System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5282, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5282 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5282 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 04, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50518 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:32 UTC - **Last Updated**: November 19, 2024 at 21:05 UTC - **Reserved Date**: October 24, 2024 at 07:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Common Ninja Pricer Ninja allows Stored XSS.This issue affects Pricer Ninja: from n/a through 2.1.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Common Ninja - Pricer Ninja** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/pricer-ninja-pricing-tables/wordpress-pricer-ninja-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25073 - **State**: PUBLISHED - **Published Date**: January 24, 2022 at 08:01 UTC - **Last Updated**: August 03, 2024 at 19:56 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP125 WordPress plugin before 1.5.5 does not have CSRF checks in various action, for example when deleting an ad, allowing attackers to make a logged in admin delete them via a CSRF attack ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - WP125** Affected versions: - 1.5.5 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/922a2037-9b5e-4c94-83d9-99efc494e9e2) 2. [](https://plugins.trac.wordpress.org/changeset/2647594) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5017 - **State**: PUBLISHED - **Published Date**: September 27, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 19:32 UTC - **Reserved Date**: September 27, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in admin/all_users.php in Szava Gyula and Csaba Tamas e-Vision CMS, probably 1.0, allows remote attackers to execute arbitrary SQL commands via the from parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21969](http://secunia.com/advisories/21969) 2. [1642](http://securityreason.com/securityalert/1642) 3. [20060922 E-Vision CMS Multible Remote injections](http://www.securityfocus.com/archive/1/446706/100/0/threaded) 4. [20147](http://www.securityfocus.com/bid/20147) 5. [evisioncms-allusers-sql-injection(29123)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29123) 6. [ADV-2006-3764](http://www.vupen.com/english/advisories/2006/3764)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1538 - **State**: PUBLISHED - **Published Date**: March 21, 2024 at 03:32 UTC - **Last Updated**: August 05, 2024 at 20:10 UTC - **Reserved Date**: February 15, 2024 at 15:53 UTC - **Assigned By**: Wordfence ### Vulnerability Description The File Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.2.4. This is due to missing or incorrect nonce validation on the wp_file_manager page that includes files through the 'lang' parameter. This makes it possible for unauthenticated attackers to include local JavaScript files that can be leveraged to achieve RCE via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This issue was partially patched in version 7.2.4, and fully patched in 7.2.5. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **mndpsingh287 - File Manager** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/57cc15a6-2cf5-481f-bb81-ada48aa74009?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3051451/wp-file-manager) ### Credits - Daniel Holley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4129 - **State**: PUBLISHED - **Published Date**: July 02, 2019 at 15:05 UTC - **Last Updated**: September 16, 2024 at 22:20 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Spectrum Protect Operations Center 7.1 and 8.1 could allow a remote attacker to obtain sensitive information, caused by an error message containing a stack trace. By creating an error with a stack trace, an attacker could exploit this vulnerability to potentially obtain details on the Operations Center architecture. IBM X-Force ID: 158279. ### Affected Products **IBM - Spectrum Protect** Affected versions: - 7.1 (Status: affected) - 8.1 (Status: affected) ### References 1. [](http://www.ibm.com/support/docview.wss?uid=ibm10883236) 2. [ibm-tsm-cve20194129-info-disc (158279)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158279)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28818 - **State**: PUBLISHED - **Published Date**: May 12, 2022 at 18:59 UTC - **Last Updated**: September 16, 2024 at 17:54 UTC - **Reserved Date**: April 08, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description ColdFusion versions CF2021U3 (and earlier) and CF2018U13 are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - ColdFusion** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/coldfusion/apsb22-22.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0177, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0177 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0177 - **State**: PUBLISHED - **Published Date**: January 11, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:12 UTC - **Reserved Date**: January 10, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the AJAX module in MediaWiki before 1.6.9, 1.7 before 1.7.2, 1.8 before 1.8.3, and 1.9 before 1.9.0rc2, when wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-0096](http://www.vupen.com/english/advisories/2007/0096) 2. [](http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES) 3. [](http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES) 4. [24889](http://secunia.com/advisories/24889) 5. [mediawiki-ajax-unspecified-xss(31359)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31359) 6. [SUSE-SR:2007:006](http://www.novell.com/linux/security/advisories/2007_6_sr.html) 7. [](http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES) 8. [](http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES) 9. [31525](http://osvdb.org/31525) 10. [](http://sourceforge.net/forum/forum.php?forum_id=652721) 11. [21956](http://www.securityfocus.com/bid/21956) 12. [23647](http://secunia.com/advisories/23647)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49268 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:53 UTC - **Last Updated**: June 06, 2025 at 16:05 UTC - **Reserved Date**: June 04, 2025 at 09:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Soft8Soft LLC Verge3D allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Verge3D: from n/a through 4.9.4. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Soft8Soft LLC - Verge3D** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/verge3d/vulnerability/wordpress-verge3d-4-9-4-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4458 - **State**: PUBLISHED - **Published Date**: May 09, 2025 at 03:31 UTC - **Last Updated**: May 09, 2025 at 13:55 UTC - **Reserved Date**: May 08, 2025 at 19:02 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Patient Record Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edit_upatient.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **code-projects - Patient Record Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-308077 | code-projects Patient Record Management System edit_upatient.php sql injection](https://vuldb.com/?id.308077) 2. [VDB-308077 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308077) 3. [Submit #565463 | code-projects patient-record-management-system-in-php 0/1 sql injection](https://vuldb.com/?submit.565463) 4. [](https://github.com/ABC-YOLO/cve/blob/main/cve2.md) 5. [](https://code-projects.org/) ### Credits - DMTYOLO (VulDB User) - DMTYOLO (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1049 - **State**: PUBLISHED - **Published Date**: February 16, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 16:47 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted. ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Red Hat, Inc. - systemd** Affected versions: - prior to 234 (Status: affected) ### References 1. [1041520](http://www.securitytracker.com/id/1041520) 2. [[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html) 3. [RHSA-2018:0260](https://access.redhat.com/errata/RHSA-2018:0260) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1534701) 5. [USN-3558-1](https://usn.ubuntu.com/3558-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2955 - **State**: PUBLISHED - **Published Date**: August 24, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 06:07 UTC - **Reserved Date**: August 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome 1.0.154.48 and earlier allows remote attackers to cause a denial of service (CPU consumption and application hang) via JavaScript code with a long string value for the hash property (aka location.hash), a related issue to CVE-2008-5715. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://websecurity.com.ua/3424/) 2. [20090821 DoS vulnerabilities in Mozilla Firefox, Internet Explorer and Chrome](http://www.securityfocus.com/archive/1/506006/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20618 - **State**: PUBLISHED - **Published Date**: December 31, 2018 at 15:00 UTC - **Last Updated**: May 06, 2025 at 16:58 UTC - **Reserved Date**: December 31, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ok-file-formats through 2018-10-16 has a heap-based buffer over-read in the ok_mo_decode2 function in ok_mo.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/brackeen/ok-file-formats/issues/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-17453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-17453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-17453 - **State**: PUBLISHED - **Published Date**: April 05, 2021 at 00:00 UTC - **Last Updated**: August 04, 2024 at 13:53 UTC - **Reserved Date**: August 09, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://twitter.com/JacksonHHax/status/1374681422678519813) 2. [](https://github.com/JHHAX/CVE-2020-17453-PoC) 3. [](https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1132/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2829 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 27, 2024 at 19:06 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Management Services). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - WebLogic Server** Affected versions: - 10.3.6.0.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25418, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25418 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25418 - **State**: PUBLISHED - **Published Date**: February 11, 2024 at 00:00 UTC - **Last Updated**: May 15, 2025 at 19:38 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/delete_menu.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Carl0724/cms/blob/main/2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2512 - **State**: PUBLISHED - **Published Date**: June 21, 2012 at 15:00 UTC - **Last Updated**: August 06, 2024 at 23:00 UTC - **Reserved Date**: June 15, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2011:0919](http://rhn.redhat.com/errata/RHSA-2011-0919.html) 2. [45170](http://secunia.com/advisories/45170) 3. [[oss-security] 20110628 CVE request: qemu-kvm: OOB memory access caused by negative vq notifies](http://www.openwall.com/lists/oss-security/2011/06/28/13) 4. [44648](http://secunia.com/advisories/44648) 5. [[oss-security] 20110629 Re: CVE request: qemu-kvm: OOB memory access caused by negative vq notifies](http://www.openwall.com/lists/oss-security/2011/06/29/15) 6. [45301](http://secunia.com/advisories/45301) 7. [45158](http://secunia.com/advisories/45158) 8. [openSUSE-SU-2011:0803](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00007.html) 9. [74751](http://www.osvdb.org/74751) 10. [44458](http://secunia.com/advisories/44458) 11. [USN-1165-1](http://ubuntu.com/usn/usn-1165-1) 12. [DSA-2270](https://www.debian.org/security/2011/dsa-2270) 13. [SUSE-SU-2011:0806](https://hermes.opensuse.org/messages/9605323) 14. [](http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=7157e2e23e89adcd436caeab31fdd6b47eded377)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39490 - **State**: PUBLISHED - **Published Date**: May 23, 2025 at 12:43 UTC - **Last Updated**: May 23, 2025 at 13:24 UTC - **Reserved Date**: April 16, 2025 at 06:23 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Backpack Traveler allows PHP Local File Inclusion. This issue affects Backpack Traveler: from n/a through 2.7. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **Mikado-Themes - Backpack Traveler** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/theme/backpacktraveler/vulnerability/wordpress-backpack-traveler-2-7-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - Bonds (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4963, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4963 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4963 - **State**: PUBLISHED - **Published Date**: July 15, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 11:34 UTC - **Reserved Date**: July 15, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Shopizer 1.1.5 and earlier allows remote attackers to modify the account settings of arbitrary users via the customer.customerId parameter to shop/profile/register.action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140710 SEC Consult SA-20140710-0 :: Multiple critical vulnerabilities in Shopizer webshop](http://www.securityfocus.com/archive/1/532726/100/0/threaded) 2. [20140710 SEC Consult SA-20140710-0 :: Multiple critical vulnerabilities in Shopizer webshop](http://seclists.org/fulldisclosure/2014/Jul/38)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58128 - **State**: PUBLISHED - **Published Date**: March 28, 2025 at 00:00 UTC - **Last Updated**: March 31, 2025 at 16:44 UTC - **Reserved Date**: March 28, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In MISP before 2.4.193, menu_custom_right_link parameters can be set via the UI (i.e., without using the CLI) and thus attackers with admin privileges can conduct XSS attacks via a global menu link. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **MISP - MISP** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/MISP/MISP/commit/33a1eb66408e16a7535b2bae48303efd9501a26a) 2. [](https://github.com/MISP/MISP/releases/tag/v2.4.193)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0841 - **State**: PUBLISHED - **Published Date**: February 15, 2023 at 13:33 UTC - **Last Updated**: February 13, 2025 at 16:39 UTC - **Reserved Date**: February 15, 2023 at 13:33 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **n/a - GPAC** Affected versions: - 2.3-DEV-rev40-g3602a5ded (Status: affected) ### References 1. [](https://vuldb.com/?id.221087) 2. [](https://vuldb.com/?ctiid.221087) 3. [](https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3) 4. [](https://github.com/advisories/GHSA-w52x-cp47-xhhw) 5. [](https://github.com/gpac/gpac/releases/tag/v2.2.1) 6. [](https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4) 7. [](https://github.com/gpac/gpac/issues/2396) ### Credits - qianshuidewajueji (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1803 - **State**: PUBLISHED - **Published Date**: March 20, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 04:54 UTC - **Reserved Date**: February 17, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) 2. [GLSA-201507-21](https://security.gentoo.org/glsa/201507-21) 3. [SUSE-SU-2015:0674](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html) 4. [USN-2536-1](http://www.ubuntu.com/usn/USN-2536-1) 5. [FEDORA-2015-4230](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152838.html) 6. [RHSA-2015:1708](http://rhn.redhat.com/errata/RHSA-2015-1708.html) 7. [openSUSE-SU-2015:0614](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html) 8. [1031935](http://www.securitytracker.com/id/1031935) 9. [FEDORA-2015-4199](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152497.html) 10. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html) 11. [DSA-3194](http://www.debian.org/security/2015/dsa-3194) 12. [MDVSA-2015:145](http://www.mandriva.com/security/advisories?name=MDVSA-2015:145) 13. [](http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/) 14. [](http://advisories.mageia.org/MGASA-2015-0113.html) 15. [SUSE-SU-2015:0702](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html) 16. [73280](http://www.securityfocus.com/bid/73280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9479 - **State**: PUBLISHED - **Published Date**: November 20, 2024 at 17:37 UTC - **Last Updated**: November 20, 2024 at 18:26 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed.  User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 7 (Status: affected) - 8 (Status: affected) - 8.1 (Status: affected) - 9 (Status: affected) - nyc-mr1-dev (Status: affected) - nyc-mr2-dev (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-09-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9108 - **State**: PUBLISHED - **Published Date**: October 01, 2024 at 07:30 UTC - **Last Updated**: October 01, 2024 at 16:11 UTC - **Reserved Date**: September 23, 2024 at 17:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Wechat Social login plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'convert_remoteimage_to_local' function in versions up to, and including, 1.3.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **xunhuweb - Wechat Social login 微信QQ钉钉登录插件** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/06881386-3c92-426b-948d-58e8a8bee624?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wechat-social-login/trunk/includes/social/class-xh-social-wp-api.php?rev=2111074#L39) ### Credits - István Márton
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41990 - **State**: PUBLISHED - **Published Date**: September 11, 2023 at 23:29 UTC - **Last Updated**: February 03, 2025 at 13:59 UTC - **Reserved Date**: September 06, 2023 at 17:40 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213606) 2. [](https://support.apple.com/en-us/HT213601) 3. [](https://support.apple.com/en-us/HT213842) 4. [](https://support.apple.com/en-us/HT213845) 5. [](https://support.apple.com/en-us/HT213605) 6. [](https://support.apple.com/en-us/HT213844) 7. [](https://support.apple.com/en-us/HT213599)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2787 - **State**: PUBLISHED - **Published Date**: September 02, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:45 UTC - **Reserved Date**: September 02, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description comment_delete_cgi.php in Simple PHP Blog allows remote attackers to delete arbitrary files via the comment parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [16616](http://secunia.com/advisories/16616/) 2. [simple-php-commentdeletecgi-file-deletion(22096)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22096) 3. [14681](http://www.securityfocus.com/bid/14681) 4. [20050829 SimplePHPBlog Arbitrary File Deletion and Sample Exploit](http://marc.info/?l=bugtraq&m=112534658510762&w=2) 5. [](http://www.ftusecurity.com/pub/sphpblog_vulns)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11844 - **State**: PUBLISHED - **Published Date**: December 03, 2024 at 08:32 UTC - **Last Updated**: December 03, 2024 at 11:23 UTC - **Reserved Date**: November 26, 2024 at 20:11 UTC - **Assigned By**: Wordfence ### Vulnerability Description The IdeaPush plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the idea_push_taxonomy_save_routine function in all versions up to, and including, 8.71. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete terms for the "boards" taxonomy. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **northernbeacheswebsites - IdeaPush** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/34603c3f-834f-4a2a-9b9f-5213155d4317?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/ideapush/trunk/ideapush.php#L766) 3. [](https://plugins.trac.wordpress.org/changeset/3198488/ideapush/trunk/ideapush.php) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26454 - **State**: PUBLISHED - **Published Date**: November 02, 2023 at 13:01 UTC - **Last Updated**: August 02, 2024 at 11:53 UTC - **Reserved Date**: February 22, 2023 at 20:42 UTC - **Assigned By**: OX ### Vulnerability Description Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **OX Software GmbH - OX App Suite** Affected versions: - 0 (Status: affected) - 0 (Status: affected) ### References 1. [](https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6243_7.10.6_2023-08-01.pdf) 2. [](https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0004.json)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13879 - **State**: PUBLISHED - **Published Date**: February 17, 2025 at 15:21 UTC - **Last Updated**: February 18, 2025 at 19:29 UTC - **Reserved Date**: February 14, 2025 at 18:41 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Stream plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.2 due to insufficient validation on the webhook feature. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **xwp - Stream** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8680ad0a-7513-408d-a62d-ffb0b0e7addb?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3226637%40stream&new=3226637%40stream&sfp_email=&sfph_mail=) 3. [](https://github.com/xwp/stream/blob/develop/changelog.md#410---january-15-2025) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24469 - **State**: PUBLISHED - **Published Date**: June 13, 2023 at 00:00 UTC - **Last Updated**: January 03, 2025 at 18:07 UTC - **Reserved Date**: January 23, 2023 at 00:00 UTC - **Assigned By**: OpenText ### Vulnerability Description Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0 ### Affected Products **n/a - ArcSight Logger** Affected versions: - versions prior to 7.3.0 (Status: affected) ### References 1. [](https://www.microfocus.com/support/downloads/) 2. [](https://www.microfocus.com/documentation/arcsight/logger-7.3/logger-7.3-release-notes/) 3. [](https://portal.microfocus.com/s/article/KM000018224?language=en_US%2C)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0122 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:10 UTC - **Reserved Date**: February 03, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Microsoft MSN Messenger 6.0 and 6.1 does not properly handle certain requests, which allows remote attackers to read arbitrary files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9828](http://www.securityfocus.com/bid/9828) 2. [MS04-010](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-010) 3. [VU#688094](http://www.kb.cert.org/vuls/id/688094) 4. [msn-ms04010-patch(15427)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15427) 5. [oval:org.mitre.oval:def:844](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A844) 6. [msn-request-view-files(15415)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15415)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21391 - **State**: PUBLISHED - **Published Date**: October 30, 2023 at 17:01 UTC - **Last Updated**: September 06, 2024 at 18:40 UTC - **Reserved Date**: November 03, 2022 at 22:37 UTC - **Assigned By**: google_android ### Vulnerability Description In Messaging, there is a possible way to disable the messaging application due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 14 (Status: affected) ### References 1. [](https://source.android.com/docs/security/bulletin/android-14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27425 - **State**: REJECTED - **Published Date**: May 17, 2024 at 12:01 UTC - **Last Updated**: May 25, 2024 at 13:26 UTC - **Reserved Date**: February 25, 2024 at 13:47 UTC - **Assigned By**: Linux ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40629 - **State**: PUBLISHED - **Published Date**: September 23, 2022 at 18:00 UTC - **Last Updated**: May 22, 2025 at 18:16 UTC - **Reserved Date**: September 13, 2022 at 00:00 UTC - **Assigned By**: CERT-In ### Vulnerability Description This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to insecure design in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to view sensitive information on the targeted device. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Tacitine - Firewall** Affected versions: - 19.1.1 (Status: affected) - 19.1.1 (Status: affected) ### References 1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363) 2. [](https://tacitine.com/newdownload/CVE-2022-40629.pdf) ### Credits - This vulnerability is reported by Sreedev Kumar from Crowe India
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18635 - **State**: PUBLISHED - **Published Date**: October 30, 2019 at 21:58 UTC - **Last Updated**: August 05, 2024 at 01:54 UTC - **Reserved Date**: October 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Mooltipass Moolticute through v0.42.1 and v0.42.x-testing through v0.42.5-testing. There is a NULL pointer dereference in MPDevice_win.cpp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://securiteam.io/2019/10/27/a-null-pointer-dereference/) 2. [](https://github.com/mooltipass/moolticute/pull/483)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8374, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8374 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8374 - **State**: PUBLISHED - **Published Date**: February 13, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: September 28, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all versions, Magelis GTU Universal Panel, all versions, Magelis STO5xx and STU Small panels, all versions, Magelis XBT GH Advanced Hand-held Panels, all versions, Magelis XBT GK Advanced Touchscreen Panels with Keyboard, all versions, Magelis XBT GT Advanced Touchscreen Panels, all versions, and Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). An attacker may be able to disrupt a targeted web server, resulting in a denial of service because of UNCONTROLLED RESOURCE CONSUMPTION. ### Affected Products **n/a - Schneider Electric Magelis HMI** Affected versions: - Schneider Electric Magelis HMI (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-308-02) 2. [94093](http://www.securityfocus.com/bid/94093)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9336 - **State**: PUBLISHED - **Published Date**: February 22, 2020 at 21:38 UTC - **Last Updated**: August 04, 2024 at 10:26 UTC - **Reserved Date**: February 22, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description fauzantrif eLection 2.0 has XSS via the Admin Dashboard -> Settings -> Election -> "message if election is closed" field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/0xEmma/CVEs/blob/master/CVEs/eLection-2.0-XSS.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31460, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31460 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31460 - **State**: PUBLISHED - **Published Date**: May 07, 2021 at 20:16 UTC - **Last Updated**: August 03, 2024 at 23:03 UTC - **Reserved Date**: April 16, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13096. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - Reader** Affected versions: - 10.1.1.37576 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-549/) ### Credits - Yongil Lee(@intellee) and Wonyoung Jung(@nonetype) of Diffense
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23307 - **State**: PUBLISHED - **Published Date**: January 18, 2022 at 15:25 UTC - **Last Updated**: August 03, 2024 at 03:36 UTC - **Reserved Date**: January 17, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Apache Software Foundation - Apache Log4j 1.x** Affected versions: - 1.2.1 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://logging.apache.org/log4j/1.2/index.html) 2. [](https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh) 3. [](https://www.oracle.com/security-alerts/cpuapr2022.html) 4. [](https://www.oracle.com/security-alerts/cpujul2022.html) ### Credits - @kingkk
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6096 - **State**: PUBLISHED - **Published Date**: April 26, 2024 at 07:16 UTC - **Last Updated**: August 02, 2024 at 08:21 UTC - **Reserved Date**: November 13, 2023 at 09:07 UTC - **Assigned By**: Hanwha_Vision ### Vulnerability Description Vladimir Kononovich, a Security Researcher has found a flaw that using a inappropriate encryption logic on the DVR. firmware encryption is broken and allows to decrypt. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-668: Security Weakness ### Affected Products **Hanwha Vision Co., Ltd. - HRX-1620** Affected versions: - 3.05.62 and prior versions (Status: affected) ### References 1. [](https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6095-6096.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-42977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-42977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-42977 - **State**: PUBLISHED - **Published Date**: June 10, 2025 at 00:10 UTC - **Last Updated**: June 10, 2025 at 15:26 UTC - **Reserved Date**: April 16, 2025 at 13:25 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver Visual Composer contains a Directory Traversal vulnerability caused by insufficient validation of input paths provided by a high-privileged user. This allows an attacker to read or modify arbitrary files, resulting in a high impact on confidentiality and a low impact on integrity. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **SAP_SE - SAP NetWeaver Visual Composer** Affected versions: - VCBASE 7.50 (Status: affected) ### References 1. [](https://me.sap.com/notes/3610591) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19927 - **State**: PUBLISHED - **Published Date**: December 31, 2019 at 02:00 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39) 2. [](https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927) 3. [](https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4) 4. [](https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428) 5. [](https://security.netapp.com/advisory/ntap-20200204-0002/) 6. [openSUSE-SU-2020:0336](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12344 - **State**: PUBLISHED - **Published Date**: November 30, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 18:36 UTC - **Reserved Date**: August 03, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) Software could allow a remote attacker to inject arbitrary values into DCNM configuration parameters, redirect a user to a malicious website, inject malicious content into a DCNM client interface, or conduct a cross-site scripting (XSS) attack against a user of the affected software. Cisco Bug IDs: CSCvf40477, CSCvf63150, CSCvf68218, CSCvf68235, CSCvf68247. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Cisco Data Center Network Manager Software** Affected versions: - Cisco Data Center Network Manager Software (Status: affected) ### References 1. [101996](http://www.securityfocus.com/bid/101996) 2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47147 - **State**: PUBLISHED - **Published Date**: March 15, 2024 at 15:09 UTC - **Last Updated**: August 02, 2024 at 21:01 UTC - **Reserved Date**: October 31, 2023 at 00:13 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling Secure Proxy 6.0.3 and 6.1.0 could allow an attacker to overwrite a log message under specific conditions. IBM X-Force ID: 270598. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-73: Security Weakness ### Affected Products **IBM - Secure Proxy** Affected versions: - 6.0.3, 6.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7142038) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/270598)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34398 - **State**: PUBLISHED - **Published Date**: August 13, 2021 at 15:42 UTC - **Last Updated**: August 04, 2024 at 00:12 UTC - **Reserved Date**: June 09, 2021 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA DCGM, all versions prior to 2.2.9, contains a vulnerability in the DIAG module where any user can inject shared libraries into the DCGM server, which is usually running as root, which may lead to privilege escalation, total loss of confidentiality and integrity, and complete denial of service. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **NVIDIA - NVIDIA Data Center GPU Manager (DCGM)** Affected versions: - DCGM versions prior to 2.2.9 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5219)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28310 - **State**: REJECTED - **Published Date**: January 22, 2021 at 19:44 UTC - **Last Updated**: January 22, 2021 at 19:44 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: Mend ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4633, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4633 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4633 - **State**: PUBLISHED - **Published Date**: December 21, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 01:48 UTC - **Reserved Date**: December 21, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Auto Upload Images up to 3.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file src/setting-page.php of the component Settings Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 895770ee93887ec78429c78ffdfb865bee6f9436. It is recommended to upgrade the affected component. VDB-216482 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **n/a - Auto Upload Images** Affected versions: - 3.0 (Status: affected) - 3.1 (Status: affected) - 3.2 (Status: affected) - 3.3 (Status: affected) ### References 1. [](https://vuldb.com/?id.216482) 2. [](https://github.com/airani/wp-auto-upload/commit/895770ee93887ec78429c78ffdfb865bee6f9436) 3. [](https://github.com/airani/wp-auto-upload/releases/tag/v3.3.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43906 - **State**: PUBLISHED - **Published Date**: October 04, 2023 at 13:50 UTC - **Last Updated**: September 19, 2024 at 14:48 UTC - **Reserved Date**: October 26, 2022 at 15:46 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Guardium 11.5 could disclose sensitive information due to a missing or insecure SameSite attribute for a sensitive cookie. IBM X-Force ID: 240897. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N` ### Affected Products **IBM - Security Guardium** Affected versions: - 11.5 (Status: affected) ### References 1. [](https://https://www.ibm.com/support/pages/node/7038019) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/240897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0711 - **State**: PUBLISHED - **Published Date**: April 29, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The hamgr service in the IPv6 Proxy Mobile (PM) implementation in Cisco StarOS 18.1.0.59776 on ASR 5000 devices allows remote attackers to cause a denial of service (service reload and call-processing outage) via malformed PM packets, aka Bug ID CSCut94711. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032213](http://www.securitytracker.com/id/1032213) 2. [20150428 Cisco StarOS for Cisco ASR 5000 Series HAMGR Service Proxy Mobile IPv6 Processing Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=38557)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1753, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1753 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1753 - **State**: PUBLISHED - **Published Date**: March 31, 2023 at 00:00 UTC - **Last Updated**: February 11, 2025 at 19:01 UTC - **Reserved Date**: March 31, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-521: Security Weakness ### Affected Products **thorsten - thorsten/phpmyfaq** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b) 2. [](https://github.com/thorsten/phpmyfaq/commit/f612a72494080e04947da7028340fee4493fe8a5) ### Credits - Ahmed Hassan (ahmedvienna) - Josef Hassan (josefjku)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22376 - **State**: PUBLISHED - **Published Date**: January 03, 2025 at 00:00 UTC - **Last Updated**: January 21, 2025 at 17:49 UTC - **Reserved Date**: January 03, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong. ### Weakness Classification (CWE) - CWE-338: Security Weakness ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://metacpan.org/release/RRWO/Net-OAuth-0.29/changes) 2. [](https://metacpan.org/release/KGRENNAN/Net-OAuth-0.28/source/lib/Net/OAuth/Client.pm#L260)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5671, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5671 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5671 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 11:48 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Super Stickman Golf (aka com.noodlecake.ssg) application 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#591297](http://www.kb.cert.org/vuls/id/591297) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10379 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 16:46 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-4002](http://www.debian.org/security/2017/dsa-4002) 2. [](https://security.netapp.com/advisory/ntap-20171019-0002/) 3. [RHSA-2017:3265](https://access.redhat.com/errata/RHSA-2017:3265) 4. [RHSA-2018:2729](https://access.redhat.com/errata/RHSA-2018:2729) 5. [RHSA-2018:0574](https://access.redhat.com/errata/RHSA-2018:0574) 6. [1039597](http://www.securitytracker.com/id/1039597) 7. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 8. [RHSA-2018:0279](https://access.redhat.com/errata/RHSA-2018:0279) 9. [RHSA-2018:2439](https://access.redhat.com/errata/RHSA-2018:2439) 10. [RHSA-2017:3442](https://access.redhat.com/errata/RHSA-2017:3442) 11. [101415](http://www.securityfocus.com/bid/101415)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10756, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10756 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10756 - **State**: PUBLISHED - **Published Date**: November 04, 2024 at 03:00 UTC - **Last Updated**: November 04, 2024 at 17:04 UTC - **Reserved Date**: November 03, 2024 at 07:06 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in PHPGurukul Online Shopping Portal 2.0. Affected by this vulnerability is an unknown functionality of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/html_table.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PHPGurukul - Online Shopping Portal** Affected versions: - 2.0 (Status: affected) ### References 1. [VDB-282925 | PHPGurukul Online Shopping Portal html_table.php cross site scripting](https://vuldb.com/?id.282925) 2. [VDB-282925 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282925) 3. [Submit #436381 | PHPGurukul Online Shopping Portal 2.0 Improper Neutralization of Alternate XSS Syntax](https://vuldb.com/?submit.436381) 4. [](https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(html_table.php).md) 5. [](https://phpgurukul.com/) ### Credits - secuserx (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3895 - **State**: PUBLISHED - **Published Date**: November 29, 2005 at 21:00 UTC - **Last Updated**: August 07, 2024 at 23:24 UTC - **Reserved Date**: November 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open Ticket Request System (OTRS) 1.0.0 through 1.3.2 and 2.0.0 through 2.0.3, when AttachmentDownloadType is set to inline, renders text/html e-mail attachments as HTML in the browser when the queue moderator attempts to download the attachment, which allows remote attackers to execute arbitrary web script or HTML. NOTE: this particular issue is referred to as XSS by some sources. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18887](http://secunia.com/advisories/18887) 2. [20051122 OTRS 1.x/2.x Multiple Security Issues](http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/039001.html) 3. [](http://moritz-naumann.com/adv/0007/otrsmulti/0007.txt) 4. [otrs-email-attachment-xss(23355)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23355) 5. [21066](http://www.osvdb.org/21066) 6. [200](http://securityreason.com/securityalert/200) 7. [](http://otrs.org/advisory/OSA-2005-01-en/) 8. [20051122 OTRS 1.x/2.x Multiple Security Issues](http://marc.info/?l=bugtraq&m=113272360804853&w=2) 9. [ADV-2005-2535](http://www.vupen.com/english/advisories/2005/2535) 10. [DSA-973](http://www.debian.org/security/2006/dsa-973) 11. [18101](http://secunia.com/advisories/18101) 12. [SUSE-SR:2005:030](http://www.novell.com/linux/security/advisories/2005_30_sr.html) 13. [17685](http://secunia.com/advisories/17685/) 14. [15537](http://www.securityfocus.com/bid/15537/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40682 - **State**: PUBLISHED - **Published Date**: October 13, 2023 at 15:41 UTC - **Last Updated**: September 16, 2024 at 20:35 UTC - **Reserved Date**: August 18, 2023 at 15:48 UTC - **Assigned By**: ibm ### Vulnerability Description IBM App Connect Enterprise 12.0.1.0 through 12.0.8.0 contains an unspecified vulnerability that could allow a local privileged user to obtain sensitive information from API logs. IBM X-Force ID: 263833. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **IBM - App Connect Enterprise** Affected versions: - 12.0.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7051204) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/263833)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0584, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0584 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0584 - **State**: PUBLISHED - **Published Date**: July 27, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:30 UTC - **Reserved Date**: July 27, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [mdaemon-imap-command-dos(6279)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6279) 2. [20010325 MDaemon IMAP Denial Of Service](http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html) 3. [2508](http://www.securityfocus.com/bid/2508)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0189 - **State**: PUBLISHED - **Published Date**: May 02, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 09:05 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [67089](http://www.securityfocus.com/bid/67089) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1088732) 3. [[oss-security] 20140428 CVE-2014-0189: /etc/sysconfig/virt-who is world-readable (contains unencrypted passwords)](http://www.openwall.com/lists/oss-security/2014/04/28/2) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1081286) 5. [RHSA-2015:0430](http://rhn.redhat.com/errata/RHSA-2015-0430.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15481 - **State**: REJECTED - **Published Date**: January 23, 2018 at 17:00 UTC - **Last Updated**: January 23, 2018 at 16:57 UTC - **Reserved Date**: October 17, 2017 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19826 - **State**: PUBLISHED - **Published Date**: December 03, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 11:44 UTC - **Reserved Date**: December 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In inspect.cpp in LibSass 3.5.5, a high memory footprint caused by an endless loop (containing a Sass::Inspect::operator()(Sass::String_Quoted*) stack frame) may cause a Denial of Service via crafted sass input files with stray '&' or '/' characters. NOTE: Upstream comments indicate this issue is closed as "won't fix" and "works as intended" by design ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/sass/libsass/issues/2781)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2220 - **State**: PUBLISHED - **Published Date**: August 11, 2010 at 18:00 UTC - **Last Updated**: September 16, 2024 at 21:04 UTC - **Reserved Date**: June 08, 2010 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to an "input validation issue." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.adobe.com/support/security/bulletins/apsb10-19.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28211, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28211 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28211 - **State**: PUBLISHED - **Published Date**: June 11, 2021 at 15:11 UTC - **Last Updated**: August 03, 2024 at 21:40 UTC - **Reserved Date**: March 12, 2021 at 00:00 UTC - **Assigned By**: TianoCore ### Vulnerability Description A heap overflow in LzmaUefiDecompressGetInfo function in EDK II. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **TianoCore - EDK II** Affected versions: - edk2-stable202008 (Status: affected) ### References 1. [](https://bugzilla.tianocore.org/show_bug.cgi?id=1816)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58082 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 16:13 UTC - **Last Updated**: May 04, 2025 at 10:09 UTC - **Reserved Date**: March 06, 2025 at 15:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: media: nuvoton: Fix an error check in npcm_video_ece_init() When function of_find_device_by_node() fails, it returns NULL instead of an error code. So the corresponding error check logic should be modified to check whether the return value is NULL and set the error code to be returned as -ENODEV. ### Affected Products **Linux - Linux** Affected versions: - 46c15a4ff1f4fe078c5b250fb2570020211eab38 (Status: affected) - 46c15a4ff1f4fe078c5b250fb2570020211eab38 (Status: affected) - 46c15a4ff1f4fe078c5b250fb2570020211eab38 (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 6.12.14 (Status: unaffected) - 6.13.3 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/bdd823b9d068284e1d998b962cfef29236365df3) 2. [](https://git.kernel.org/stable/c/c36b830754ae1dd1db41c27f57b29267878f9702) 3. [](https://git.kernel.org/stable/c/c4b7779abc6633677e6edb79e2809f4f61fde157)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3994 - **State**: PUBLISHED - **Published Date**: May 29, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: May 15, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The grant.xsfunc application in testApps/grantAccess/ in the XS Engine in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to spoof log entries via a crafted request, aka SAP Security Note 2109818. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability](http://www.securityfocus.com/archive/1/535618/100/0/threaded) 2. [](http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services) 3. [74859](http://www.securityfocus.com/bid/74859) 4. [](http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html) 5. [20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability](http://seclists.org/fulldisclosure/2015/May/118)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0485 - **State**: PUBLISHED - **Published Date**: January 14, 2011 at 16:00 UTC - **Last Updated**: August 06, 2024 at 21:51 UTC - **Reserved Date**: January 14, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle speech data, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "stale pointer." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [70468](http://osvdb.org/70468) 2. [](http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html) 3. [45788](http://www.securityfocus.com/bid/45788) 4. [](http://www.srware.net/forum/viewtopic.php?f=18&t=2054) 5. [oval:org.mitre.oval:def:14381](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14381) 6. [](http://code.google.com/p/chromium/issues/detail?id=68666) 7. [42951](http://secunia.com/advisories/42951) 8. [chrome-speech-code-exec(64676)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64676)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0088 - **State**: PUBLISHED - **Published Date**: January 29, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:10 UTC - **Reserved Date**: January 20, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The System Configuration subsystem in Mac OS 10.2.8 allows local users to modify network settings, a different vulnerability than CVE-2004-0087. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2004-01-26](http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html) 2. [9504](http://www.securityfocus.com/bid/9504) 3. [6820](http://www.osvdb.org/6820)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0610 - **State**: PUBLISHED - **Published Date**: April 13, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:21 UTC - **Reserved Date**: March 01, 2005 at 00:00 UTC - **Assigned By**: freebsd ### Vulnerability Description Multiple symlink vulnerabilities in portupgrade before 20041226_2 in FreeBSD allow local users to (1) overwrite arbitrary files and possibly replace packages to execute arbitrary code via pkg_fetch, (2) overwrite arbitrary files via temporary files when portupgrade upgrades a port or package, or (3) create arbitrary zero-byte files via the pkgdb.fixme temporary file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14903](http://secunia.com/advisories/14903) 2. [13106](http://www.securityfocus.com/bid/13106) 3. [](http://www.vuxml.org/freebsd/22f00553-a09d-11d9-a788-0001020eed82.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22277, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22277 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22277 - **State**: PUBLISHED - **Published Date**: July 04, 2024 at 13:21 UTC - **Last Updated**: March 13, 2025 at 16:31 UTC - **Reserved Date**: January 08, 2024 at 18:43 UTC - **Assigned By**: vmware ### Vulnerability Description VMware Cloud Director Availability contains an HTML injection vulnerability. A malicious actor with network access to VMware Cloud Director Availability can craft malicious HTML tags to execute within replication tasks. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **N/A - VMware Cloud Director Availability** Affected versions: - VMware Cloud Director Availability 4.x (Status: affected) ### References 1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24557)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8446, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8446 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8446 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 16:34 UTC - **Reserved Date**: May 02, 2017 at 00:00 UTC - **Assigned By**: elastic ### Vulnerability Description The Reporting feature in X-Pack in versions prior to 5.5.2 and standalone Reporting plugin versions versions prior to 2.4.6 had an impersonation vulnerability. A user with the reporting_user role could execute a report with the permissions of another reporting user, possibly gaining access to sensitive data. ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **Elastic - Elastic X-Pack Reporting** Affected versions: - Before 5.5.2 and 2.4.6 (Status: affected) ### References 1. [](https://www.elastic.co/community/security)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41891, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41891 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41891 - **State**: PUBLISHED - **Published Date**: November 18, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 16:05 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **tensorflow - tensorflow** Affected versions: - >= 2.10.0, < 2.10.1 (Status: affected) - >= 2.9.0, < 2.9.3 (Status: affected) - < 2.8.4 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-66vq-54fq-6jvv) 2. [](https://github.com/tensorflow/tensorflow/commit/fc33f3dc4c14051a83eec6535b608abe1d355fde) 3. [](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.h)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2686 - **State**: PUBLISHED - **Published Date**: May 02, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 23, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description net/socket.c in the Linux kernel 3.19 before 3.19.3 does not validate certain range data for (1) sendto and (2) recvfrom system calls, which allows local users to gain privileges by leveraging a subsystem that uses the copy_from_iter function in the iov_iter interface, as demonstrated by the Bluetooth subsystem. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://grsecurity.net/~spender/viro.txt) 2. [73286](http://www.securityfocus.com/bid/73286) 3. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4de930efc23b92ddf88ce91c405ee645fe6e27ea) 4. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3) 5. [](http://twitter.com/grsecurity/statuses/579050211605102592) 6. [](http://twitter.com/grsecurity/statuses/579060953477701632) 7. [](http://twitter.com/grsecurity/statuses/579075689439059968) 8. [[oss-security] 20150323 CVE Request: Linux kernel: sys_sendto/sys_recvfrom does not validate the user provided ubuf pointer](http://www.openwall.com/lists/oss-security/2015/03/23/14) 9. [](https://github.com/torvalds/linux/commit/4de930efc23b92ddf88ce91c405ee645fe6e27ea) 10. [](https://bugzilla.redhat.com/show_bug.cgi?id=1205242)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26555 - **State**: PUBLISHED - **Published Date**: March 20, 2022 at 18:35 UTC - **Last Updated**: August 03, 2024 at 05:03 UTC - **Reserved Date**: March 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability in the Add a Button function of Eova v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the button name text box. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/eova/eova/issues/I4VRE9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17516 - **State**: PUBLISHED - **Published Date**: December 14, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 20:51 UTC - **Reserved Date**: December 11, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description scripts/inspect_webbrowser.py in Reddit Terminal Viewer (RTV) 1.19.0 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2017-17516)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25519 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 00:00 UTC - **Last Updated**: February 26, 2025 at 14:58 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Seacms <=13.3 is vulnerable to SQL Injection in admin_zyk.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-8.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39591, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39591 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39591 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 05:00 UTC - **Last Updated**: August 13, 2024 at 13:53 UTC - **Reserved Date**: June 26, 2024 at 09:58 UTC - **Assigned By**: sap ### Vulnerability Description SAP Document Builder does not perform necessary authorization checks for one of the function modules resulting in escalation of privileges causing low impact on confidentiality of the application. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **SAP_SE - SAP Document Builder** Affected versions: - S4FND 102 (Status: affected) - S4FND 103 (Status: affected) - S4FND 104 (Status: affected) - S4FND 105 (Status: affected) - S4FND 106 (Status: affected) - S4FND 107 (Status: affected) - S4FND 108 (Status: affected) - SAP_BS_FND 702 (Status: affected) - SAP_BS_FND 731 (Status: affected) - SAP_BS_FND 746 (Status: affected) - SAP_BS_FND 747 (Status: affected) - SAP_BS_FND 748 (Status: affected) ### References 1. [](https://me.sap.com/notes/3477423) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1902, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1902 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1902 - **State**: PUBLISHED - **Published Date**: June 08, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:06 UTC - **Reserved Date**: June 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to read other users' mail and perform operations on arbitrary directories via .. sequences in the (1) SELECT, (2) CREATE, (3) DELETE, and (4) RENAME commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1014095](http://securitytracker.com/id?1014095) 2. [spa-pro-imap-diectory-traversal(20860)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20860) 3. [ADV-2005-0680](http://www.vupen.com/english/advisories/2005/0680) 4. [15573](http://secunia.com/advisories/15573) 5. [16989](http://www.osvdb.org/16989) 6. [](http://www.security.org.sg/vuln/spa-promail4.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42715 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 00:54 UTC - **Last Updated**: August 02, 2024 at 19:30 UTC - **Reserved Date**: September 13, 2023 at 07:40 UTC - **Assigned By**: Unisoc ### Vulnerability Description In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android11/Android12 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0023 - **State**: PUBLISHED - **Published Date**: November 15, 2019 at 14:40 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution ### Affected Products **OpenShift - OpenShift** Affected versions: - through 2014-01-21 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0023) 2. [](https://access.redhat.com/security/cve/cve-2014-0023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21290, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21290 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21290 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:23 UTC - **Last Updated**: September 24, 2024 at 20:26 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - MySQL Cluster** Affected versions: - 8.0.27 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220121-0008/) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-086/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1304 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:11 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [94:001](http://ciac.llnl.gov/ciac/bulletins/f-05.shtml) 2. [F-05](http://ciac.llnl.gov/ciac/bulletins/f-05.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4101 - **State**: PUBLISHED - **Published Date**: October 03, 2023 at 11:26 UTC - **Last Updated**: September 23, 2024 at 17:06 UTC - **Reserved Date**: August 02, 2023 at 11:53 UTC - **Assigned By**: INCIBE ### Vulnerability Description The QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **IDM Sistemas QSige - QSige** Affected versions: - 3.0.0.0 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige) ### Credits - Pablo Arias Rodríguez, Jorge Alberto Palma Reyes and Rubén Barberá Pérez.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27524 - **State**: PUBLISHED - **Published Date**: May 15, 2025 at 06:27 UTC - **Last Updated**: May 15, 2025 at 14:09 UTC - **Reserved Date**: February 27, 2025 at 06:49 UTC - **Assigned By**: Hitachi ### Vulnerability Description Weak encryption vulnerability in Hitachi JP1/IT Desktop Management 2 - Smart Device Manager on Windows.This issue affects JP1/IT Desktop Management 2 - Smart Device Manager: from 12-00 before 12-00-08, from 11-10 through 11-10-08, from 11-00 through 11-00-05, from 10-50 through 10-50-06. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-326: Security Weakness ### Affected Products **Hitachi - JP1/IT Desktop Management 2 - Smart Device Manager** Affected versions: - 12-00 (Status: affected) - 11-10 (Status: affected) - 11-00 (Status: affected) - 10-50 (Status: affected) ### References 1. [](https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-115/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5143, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5143 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5143 - **State**: PUBLISHED - **Published Date**: July 14, 2015 at 17:00 UTC - **Last Updated**: August 06, 2024 at 06:32 UTC - **Reserved Date**: June 29, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2015-1dd5bc998f](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html) 2. [GLSA-201510-06](https://security.gentoo.org/glsa/201510-06) 3. [](https://www.djangoproject.com/weblog/2015/jul/08/security-releases/) 4. [openSUSE-SU-2015:1802](http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html) 5. [openSUSE-SU-2015:1813](http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html) 6. [DSA-3305](http://www.debian.org/security/2015/dsa-3305) 7. [RHSA-2015:1678](http://rhn.redhat.com/errata/RHSA-2015-1678.html) 8. [75666](http://www.securityfocus.com/bid/75666) 9. [RHSA-2015:1686](http://rhn.redhat.com/errata/RHSA-2015-1686.html) 10. [USN-2671-1](http://www.ubuntu.com/usn/USN-2671-1) 11. [1032820](http://www.securitytracker.com/id/1032820) 12. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1061 - **State**: PUBLISHED - **Published Date**: March 24, 2022 at 09:20 UTC - **Last Updated**: August 02, 2024 at 23:47 UTC - **Reserved Date**: March 24, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **radareorg - radareorg/radare2** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7) 2. [](https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40728 - **State**: PUBLISHED - **Published Date**: September 12, 2023 at 09:32 UTC - **Last Updated**: February 27, 2025 at 20:55 UTC - **Reserved Date**: August 21, 2023 at 10:57 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in QMS Automotive (All versions < V12.39). The QMS.Mobile module of the affected application stores sensitive application data in an external insecure storage. This could allow an attacker to alter content, leading to arbitrary code execution or denial-of-service condition. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-922: Security Weakness ### Affected Products **Siemens - QMS Automotive** Affected versions: - All versions < V12.39 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18734 - **State**: PUBLISHED - **Published Date**: October 28, 2018 at 03:00 UTC - **Last Updated**: August 05, 2024 at 11:16 UTC - **Reserved Date**: October 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A CSRF issue was discovered in admin/Index/addmanageuser.html in Catfish CMS 4.8.30. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AvaterXXX/catfish/blob/master/catfishcms.md#csrf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43764 - **State**: PUBLISHED - **Published Date**: January 02, 2025 at 23:58 UTC - **Last Updated**: January 03, 2025 at 21:45 UTC - **Reserved Date**: August 15, 2024 at 20:40 UTC - **Assigned By**: google_android ### Vulnerability Description In onPrimaryClipChanged of ClipboardListener.java, there is a possible way to partially bypass lock screen. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 14 (Status: affected) - 13 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/base/+/70eb75df7d342429c3ee225feb7c011df727442f) 2. [](https://source.android.com/security/bulletin/2024-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4799 - **State**: PUBLISHED - **Published Date**: December 28, 2022 at 00:00 UTC - **Last Updated**: April 10, 2025 at 18:00 UTC - **Reserved Date**: December 28, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **usememos - usememos/memos** Affected versions: - unspecified (Status: affected) ### References 1. [](https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53) 2. [](https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24568 - **State**: PUBLISHED - **Published Date**: February 10, 2022 at 18:51 UTC - **Last Updated**: August 03, 2024 at 04:13 UTC - **Reserved Date**: February 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Novel-plus v3.6.0 was discovered to be vulnerable to Server-Side Request Forgery (SSRF) via user-supplied crafted input. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/201206030/novel-plus/issues/80)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35628 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 18:10 UTC - **Last Updated**: January 01, 2025 at 02:18 UTC - **Reserved Date**: June 15, 2023 at 01:03 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows MSHTML Platform Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows MSHTML Platform Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8413, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8413 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8413 - **State**: PUBLISHED - **Published Date**: November 24, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 13:18 UTC - **Reserved Date**: October 22, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://downloads.asterisk.org/pub/security/AST-2014-013.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21933 - **State**: PUBLISHED - **Published Date**: December 22, 2021 at 18:07 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘esn_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **n/a - Advantech** Affected versions: - Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021) (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48318 - **State**: PUBLISHED - **Published Date**: June 04, 2024 at 10:26 UTC - **Last Updated**: August 02, 2024 at 21:23 UTC - **Reserved Date**: November 14, 2023 at 21:42 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Restriction of Excessive Authentication Attempts vulnerability in CodePeople Contact Form Email allows Functionality Bypass.This issue affects Contact Form Email: from n/a through 1.3.41. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **CodePeople - Contact Form Email** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/contact-form-to-email/wordpress-contact-form-email-plugin-1-3-41-captcha-bypass-vulnerability?_s_id=cve) ### Credits - qilin_99 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3691, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3691 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3691 - **State**: PUBLISHED - **Published Date**: January 21, 2021 at 09:41 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible out of bound memory access in audio due to integer underflow while processing modified contents in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking** Affected versions: - APQ8009, APQ8009W, APQ8017, APQ8030, APQ8037, APQ8052, APQ8053, APQ8056, APQ8060A, APQ8062, APQ8064, APQ8064AU, APQ8076, APQ8084, APQ8096AU, AQT1000, AR6003, AR8031, AR8035, AR8151, AR9374, CSRA6620, CSRA6640, CSRB31024, MDM8215, MDM8215M, MDM8615M, MDM8635M, MDM9206, MDM9215, MDM9225, MDM9225M, MDM9230, MDM9235M, MDM9310, MDM9330, MDM9607, MDM9615, MDM9615M, MDM9625, MDM9625M, MDM9628, MDM9630, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MPQ8064, MSM8108, MSM8208, MSM8209, MSM8226, MSM8227, MSM8230, MSM8608, MSM8610, MSM8626, MSM8627, MSM8630, MSM8909W, MSM8917, MSM8920, MSM8930, MSM8937, MSM8940, MSM8952, MSM8953, MSM8956, MSM8960, MSM8960SG, MSM8962, MSM8976, MSM8976SG, MSM8996AU, PM215, PM3003A, PM4125, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8018, PM8019, PM8110, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8226, PM8 ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29968 - **State**: PUBLISHED - **Published Date**: April 19, 2024 at 05:17 UTC - **Last Updated**: September 18, 2024 at 22:32 UTC - **Reserved Date**: March 22, 2024 at 05:32 UTC - **Assigned By**: brocade ### Vulnerability Description An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-922: Security Weakness ### Affected Products **Brocade - Brocade SANnav** Affected versions: - before v2.3.1 and v2.3.0a (Status: affected) ### References 1. [](https://support.broadcom.com/external/content/SecurityAdvisories/0/23253)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2446, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2446 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2446 - **State**: PUBLISHED - **Published Date**: August 04, 2015 at 10:00 UTC - **Last Updated**: August 08, 2024 at 04:06 UTC - **Reserved Date**: July 30, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GE Healthcare Millennium MG, NC, and MyoSIGHT has a password of insite.genieacq for the insite account that cannot be changed without disabling product functionality for remote InSite support, which has unspecified impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://apps.gehealthcare.com/servlet/ClientServlet/2338955-100.pdf?REQ=RAA&DIRECTION=2338955-100&FILENAME=2338955-100.pdf&FILEREV=1&DOCREV_ORG=1) 2. [](http://apps.gehealthcare.com/servlet/ClientServlet/2354459-100.pdf?REQ=RAA&DIRECTION=2354459-100&FILENAME=2354459-100.pdf&FILEREV=4&DOCREV_ORG=4) 3. [](http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/) 4. [](https://twitter.com/digitalbond/status/619250429751222277) 5. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3175 - **State**: PUBLISHED - **Published Date**: August 01, 2008 at 14:00 UTC - **Last Updated**: August 07, 2024 at 09:28 UTC - **Reserved Date**: July 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer underflow in rxRPC.dll in the LGServer service in the server in CA ARCserve Backup for Laptops and Desktops 11.0 through 11.5 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted message that triggers a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31319](http://secunia.com/advisories/31319) 2. [20080731 Assurent VR - CA ARCserve Backup for Laptops and Desktops LGServer Handshake Buffer Overflow](http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063594.html) 3. [](https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181721) 4. [20080801 CA ARCserve Backup for Laptops and Desktops Server LGServer Service Vulnerability](http://www.securityfocus.com/archive/1/495020/100/0/threaded) 5. [ADV-2008-2286](http://www.vupen.com/english/advisories/2008/2286) 6. [30472](http://www.securityfocus.com/bid/30472) 7. [1020590](http://www.securitytracker.com/id?1020590) 8. [ca-abld-rxrpc-bo(44137)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44137)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1957, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1957 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1957 - **State**: PUBLISHED - **Published Date**: April 21, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The com_rss option (rss.php) in (1) Mambo and (2) Joomla! allows remote attackers to cause a denial of service (disk consumption and possibly web-server outage) via multiple requests with different values of the feed parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060419 Re: [KAPDA::#41] - Mambo/Joomla rss component vulnerability](http://archives.neohapsis.com/archives/bugtraq/2006-04/0380.html) 2. [](http://www.kapda.ir/advisory-313.html) 3. [20060418 [KAPDA::#41] - Mambo/Joomla rss component vulnerability](http://www.securityfocus.com/archive/1/431317/100/0/threaded) 4. [mambo-joomla-rss-dos(26131)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26131) 5. [](http://irannetjob.com/content/view/209/28/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0869, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0869 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0869 - **State**: PUBLISHED - **Published Date**: April 09, 2019 at 20:20 UTC - **Last Updated**: August 04, 2024 at 17:58 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A spoofing vulnerability exists in Microsoft Azure DevOps Server when it fails to properly handle web requests, aka 'Azure DevOps Server HTML Injection Vulnerability'. ### Affected Products **Microsoft - Azure DevOps Server** Affected versions: - 2019 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0869) 2. [107768](http://www.securityfocus.com/bid/107768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4837 - **State**: PUBLISHED - **Published Date**: September 12, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 15:08 UTC - **Reserved Date**: September 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in anket.asp in Proxy Anket 3.0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [proxyanklet-anket-sql-injection(36515)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36515) 2. [](http://yollubunlar.org/proxy-anket-v301-sql-injection-vulnerable-3502.html) 3. [25613](http://www.securityfocus.com/bid/25613) 4. [3121](http://securityreason.com/securityalert/3121) 5. [20070909 Proxy Anket v3.0.1 Sql injection Vulnerable](http://www.securityfocus.com/archive/1/478971/100/0/threaded) 6. [26735](http://secunia.com/advisories/26735) 7. [36939](http://osvdb.org/36939)