFG**
Affected versions:
- prior to v1.5.0 (Status: affected)
**SOURCENEXT CORPORATION - Money Forward for AppPass**
Affected versions:
- prior to v7.18.3 (Status: affected)
**SOURCENEXT CORPORATION - Money Forward for au SMARTPASS**
Affected versions:
- prior to v7.18.0 (Status: affected)
**SOURCENEXT CORPORATION - Money Forward for Chou Houdai**
Affected versions:
- prior to v7.18.3 (Status: affected)
### References
1. [](http://www.sourcenext.com/support/i/160725_1)
2. [JVN#49343562](https://jvn.jp/en/jp/JVN49343562/index.html)
3. [](http://corp.moneyforward.com/info/20160920-mf-android/)
4. [93034](http://www.securityfocus.com/bid/93034)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-29037, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-29037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29037
- **State**: REJECTED
- **Last Updated**: April 02, 2023 at 00:00 UTC
- **Reserved Date**: March 30, 2023 at 00:00 UTC
- **Assigned By**: STAR_Labs
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-30747, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-30747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30747
- **State**: PUBLISHED
- **Published Date**: June 07, 2022 at 18:20 UTC
- **Last Updated**: August 03, 2024 at 06:56 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
PendingIntent hijacking vulnerability in Smart Things prior to 1.7.85.25 allows local attackers to access files without permission via implicit Intent.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Samsung Mobile - Smart Things**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3293, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3293
- **State**: PUBLISHED
- **Published Date**: April 23, 2024 at 01:58 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 03, 2024 at 21:29 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The rtMedia for WordPress, BuddyPress and bbPress plugin for WordPress is vulnerable to blind SQL Injection via the rtmedia_gallery shortcode in all versions up to, and including, 4.6.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**rtcamp - rtMedia for WordPress, BuddyPress and bbPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/32b6938a-0566-46c8-8761-0403b3a0e3e9?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3071359/buddypress-media)
### Credits
- Krzysztof Zając
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-6682, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-6682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6682
- **State**: PUBLISHED
- **Published Date**: December 23, 2019 at 16:54 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, the BIG-IP ASM system may consume excessive resources when processing certain types of HTTP responses from the origin web server. This vulnerability is only known to affect resource-constrained systems in which the security policy is configured with response-side features, such as Data Guard or response-side learning.
### Affected Products
**F5 - BIG-IP ASM**
Affected versions:
- 15.0.0-15.0.1.1 (Status: affected)
- 14.0.0-14.1.2.2 (Status: affected)
- 13.1.0-13.1.3.1 (Status: affected)
- 12.1.0-12.1.5 (Status: affected)
- 11.5.2-11.6.5.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K40452417)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-22020, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-22020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22020
- **State**: PUBLISHED
- **Published Date**: September 23, 2021 at 12:16 UTC
- **Last Updated**: August 03, 2024 at 18:30 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
The vCenter Server contains a denial-of-service vulnerability in the Analytics service. Successful exploitation of this issue may allow an attacker to create a denial-of-service condition on vCenter Server.
### Affected Products
**n/a - VMware vCenter Server, VMware Cloud Foundation**
Affected versions:
- VMware vCenter Server(7.x before 7.0 U2c and 6.7 before 6.7 U3o) and VMware Cloud Foundation (4.x before 4.3 and 3.x before 3.10.2.2) (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2021-0020.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4614, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4614
- **State**: PUBLISHED
- **Published Date**: January 18, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: January 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Moa Gallery 1.2.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the MOA_PATH parameter to (1) _error_funcs.php, (2) _integrity_funcs.php, (3) _template_component_admin.php, (4) _template_component_gallery.php, (5) _template_parser.php, (6) mod_gallery_funcs.php, (7) mod_image_funcs.php, (8) mod_tag_funcs.php, (9) mod_tag_view.php, (10) mod_upgrade_funcs.php, (11) mod_user_funcs.php, (12) page_admin.php, (13) page_gallery_add.php, (14) page_gallery_view.php, (15) page_image_add.php, (16) page_image_view_full.php, (17) page_login.php, and (18) page_sitemap.php in sources/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9522](http://www.exploit-db.com/exploits/9522)
2. [ADV-2009-2430](http://www.vupen.com/english/advisories/2009/2430)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-0247, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-0247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0247
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflows in wmtv 0.6.5 and earlier may allow local users to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4054](http://www.securityfocus.com/bid/4054)
2. [wmtv-local-bo(8111)](http://www.iss.net/security_center/static/8111.php)
3. [DSA-108](http://www.debian.org/security/2002/dsa-108)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-1774, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-1774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1774
- **State**: PUBLISHED
- **Published Date**: April 14, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in editlink.php in Pligg 9.9.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [pliggcms-editlink-sql-injection(41709)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41709)
2. [ADV-2008-1164](http://www.vupen.com/english/advisories/2008/1164/references)
3. [5406](https://www.exploit-db.com/exploits/5406)
4. [28681](http://www.securityfocus.com/bid/28681)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-4768, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-4768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4768
- **State**: PUBLISHED
- **Published Date**: February 11, 2021 at 16:30 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Case Manager 5.2 and 5.3 and IBM Business Automation Workflow 18.0, 19.0, and 20.0 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188907.
### Affected Products
**IBM - Business Automation Workflow**
Affected versions:
- 18.0 (Status: affected)
- 19.0 (Status: affected)
- 20.0 (Status: affected)
**IBM - Case Manager**
Affected versions:
- 5.2 (Status: affected)
- 5.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6414377)
2. [ibm-baw-cve20204768-xss (188907)](https://exchange.xforce.ibmcloud.com/vulnerabilities/188907)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-32819, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-32819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32819
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 17:18 UTC
- **Last Updated**: May 13, 2025 at 03:55 UTC
- **Reserved Date**: April 11, 2025 at 08:50 UTC
- **Assigned By**: sonicwall
### Vulnerability Description
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**SonicWall - SMA100**
Affected versions:
- 10.2.1.14-75sv and earlier versions (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-34065, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-34065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34065
- **State**: PUBLISHED
- **Published Date**: June 12, 2024 at 14:54 UTC
- **Last Updated**: August 02, 2024 at 02:42 UTC
- **Reserved Date**: April 30, 2024 at 06:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-294: Security Weakness
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**strapi - strapi**
Affected versions:
- < 4.24.2 (Status: affected)
### References
1. [https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc](https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-37029, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-37029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37029
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 00:00 UTC
- **Last Updated**: January 23, 2025 at 19:10 UTC
- **Reserved Date**: June 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) are susceptible to an assertion-based crash when an oversized NAS packet is received. An attacker may leverage this behavior to repeatedly crash the MME via either a compromised base station or via an unauthenticated cellphone within range of a base station managed by the MME, causing a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cellularsecurity.org/ransacked)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-7990, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-7990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7990
- **State**: PUBLISHED
- **Published Date**: August 26, 2019 at 18:45 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Photoshop CC**
Affected versions:
- <=19.1.8 and <=20.0.5 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb19-44.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-1090, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-1090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1090
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 22:53 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1077, CVE-2020-1086, CVE-2020-1125, CVE-2020-1139, CVE-2020-1149, CVE-2020-1151, CVE-2020-1155, CVE-2020-1156, CVE-2020-1157, CVE-2020-1158, CVE-2020-1164.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1090)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-4893, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-4893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4893
- **State**: PUBLISHED
- **Published Date**: September 19, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in bb_usage_stats/includes/bb_usage_stats.php in phpBB XS 0.58 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter, a different vector than CVE-2006-4780.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-3654](http://www.vupen.com/english/advisories/2006/3654)
2. [](http://nyubicrew.org/adv/Noge_adv_02.txt)
3. [21970](http://secunia.com/advisories/21970)
4. [20060915 SolpotCrew Advisory #10 - phpBB XS (phpbb_root_path) Remote File Include](http://www.securityfocus.com/archive/1/446108/100/0/threaded)
5. [28918](http://www.osvdb.org/28918)
6. [20061123 Re: SolpotCrew Advisory #10 - phpBB XS (phpbb_root_path) Remote File Include](http://www.securityfocus.com/archive/1/452469/100/200/threaded)
7. [20046](http://www.securityfocus.com/bid/20046)
8. [1617](http://securityreason.com/securityalert/1617)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10538, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10538
- **State**: PUBLISHED
- **Published Date**: April 29, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 07:39 UTC
- **Reserved Date**: April 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dbry/WavPack/issues/33)
2. [DSA-4197](https://www.debian.org/security/2018/dsa-4197)
3. [USN-3637-1](https://usn.ubuntu.com/3637-1/)
4. [](https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d)
5. [20191219 [slackware-security] wavpack (SSA:2019-353-01)](https://seclists.org/bugtraq/2019/Dec/37)
6. [](http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html)
7. [FEDORA-2020-e55567b6be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/)
8. [FEDORA-2020-73274c9df4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-48524, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-48524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48524
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:16 UTC
- **Last Updated**: October 07, 2024 at 13:56 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-27773, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-27773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27773
- **State**: PUBLISHED
- **Published Date**: December 04, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
### Weakness Classification (CWE)
- CWE-369: Security Weakness
### Affected Products
**n/a - ImageMagick**
Affected versions:
- ImageMagick 7.0.9-0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1898295)
2. [[debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html)
3. [[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3635, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3635
- **State**: PUBLISHED
- **Published Date**: August 13, 2021 at 13:22 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: July 02, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.5-rc7 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1976946)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-7717, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-7717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7717
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-3749, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-3749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3749
- **State**: PUBLISHED
- **Published Date**: August 21, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:52 UTC
- **Reserved Date**: August 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in tr.php in YourFreeWorld Banner Management Script allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4175](http://securityreason.com/securityalert/4175)
2. [6936](https://www.exploit-db.com/exploits/6936)
3. [bannermanagement-tr-sql-injection(44551)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44551)
4. [30756](http://www.securityfocus.com/bid/30756)
5. [ADV-2008-2989](http://www.vupen.com/english/advisories/2008/2989)
6. [6276](https://www.exploit-db.com/exploits/6276)
7. [31542](http://secunia.com/advisories/31542)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-30824, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-30824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30824
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:55 UTC
- **Last Updated**: March 27, 2025 at 18:56 UTC
- **Reserved Date**: March 26, 2025 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Israpil Textmetrics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Textmetrics: from n/a through 3.6.1.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Israpil - Textmetrics**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/webtexttool/vulnerability/wordpress-textmetrics-plugin-3-6-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-2677, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-2677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2677
- **State**: REJECTED
- **Published Date**: April 02, 2019 at 19:15 UTC
- **Last Updated**: April 03, 2019 at 17:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: obdev
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-43533, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-43533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43533
- **State**: PUBLISHED
- **Published Date**: December 08, 2021 at 21:20 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-48/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1724233)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0212, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0212
- **State**: PUBLISHED
- **Published Date**: March 09, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in HIS Auktion 1.62 allows remote attackers to read arbitrary files via a .. (dot dot) in the menue parameter, and possibly execute commands via shell metacharacters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2367](http://www.securityfocus.com/bid/2367)
2. [20010212 HIS Auktion 1.62: "show files" vulnerability and remote command execute.](http://archives.neohapsis.com/archives/bugtraq/2001-02/0218.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1538, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1538
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sensitive server information, including the Administrator's password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19990114 MS IIS 4.0 Security Advisory](http://marc.info/?l=bugtraq&m=91638375309890&w=2)
2. [19990114 MS IIS 4.0 Security Advisory](http://marc.info/?l=ntbugtraq&m=91632724913080&w=2)
3. [189](http://www.securityfocus.com/bid/189)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-27318, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-27318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27318
- **State**: PUBLISHED
- **Published Date**: February 24, 2025 at 14:49 UTC
- **Last Updated**: February 24, 2025 at 15:48 UTC
- **Reserved Date**: February 21, 2025 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ixiter Simple Google Sitemap allows Cross Site Request Forgery. This issue affects Simple Google Sitemap: from n/a through 1.6.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ixiter - Simple Google Sitemap**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/simple-google-sitemap/vulnerability/wordpress-simple-google-sitemap-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15317, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15317
- **State**: PUBLISHED
- **Published Date**: December 22, 2017 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an input validation vulnerability in Huawei multiple products. Due to the insufficient input validation, an unauthenticated, remote attacker may craft a malformed Stream Control Transmission Protocol (SCTP) packet and send it to the device, causing the device to read out of bounds and restart.
### Affected Products
**Huawei Technologies Co., Ltd. - AR120-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR1200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C13 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR1200-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR150**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR150-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR160**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C12 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR200-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR2200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C13 (Status: affected)
- V200R006C16 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR2200-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR3200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C11 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C00 (Status: affected)
- V200R008C10 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - AR510**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C12 (Status: affected)
- V200R006C13 (Status: affected)
- V200R006C15 (Status: affected)
- V200R006C16 (Status: affected)
- V200R006C17 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - SRG1300**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - SRG2300**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei Technologies Co., Ltd. - SRG3300**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sctp-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46968, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46968
- **State**: PUBLISHED
- **Published Date**: January 27, 2023 at 00:00 UTC
- **Last Updated**: March 28, 2025 at 15:55 UTC
- **Reserved Date**: December 12, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in /index.php?page=help of Revenue Collection System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into sent messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-18108, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-18108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18108
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40114, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40114
- **State**: PUBLISHED
- **Published Date**: February 15, 2024 at 22:31 UTC
- **Last Updated**: August 15, 2024 at 18:10 UTC
- **Reserved Date**: August 09, 2023 at 02:29 UTC
- **Assigned By**: google_android
### Vulnerability Description
In multiple functions of MtpFfsHandle.cpp , there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/av/+/2fdf54b050f728fd965c9afdd03116e9b9dafbae)
2. [](https://source.android.com/security/bulletin/2023-11-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36433, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36433
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 17:29 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in jocms 0.8 allows remote attackers to run arbitrary SQL commands and view sentivie information via jo_delete_mask function in jocms/apps/mask/mask.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mxgbr/jocms/issues/6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-43158, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-43158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43158
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:17 UTC
- **Last Updated**: November 05, 2024 at 21:15 UTC
- **Reserved Date**: August 07, 2024 at 09:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Masteriyo Masteriyo - LMS allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Masteriyo - LMS: from n/a through 1.11.4.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Masteriyo - Masteriyo - LMS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/learning-management-system/wordpress-masteriyo-lms-plugin-1-11-4-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0087, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0087
- **State**: PUBLISHED
- **Published Date**: March 11, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to obtain sensitive information from kernel memory, and possibly bypass the KASLR protection mechanism, via a crafted font, aka "Adobe Font Driver Information Disclosure Vulnerability," a different vulnerability than CVE-2015-0089.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-021](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021)
2. [1031889](http://www.securitytracker.com/id/1031889)
3. [72893](http://www.securityfocus.com/bid/72893)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24354, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24354
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:52 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15835.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**TP-Link - AC1750**
Affected versions:
- prior to 1.1.4 Build 20211022 rel.59103(5553) (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-264/)
### Credits
- Axel '0vercl0k' Souchet from https://doar-e.github.io/
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41165, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41165
- **State**: PUBLISHED
- **Published Date**: December 18, 2024 at 22:39 UTC
- **Last Updated**: December 20, 2024 at 17:32 UTC
- **Reserved Date**: August 05, 2024 at 20:37 UTC
- **Assigned By**: talos
### Vulnerability Description
A library injection vulnerability exists in Microsoft Word 16.83 for macOS. A specially crafted library can leverage Word's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**Microsoft - Word**
Affected versions:
- 16.83 for macOS (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1977](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1977)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-26369, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-26369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26369
- **State**: PUBLISHED
- **Published Date**: November 11, 2022 at 15:48 UTC
- **Last Updated**: February 05, 2025 at 20:47 UTC
- **Reserved Date**: April 05, 2022 at 15:11 UTC
- **Assigned By**: intel
### Vulnerability Description
Out-of-bounds read in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via adjacent access.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Affected Products
**n/a - Intel(R) XMM(TM) 7560 Modem software**
Affected versions:
- before version M2_7560_R_01.2146.00 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-6700, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-6700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6700
- **State**: PUBLISHED
- **Published Date**: February 05, 2024 at 21:21 UTC
- **Last Updated**: August 26, 2024 at 18:10 UTC
- **Reserved Date**: December 11, 2023 at 21:19 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Cookie Information | Free GDPR Consent Solution plugin for WordPress is vulnerable to arbitrary option updates due to a missing capability check on its AJAX request handler in versions up to, and including, 2.0.22. This makes it possible for authenticated attackers, with subscriber-level access or higher, to edit arbitrary site options which can be used to create administrator accounts.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**cookieinformation - Cookie Information | Free GDPR Consent Solution**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/42a4ef37-c842-4925-b06a-3e6423337567?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3028096/wp-gdpr-compliance/trunk?contextall=1&old=2865555&old_path=%2Fwp-gdpr-compliance%2Ftrunk)
### Credits
- Lucio Sá
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-25325, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-25325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25325
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 15:52 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 allows attackers to access sensitive user information via supplying a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23491, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23491
- **State**: PUBLISHED
- **Published Date**: December 07, 2022 at 21:15 UTC
- **Last Updated**: April 23, 2025 at 16:31 UTC
- **Reserved Date**: January 19, 2022 at 21:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**certifi - python-certifi**
Affected versions:
- < 2022.12.07 (Status: affected)
### References
1. [https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8](https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8)
2. [https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ](https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-2622, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-2622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2622
- **State**: PUBLISHED
- **Published Date**: July 16, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: March 24, 2014 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Intelligent Management Center (iMC) before 7.0 E02020P03 and Branch Intelligent Management System (BIMS) before 7.0 E0201P02 allows remote authenticated users to obtain sensitive information or modify data via unknown vectors, aka ZDI-CAN-2312.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [hp-imc-cve20142622-info-disc(94492)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94492)
2. [HPSBHF02913](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04369484)
3. [SSRT101552](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04369484)
4. [1030568](http://www.securitytracker.com/id/1030568)
5. [68547](http://www.securityfocus.com/bid/68547)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3660, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3660
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: November 12, 2024 at 16:04 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 107.0.5304.62 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html)
2. [](https://crbug.com/1327505)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-44955, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-44955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44955
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 19:27 UTC
- **Reserved Date**: November 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the Chat function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Messages field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://webtareas.com)
2. [](https://github.com/anhdq201/webtareas/issues/5)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-42129, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-42129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42129
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:13 UTC
- **Last Updated**: September 18, 2024 at 18:30 UTC
- **Reserved Date**: September 06, 2023 at 21:14 UTC
- **Assigned By**: zdi
### Vulnerability Description
A10 Thunder ADC ShowTechDownloadView Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.
The specific flaw exists within the ShowTechDownloadView class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account.
. Was ZDI-CAN-17899.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**A10 - Thunder ADC**
Affected versions:
- 5.2.1-p3, build 70 (Status: affected)
### References
1. [ZDI-23-1495](https://www.zerodayinitiative.com/advisories/ZDI-23-1495/)
2. [vendor-provided URL](https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21407, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21407
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 06:40 UTC
- **Last Updated**: October 17, 2024 at 15:44 UTC
- **Reserved Date**: November 04, 2022 at 18:30 UTC
- **Assigned By**: Axis
### Vulnerability Description
A broken access control was found allowing for privileged escalation of the operator account to gain
administrator privileges.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Axis Communications AB - AXIS License Plate Verifier**
Affected versions:
- 2.8.3 or earlier (Status: affected)
### References
1. [](https://www.axis.com/dam/public/0b/1c/96/cve-2023-2140712-en-US-409778.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-38377, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-38377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38377
- **State**: PUBLISHED
- **Published Date**: November 25, 2022 at 15:47 UTC
- **Last Updated**: October 22, 2024 at 20:52 UTC
- **Reserved Date**: August 16, 2022 at 14:17 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.0 through 6.0.12 may allow a remote and authenticated admin user assigned to a specific ADOM to access other ADOMs information such as device information and dashboard information.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:C`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Fortinet - FortiManager**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
**Fortinet - FortiAnalyzer**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-20-143](https://fortiguard.com/psirt/FG-IR-20-143)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0421, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0421
- **State**: PUBLISHED
- **Published Date**: March 18, 2010 at 17:12 UTC
- **Last Updated**: August 07, 2024 at 00:45 UTC
- **Reserved Date**: January 27, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2010:121](http://www.mandriva.com/security/advisories?name=MDVSA-2010:121)
2. [ADV-2010-1552](http://www.vupen.com/english/advisories/2010/1552)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=555831)
4. [oval:org.mitre.oval:def:9417](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9417)
5. [](http://ftp.gnome.org/pub/GNOME/sources/pango/1.27/pango-1.27.1.tar.bz2)
6. [39041](http://secunia.com/advisories/39041)
7. [DSA-2019](http://www.debian.org/security/2010/dsa-2019)
8. [RHSA-2010:0140](http://www.redhat.com/support/errata/RHSA-2010-0140.html)
9. [SUSE-SR:2010:013](http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html)
10. [ADV-2010-0661](http://www.vupen.com/english/advisories/2010/0661)
11. [SUSE-SR:2010:009](http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html)
12. [SUSE-SR:2010:012](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html)
13. [38760](http://www.securityfocus.com/bid/38760)
14. [ADV-2010-0627](http://www.vupen.com/english/advisories/2010/0627)
15. [1023711](http://securitytracker.com/id?1023711)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10444, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10444
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:43 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 820, SD 820A, and SD 835, SMMU Access Control Policy was updated to block HLOS from accessing BLSP and BAM resources.
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 820, SD 820A, SD 835 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6850, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6850
- **State**: PUBLISHED
- **Published Date**: December 28, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 10, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC VPLEX GeoSynchrony 5.4 SP1 before P3 and 5.5 before Patch 1 has a default password for the root account, which allows local users to gain privileges by leveraging a login session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/135041/EMC-VPLEX-Undocumented-Account.html)
2. [20151222 ESA-2015-174: EMC VPLEX Undocumented Account Vulnerability](http://seclists.org/bugtraq/2015/Dec/129)
3. [79664](http://www.securityfocus.com/bid/79664)
4. [1034526](http://www.securitytracker.com/id/1034526)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-36498, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-36498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36498
- **State**: PUBLISHED
- **Published Date**: October 22, 2021 at 19:19 UTC
- **Last Updated**: August 04, 2024 at 17:30 UTC
- **Reserved Date**: October 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Macrob7 Macs Framework Content Management System - 1.14f contains a cross-site scripting (XSS) vulnerability in the account reset function, which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the e-mail input field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vulnerability-lab.com/get_content.php?id=2206)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-45647, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-45647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45647
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 13:42 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeed parameter in the formSetClientState function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2972, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2972
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 15:28 UTC
- **Last Updated**: April 16, 2025 at 16:09 UTC
- **Reserved Date**: August 23, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**MZ Automation - libIEC61850**
Affected versions:
- All (Status: affected)
- Version 1.5 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-251-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3930, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3930
- **State**: PUBLISHED
- **Published Date**: April 03, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 31, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lg.pl in Cistron-LG 1.01 stores sensitive information under the web root with insufficient access controls, which allows remote attackers to obtain IP addresses and other unspecified router credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.s3.eurecom.fr/cve/CVE-2014-3930.txt)
2. [](https://hackerone.com/reports/16330)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2011, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2011
- **State**: PUBLISHED
- **Published Date**: June 20, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: June 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in paFAQ 1.0 Beta 4 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the id parameter in a Question action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050620 paFaq Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=111928841328681&w=2)
2. [](http://www.gulftech.org/?node=research&article_id=00083-06202005)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20476, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20476
- **State**: PUBLISHED
- **Published Date**: November 06, 2024 at 16:28 UTC
- **Last Updated**: November 06, 2024 at 17:07 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions.
This vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**Cisco - Cisco Identity Services Engine Software**
Affected versions:
- 3.0.0 (Status: affected)
- 3.0.0 p1 (Status: affected)
- 3.0.0 p2 (Status: affected)
- 3.0.0 p3 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 p4 (Status: affected)
- 3.1.0 p1 (Status: affected)
- 3.0.0 p5 (Status: affected)
- 3.1.0 p3 (Status: affected)
- 3.1.0 p2 (Status: affected)
- 3.0.0 p6 (Status: affected)
- 3.2.0 (Status: affected)
- 3.1.0 p4 (Status: affected)
- 2.7.0 p8 (Status: affected)
- 3.1.0 p5 (Status: affected)
- 3.2.0 p1 (Status: affected)
- 3.0.0 p7 (Status: affected)
- 3.1.0 p6 (Status: affected)
- 3.2.0 p2 (Status: affected)
- 3.1.0 p7 (Status: affected)
- 3.3.0 (Status: affected)
- 3.2.0 p3 (Status: affected)
- 3.0.0 p8 (Status: affected)
- 3.2.0 p4 (Status: affected)
- 3.1.0 p8 (Status: affected)
- 3.2.0 p5 (Status: affected)
- 3.2.0 p6 (Status: affected)
- 3.1.0 p9 (Status: affected)
- 3.3 Patch 2 (Status: affected)
- 3.3 Patch 1 (Status: affected)
- 3.3 Patch 3 (Status: affected)
### References
1. [cisco-sa-ise-multi-vulns-AF544ED5](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-42182, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-42182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42182
- **State**: PUBLISHED
- **Published Date**: July 31, 2023 at 00:00 UTC
- **Last Updated**: October 22, 2024 at 14:37 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Precisely Spectrum Spatial Analyst 20.01 is vulnerable to Directory Traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.precisely.com/docs/sftw/spectrum/release-notes/spectrum-2020-1-S56-release-notes.pdf)
2. [](https://zxsecurity.co.nz/research/advisories/precisely-spectrum-spatial-analyst-20-1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-20059, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-20059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20059
- **State**: PUBLISHED
- **Published Date**: June 20, 2022 at 04:50 UTC
- **Last Updated**: April 15, 2025 at 14:20 UTC
- **Reserved Date**: June 18, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**Elefant - CMS**
Affected versions:
- 1.3.12-RC (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Feb/36)
2. [](https://vuldb.com/?id.97256)
### Credits
- Tim Coen
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-2689, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-2689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2689
- **State**: PUBLISHED
- **Published Date**: October 06, 2007 at 20:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: October 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NewsPHP allows remote attackers to gain unauthorized administrative access by setting a cookie to the "autorized=admin; root=admin" value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [newsphp-gain-admin-access(15836)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15836)
2. [11346](http://secunia.com/advisories/11346)
3. [1009740](http://securitytracker.com/alerts/2004/Apr/1009740.html)
4. [20040415 Re: XSS, Admin Access via Cookie and File Upload vulnerability in NewsPHP.](http://archives.neohapsis.com/archives/bugtraq/2004-04/0161.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2284, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2284
- **State**: PUBLISHED
- **Published Date**: July 21, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 22:53 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 Bundle #17 allows remote authenticated users to affect confidentiality via unknown vectors related to ePerformance.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-38416, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-38416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38416
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 16:51 UTC
- **Last Updated**: February 03, 2025 at 17:42 UTC
- **Reserved Date**: June 16, 2024 at 00:50 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Information disclosure during audio playback.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- C-V2X 9150 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- MSM8996AU (Status: affected)
- QAM8295P (Status: affected)
- QCA6391 (Status: affected)
- QCA6426 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCC710 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN9074 (Status: affected)
- QCS410 (Status: affected)
- QCS610 (Status: affected)
- QCS8550 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QSM8250 (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SA8530P (Status: affected)
- SA8540P (Status: affected)
- SA9000P (Status: affected)
- SD865 5G (Status: affected)
- SDX55 (Status: affected)
- Snapdragon 820 Automotive Platform (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SXR2130 (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.