System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56454 - **State**: PUBLISHED - **Published Date**: January 08, 2025 at 03:21 UTC - **Last Updated**: January 08, 2025 at 14:44 UTC - **Reserved Date**: December 26, 2024 at 08:45 UTC - **Assigned By**: huawei ### Vulnerability Description Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 5.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2025/1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31658 - **State**: PUBLISHED - **Published Date**: August 05, 2022 at 15:07 UTC - **Last Updated**: August 03, 2024 at 07:26 UTC - **Reserved Date**: May 25, 2022 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution. ### Affected Products **n/a - VMware Workspace ONE Access, Identity Manager and vRealize Automation** Affected versions: - Workspace One Access (21.08.0.1 & 21.08.0.0), Identity Manager (vIDM) (3.3.6, 3.3.5 & 3.3.4), and vRealize Automation 7.6 (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2022-0021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16349 - **State**: PUBLISHED - **Published Date**: September 16, 2019 at 12:56 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 16, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bento4 1.5.1-628 has a NULL pointer dereference in AP4_ByteStream::ReadUI32 in Core/Ap4ByteStream.cpp when called from the AP4_TrunAtom class. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/axiomatic-systems/Bento4/issues/422)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4293 - **State**: PUBLISHED - **Published Date**: October 24, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 16:38 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The server in Red Hat JBoss Operations Network (JON) 3.1.2 logs passwords in plaintext, which allows local users to obtain sensitive information by reading the log files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1002853) 2. [RHSA-2013:1448](http://rhn.redhat.com/errata/RHSA-2013-1448.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54469 - **State**: PUBLISHED - **Published Date**: March 10, 2025 at 19:11 UTC - **Last Updated**: March 11, 2025 at 13:37 UTC - **Reserved Date**: December 03, 2024 at 22:50 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121234) 2. [](https://support.apple.com/en-us/121238) 3. [](https://support.apple.com/en-us/121249) 4. [](https://support.apple.com/en-us/121250) 5. [](https://support.apple.com/en-us/121247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21102 - **State**: PUBLISHED - **Published Date**: June 28, 2021 at 13:45 UTC - **Last Updated**: April 23, 2025 at 19:40 UTC - **Reserved Date**: December 18, 2020 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Illustrator version 25.2 (and earlier) is affected by a Path Traversal vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Adobe - Illustrator** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb21-24.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33665 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 22:38 UTC - **Last Updated**: January 02, 2025 at 19:25 UTC - **Reserved Date**: June 14, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure Site Recovery Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Azure Site Recovery VMWare to Azure** Affected versions: - 9.0 (Status: affected) ### References 1. [Azure Site Recovery Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33665)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29159, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29159 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29159 - **State**: PUBLISHED - **Published Date**: May 09, 2024 at 16:23 UTC - **Last Updated**: February 13, 2025 at 15:47 UTC - **Reserved Date**: March 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HDF5 through 1.14.3 contains a buffer overflow in H5Z__filter_scaleoffset, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-21091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-21091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-21091 - **State**: PUBLISHED - **Published Date**: April 08, 2020 at 13:21 UTC - **Last Updated**: August 05, 2024 at 12:19 UTC - **Reserved Date**: April 07, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. Telecom has a System Crash via abnormal exception handling. The Samsung ID is SVE-2017-10906 (January 2018). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3838 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 10:51 UTC - **Last Updated**: November 18, 2024 at 14:41 UTC - **Reserved Date**: September 29, 2021 at 00:25 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description DomPDF before version 2.0.0 is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_get_contents() function. An attacker who can upload files of any type to the server can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when DOMPdf is used with frameworks with documented POP chains like Laravel or vulnerable developer code. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **dompdf - dompdf/dompdf** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e) 2. [](https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6958 - **State**: PUBLISHED - **Published Date**: January 13, 2020 at 23:07 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An XXE vulnerability in JnlpSupport in Yet Another Java Service Wrapper (YAJSW) 12.14, as used in NSA Ghidra and other products, allows attackers to exfiltrate data from remote hosts and potentially cause denial-of-service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/yajsw/bugs/166/) 2. [](https://github.com/NationalSecurityAgency/ghidra/issues/943) 3. [](https://github.com/purpleracc00n/Exploits-and-PoC/blob/master/XXE%20in%20YAJSW%E2%80%99s%20JnlpSupport%20affects%20Ghidra%20Server.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13522 - **State**: PUBLISHED - **Published Date**: August 04, 2020 at 19:03 UTC - **Last Updated**: August 04, 2024 at 12:18 UTC - **Reserved Date**: May 26, 2020 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **n/a - SoftPerfect** Affected versions: - SoftPerfect RAM Disk 4.1 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1121)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3944 - **State**: PUBLISHED - **Published Date**: September 05, 2008 at 15:00 UTC - **Last Updated**: August 07, 2024 at 10:00 UTC - **Reserved Date**: September 05, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in ACG-PTP 1.0.6 allows remote attackers to execute arbitrary SQL commands via the adid parameter in an adorder action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4224](http://securityreason.com/securityalert/4224) 2. [31005](http://www.securityfocus.com/bid/31005) 3. [6362](https://www.exploit-db.com/exploits/6362)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30629 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:54 UTC - **Last Updated**: June 06, 2025 at 16:02 UTC - **Reserved Date**: March 24, 2025 at 13:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Codehaveli Bitly URL Shortener allows Cross Site Request Forgery. This issue affects Bitly URL Shortener: from n/a through 1.3.3. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Codehaveli - Bitly URL Shortener** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/codehaveli-bitly-url-shortener/vulnerability/wordpress-bitly-url-shortener-1-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nabil Irawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0058 - **State**: PUBLISHED - **Published Date**: October 09, 2019 at 19:26 UTC - **Last Updated**: September 16, 2024 at 17:49 UTC - **Reserved Date**: October 11, 2018 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 12.3X48 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA10956)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1166 - **State**: PUBLISHED - **Published Date**: March 12, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 17:03 UTC - **Reserved Date**: March 12, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Monotone 0.25 and earlier, when a user creates a file in a directory called "mt", and when checking out that file on a case-insensitive file system such as Windows or Mac OS X, places the file into the "MT" bookkeeping directory, which could allow context-dependent attackers to execute arbitrary Lua programs as the user running monotone. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19260](http://secunia.com/advisories/19260) 2. [[Monotone-devel] 20060308 [ANNOUNCE] Monotone 0.25.2 -- security fix release](http://lists.gnu.org/archive/html/monotone-devel/2006-03/msg00062.html) 3. [17139](http://www.securityfocus.com/bid/17139) 4. [ADV-2006-0990](http://www.vupen.com/english/advisories/2006/0990) 5. [monotone-mt-lua-code-execution(25294)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25294)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5449 - **State**: PUBLISHED - **Published Date**: June 06, 2024 at 03:32 UTC - **Last Updated**: August 01, 2024 at 21:11 UTC - **Reserved Date**: May 28, 2024 at 19:54 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Dark Mode – WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpdm_social_share_save_options function in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **wppool - WP Dark Mode – WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d7d20733-d61b-4b2f-8597-528644f0bc26?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-dark-mode/trunk/includes/modules/social-share/class-social-share.php#L581) 3. [](https://plugins.trac.wordpress.org/changeset/3096290/wp-dark-mode/trunk?contextall=1&old=3073245&old_path=%2Fwp-dark-mode%2Ftrunk) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5138 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A spoofing vulnerability can occur when a malicious site with an extremely long domain name is opened in an Android Custom Tab (a browser panel inside another app) and the default browser is Firefox for Android. This could allow an attacker to spoof which page is actually loaded and in use. Note: this issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox < 59. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [103386](http://www.securityfocus.com/bid/103386) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1432624) 3. [1040514](http://www.securitytracker.com/id/1040514) 4. [](https://www.mozilla.org/security/advisories/mfsa2018-06/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4006 - **State**: PUBLISHED - **Published Date**: July 26, 2007 at 00:00 UTC - **Last Updated**: September 17, 2024 at 02:20 UTC - **Reserved Date**: July 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 has unknown impact and remote attack vectors, aka ZD-00000034. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.wslabi.com/wabisabilabi/initPublishedBid.do?)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0529 - **State**: PUBLISHED - **Published Date**: January 17, 2025 at 15:00 UTC - **Last Updated**: February 12, 2025 at 20:31 UTC - **Reserved Date**: January 17, 2025 at 06:30 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow - CWE-119: Security Weakness ### Affected Products **code-projects - Train Ticket Reservation System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-292413 | code-projects Train Ticket Reservation System Login Form stack-based overflow](https://vuldb.com/?id.292413) 2. [VDB-292413 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.292413) 3. [Submit #478447 | code-projects Train Ticket Reservation System 1.0 Buffer Overflow](https://vuldb.com/?submit.478447) 4. [](https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc) 5. [](https://code-projects.org/) ### Credits - c4ttr4ck (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3634 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 6. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2307 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3239 - **State**: PUBLISHED - **Published Date**: June 15, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 14:05 UTC - **Reserved Date**: June 14, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in searchform.php in the AndyBlue theme before 20070607 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI to index.php. NOTE: this can be leveraged for PHP code execution in an administrative session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24490](http://www.securityfocus.com/bid/24490) 2. [36379](http://osvdb.org/36379) 3. [2807](http://securityreason.com/securityalert/2807) 4. [](http://www.xssnews.com/) 5. [20070608 Wordpress default theme XSS (admin) and other problems](http://www.securityfocus.com/archive/1/470837/100/0/threaded) 6. [25659](http://secunia.com/advisories/25659)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44901 - **State**: PUBLISHED - **Published Date**: February 04, 2022 at 10:59 UTC - **Last Updated**: August 04, 2024 at 04:32 UTC - **Reserved Date**: December 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Micro-Star International (MSI) Dragon Center <= 2.0.116.0 is vulnerable to multiple Privilege Escalation (LPE/EoP) vulnerabilities in the atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys drivers components. All the vulnerabilities are triggered by sending specific IOCTL requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://voidsec.com) 2. [](https://voidsec.com/advisories/cve-2021-44901/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6754 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 08, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7267 - **State**: PUBLISHED - **Published Date**: July 02, 2019 at 16:45 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: January 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Linear eMerge 50P/5000P devices allow Cookie Path Traversal. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://applied-risk.com/labs/advisories) 2. [](https://www.applied-risk.com/resources/ar-2019-006) 3. [](http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html) 4. [](https://www.us-cert.gov/ics/advisories/icsa-20-184-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6359 - **State**: PUBLISHED - **Published Date**: December 07, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Stefan Frech online-bookmarks 0.6.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23169](http://secunia.com/advisories/23169) 2. [21422](http://www.securityfocus.com/bid/21422) 3. [ADV-2006-4849](http://www.vupen.com/english/advisories/2006/4849) 4. [20061203 Online BookMarks Multiple SQL Injection/XSS Vulnerabilities](http://marc.info/?l=bugtraq&m=116525508018486&w=2) 5. [onlinebookmarks-login-xss(30697)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30697) 6. [](http://www.vigilon.com/resources/120406.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2676 - **State**: PUBLISHED - **Published Date**: March 20, 2024 at 06:00 UTC - **Last Updated**: August 01, 2024 at 19:18 UTC - **Reserved Date**: March 19, 2024 at 19:56 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in Campcodes Online Job Finder System 1.0. Affected is an unknown function of the file /admin/company/controller.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257376. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Campcodes - Online Job Finder System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-257376 | Campcodes Online Job Finder System controller.php sql injection](https://vuldb.com/?id.257376) 2. [VDB-257376 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.257376) 3. [](https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%209.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11176 - **State**: REJECTED - **Last Updated**: February 28, 2023 at 00:00 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15937 - **State**: PUBLISHED - **Published Date**: October 12, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected) ### References 1. [1041809](http://www.securitytracker.com/id/1041809) 2. [105442](http://www.securityfocus.com/bid/105442) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html) 4. [](https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36467, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36467 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36467 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 13:53 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function EditMacList.d. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24300, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24300 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24300 - **State**: PUBLISHED - **Published Date**: May 24, 2021 at 10:58 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The slider import search feature of the PickPlugins Product Slider for WooCommerce WordPress plugin before 1.13.22 did not properly sanitised the keyword GET parameter, leading to reflected Cross-Site Scripting issue ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PickPlugins - PickPlugins Product Slider for WooCommerce** Affected versions: - 1.13.22 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837) ### Credits - 0xB9
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1091 - **State**: PUBLISHED - **Published Date**: May 02, 2013 at 18:00 UTC - **Last Updated**: August 06, 2024 at 14:49 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59612](http://www.securityfocus.com/bid/59612) 2. [](http://www.novell.com/support/kb/doc.php?id=7012344) 3. [](https://bugzilla.novell.com/show_bug.cgi?id=800593) 4. [](http://download.novell.com/Download?buildid=k6yH0sy992E~)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1609 - **State**: REJECTED - **Published Date**: July 09, 2021 at 12:05 UTC - **Last Updated**: July 09, 2021 at 12:05 UTC - **Reserved Date**: March 12, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1204 - **State**: PUBLISHED - **Published Date**: April 10, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 02, 2007 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1017895](http://www.securitytracker.com/id?1017895) 2. [HPSBST02208](http://www.securityfocus.com/archive/1/466331/100/200/threaded) 3. [ADV-2007-1323](http://www.vupen.com/english/advisories/2007/1323) 4. [24822](http://secunia.com/advisories/24822) 5. [oval:org.mitre.oval:def:2049](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2049) 6. [20070410 Microsoft Windows Universal Plug and Play Memory Corruption Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=509) 7. [34010](http://www.osvdb.org/34010) 8. [MS07-019](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-019) 9. [SSRT071365](http://www.securityfocus.com/archive/1/466331/100/200/threaded) 10. [23371](http://www.securityfocus.com/bid/23371)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54193 - **State**: PUBLISHED - **Published Date**: January 11, 2025 at 12:35 UTC - **Last Updated**: May 04, 2025 at 09:57 UTC - **Reserved Date**: January 11, 2025 at 12:34 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal() Move pm_runtime_set_active() to ivpu_pm_init() so when ivpu_ipc_send_receive_internal() is executed before ivpu_pm_enable() it already has correct runtime state, even if last resume was not successful. ### Affected Products **Linux - Linux** Affected versions: - 8ed520ff4682aaaef7d124bd9c0950092fddb9c1 (Status: affected) - 8ed520ff4682aaaef7d124bd9c0950092fddb9c1 (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 6.12.7 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/578874b2bb947e047708f4df286e4ff1ba6be3ad) 2. [](https://git.kernel.org/stable/c/0f6482caa6acdfdfc744db7430771fe7e6c4e787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52627, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52627 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52627 - **State**: PUBLISHED - **Published Date**: March 26, 2024 at 17:49 UTC - **Last Updated**: May 04, 2025 at 07:40 UTC - **Reserved Date**: March 06, 2024 at 09:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7091r: Allow users to configure device events AD7091R-5 devices are supported by the ad7091r-5 driver together with the ad7091r-base driver. Those drivers declared iio events for notifying user space when ADC readings fall bellow the thresholds of low limit registers or above the values set in high limit registers. However, to configure iio events and their thresholds, a set of callback functions must be implemented and those were not present until now. The consequence of trying to configure ad7091r-5 events without the proper callback functions was a null pointer dereference in the kernel because the pointers to the callback functions were not set. Implement event configuration callbacks allowing users to read/write event thresholds and enable/disable event generation. Since the event spec structs are generic to AD7091R devices, also move those from the ad7091r-5 driver the base driver so they can be reused when support for ad7091r-2/-4/-8 be added. ### Affected Products **Linux - Linux** Affected versions: - ca69300173b642ba64118200172171ea5967b6c5 (Status: affected) - ca69300173b642ba64118200172171ea5967b6c5 (Status: affected) - ca69300173b642ba64118200172171ea5967b6c5 (Status: affected) - ca69300173b642ba64118200172171ea5967b6c5 (Status: affected) - ca69300173b642ba64118200172171ea5967b6c5 (Status: affected) - ca69300173b642ba64118200172171ea5967b6c5 (Status: affected) **Linux - Linux** Affected versions: - 5.6 (Status: affected) - 0 (Status: unaffected) - 5.10.210 (Status: unaffected) - 5.15.149 (Status: unaffected) - 6.1.76 (Status: unaffected) - 6.6.15 (Status: unaffected) - 6.7.3 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5) 2. [](https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091) 3. [](https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4) 4. [](https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2) 5. [](https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6) 6. [](https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4769 - **State**: PUBLISHED - **Published Date**: December 26, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: July 05, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x before 3.4.2, when the dns.recursive.enabled setting is used, allows remote attackers to cause a denial of service (traffic amplification) via spoofed DNS queries. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.eucalyptus.com/resources/security/advisories/esa-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4364 - **State**: PUBLISHED - **Published Date**: August 25, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2245](https://www.exploit-db.com/exploits/2245) 2. [1016729](http://securitytracker.com/id?1016729) 3. [ADV-2006-3361](http://www.vupen.com/english/advisories/2006/3361) 4. [](http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04) 5. [mdaemon-pop3-bo(28517)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28517) 6. [20060822 MDaemon POP3 server remote buffer overflow (preauth)](http://www.securityfocus.com/archive/1/444015/100/0/threaded) 7. [1446](http://securityreason.com/securityalert/1446) 8. [19651](http://www.securityfocus.com/bid/19651) 9. [](http://files.altn.com/MDaemon/Release/RelNotes_en.txt) 10. [21595](http://secunia.com/advisories/21595) 11. [28125](http://www.osvdb.org/28125)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16720 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:50 UTC - **Last Updated**: December 20, 2021 at 22:50 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9052 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 18:00 UTC - **Last Updated**: September 16, 2024 at 23:11 UTC - **Reserved Date**: April 18, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Qualcomm products with Android releases from CAF using the Linux kernel, a vulnerability exists in LTE where an assertion can be reached while processing a downlink message. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-07-01) 2. [99467](http://www.securityfocus.com/bid/99467)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000050 - **State**: PUBLISHED - **Published Date**: July 13, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: July 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20170305 CVE-Request JasPer 2.0.12 NULL Pointer Dereference jp2_encode (jp2_enc.c)](http://www.openwall.com/lists/oss-security/2017/03/06/1) 2. [RHSA-2018:3253](https://access.redhat.com/errata/RHSA-2018:3253) 3. [RHSA-2018:3505](https://access.redhat.com/errata/RHSA-2018:3505) 4. [96595](http://www.securityfocus.com/bid/96595) 5. [USN-3693-1](https://usn.ubuntu.com/3693-1/) 6. [GLSA-201908-03](https://security.gentoo.org/glsa/201908-03) 7. [FEDORA-2021-2b151590d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/) 8. [FEDORA-2021-0a6290f865](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3292 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:36 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS v3.0 Base Score 5.7 (Confidentiality impacts). ### Affected Products **Oracle - PeopleSoft Enterprise PT PeopleTools** Affected versions: - 8.54 (Status: affected) - 8.55 (Status: affected) ### References 1. [1037634](http://www.securitytracker.com/id/1037634) 2. [95502](http://www.securityfocus.com/bid/95502) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14625 - **State**: PUBLISHED - **Published Date**: September 10, 2018 at 13:00 UTC - **Last Updated**: August 05, 2024 at 09:29 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **[UNKNOWN] - kernel** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625) 2. [USN-3872-1](https://usn.ubuntu.com/3872-1/) 3. [USN-3878-1](https://usn.ubuntu.com/3878-1/) 4. [USN-3871-5](https://usn.ubuntu.com/3871-5/) 5. [USN-3878-2](https://usn.ubuntu.com/3878-2/) 6. [USN-3871-4](https://usn.ubuntu.com/3871-4/) 7. [](https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039) 8. [USN-3871-1](https://usn.ubuntu.com/3871-1/) 9. [USN-3871-3](https://usn.ubuntu.com/3871-3/) 10. [[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html) 11. [RHSA-2019:2043](https://access.redhat.com/errata/RHSA-2019:2043) 12. [RHSA-2019:2029](https://access.redhat.com/errata/RHSA-2019:2029) 13. [RHSA-2019:4154](https://access.redhat.com/errata/RHSA-2019:4154)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26396 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2534 - **State**: PUBLISHED - **Published Date**: July 20, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 17, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RealNetworks Helix Server and Helix Mobile Server before 13.0.0 allow remote attackers to cause a denial of service (daemon crash) via an RTSP SETUP request that (1) specifies the / URI or (2) lacks a / character in the URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35732](http://www.securityfocus.com/bid/35732) 2. [20090717 CORE-2009-0227: Real Helix DNA RTSP and SETUP request handler vulnerabilities](http://www.securityfocus.com/archive/1/505083/100/0/threaded) 3. [](http://www.coresecurity.com/content/real-helix-dna) 4. [55982](http://osvdb.org/55982) 5. [ADV-2009-1947](http://www.vupen.com/english/advisories/2009/1947) 6. [](http://docs.real.com/docs/security/SecurityUpdate071409HS.pdf) 7. [9198](http://www.exploit-db.com/exploits/9198)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1959 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 16:51 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 27, 2024 at 20:25 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Social Sharing Plugin – Social Warfare plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'socialWarfare' shortcode in all versions up to, and including, 4.4.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **warfareplugins - Social Sharing Plugin – Social Warfare** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1016f16c-0ab2-4cac-a7a5-8d93a37e7894?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/social-warfare/tags/4.4.5.1/lib/buttons-panel/SWP_Buttons_Panel_Shortcode.php) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3064109%40social-warfare&new=3064109%40social-warfare&sfp_email=&sfph_mail=#file1) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28479 - **State**: PUBLISHED - **Published Date**: June 06, 2022 at 22:17 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SeedDMS versions 6.0.18 and 5.1.25 and below are vulnerable to stored XSS. An attacker with admin privileges can inject the payload inside the "Role management" menu and then trigger the payload by loading the "Users management" menu ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/seeddms/code/ci/9e92524fdbd1e7c3e6771d669f140c62389ec375/) 2. [](https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28479)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32345 - **State**: PUBLISHED - **Published Date**: April 17, 2024 at 00:00 UTC - **Last Updated**: November 22, 2024 at 14:15 UTC - **Reserved Date**: April 12, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Configuration parameter under the Language section. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/adiapera/xss_language_cmsimple_5.15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4839 - **State**: PUBLISHED - **Published Date**: May 17, 2025 at 22:00 UTC - **Last Updated**: May 19, 2025 at 14:34 UTC - **Reserved Date**: May 16, 2025 at 14:40 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in itwanger paicoding 1.0.0/1.0.1/1.0.2/1.0.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /paicoding-core/src/main/java/com/github/paicoding/forum/core/util/CrossUtil.java. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-942: Code Injection - CWE-346: Security Weakness ### Affected Products **itwanger - paicoding** Affected versions: - 1.0.0 (Status: affected) - 1.0.1 (Status: affected) - 1.0.2 (Status: affected) - 1.0.3 (Status: affected) ### References 1. [VDB-309307 | itwanger paicoding CrossUtil.java cross-domain policy](https://vuldb.com/?id.309307) 2. [VDB-309307 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.309307) 3. [Submit #574826 | itwanger paicoding from version 1.0.0 to 1.0.3 Permissive Cross-domain Policy with Untrusted Domains](https://vuldb.com/?submit.574826) 4. [](https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-02.md) ### Credits - ShenxiuSecurity (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1437 - **State**: PUBLISHED - **Published Date**: June 23, 2016 at 00:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 04, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description SQL injection vulnerability in the SQL database in Cisco Prime Collaboration Deployment before 11.5.1 allows remote authenticated users to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCuy92549. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1036151](http://www.securitytracker.com/id/1036151) 2. [20160621 Cisco Prime Collaboration Deployment SQL Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0509 - **State**: PUBLISHED - **Published Date**: June 11, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 04:40 UTC - **Reserved Date**: February 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to execute arbitrary code via a crafted file that triggers memory corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35274](http://www.securityfocus.com/bid/35274) 2. [ADV-2009-1547](http://www.vupen.com/english/advisories/2009/1547) 3. [35655](http://secunia.com/advisories/35655) 4. [TA09-161A](http://www.us-cert.gov/cas/techalerts/TA09-161A.html) 5. [35734](http://secunia.com/advisories/35734) 6. [RHSA-2009:1109](http://www.redhat.com/support/errata/RHSA-2009-1109.html) 7. [](http://www.adobe.com/support/security/bulletins/apsb09-07.html) 8. [SUSE-SA:2009:035](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html) 9. [1022361](http://securitytracker.com/id?1022361) 10. [reader-text-bo(49239)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49239) 11. [GLSA-200907-06](http://security.gentoo.org/glsa/glsa-200907-06.xml) 12. [34580](http://secunia.com/advisories/34580) 13. [35685](http://secunia.com/advisories/35685) 14. [SUSE-SR:2009:012](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html) 15. [35496](http://secunia.com/advisories/35496)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38323 - **State**: PUBLISHED - **Published Date**: September 09, 2021 at 18:10 UTC - **Last Updated**: May 05, 2025 at 14:48 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The RentPress WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selections parameter found in the ~/src/rentPress/AjaxRequests.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.6.4. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **RentPress - RentPress** Affected versions: - 6.6.4 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38323) 2. [](https://plugins.trac.wordpress.org/browser/rentpress/tags/6.6.4/src/rentPress/AjaxRequests.php#L83) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4557, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4557 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4557 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5469 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 11, 2008 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0475 - **State**: PUBLISHED - **Published Date**: December 15, 2020 at 15:54 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In createInputConsumer of WindowManagerService.java, there is a possible way to block and intercept input events due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162324374 ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2020-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3964 - **State**: PUBLISHED - **Published Date**: July 13, 2024 at 06:00 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 18, 2024 at 19:17 UTC - **Assigned By**: WPScan ### Vulnerability Description The Product Enquiry for WooCommerce WordPress plugin before 3.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Product Enquiry for WooCommerce** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/ff468772-3e6a-439c-a4d7-94bd2ce1a964/) ### Credits - Bob Matyas - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45613 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:36 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, MR80 before 1.1.2.20, MS80 before 1.1.2.20, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064138/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0508)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30378 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 20:03 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 23:06 UTC - **Assigned By**: juniper ### Vulnerability Description A Use After Free vulnerability in command processing of Juniper Networks Junos OS on MX Series allows a local, authenticated attacker to cause the broadband edge service manager daemon (bbe-smgd) to crash upon execution of specific CLI commands, creating a Denial of Service (DoS) condition.  The process crashes and restarts automatically. When specific CLI commands are executed, the bbe-smgd daemon attempts to write into an area of memory (mgd socket) that was already closed, causing the process to crash.  This process manages and controls the configuration of broadband subscriber sessions and services.  While the process is unavailable, additional subscribers will not be able to connect to the device, causing a temporary Denial of Service condition. This issue only occurs if Graceful Routing Engine Switchover (GRES) and Subscriber Management are enabled. This issue affects Junos OS: * All versions before 20.4R3-S5, * from 21.1 before 21.1R3-S4, * from 21.2 before 21.2R3-S3, * from 21.3 before 21.3R3-S5, * from 21.4 before 21.4R3-S5, * from 22.1 before 22.1R3, * from 22.2 before 22.2R3, * from 22.3 before 22.3R2; ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 0 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) - 21.3 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA79109) 2. [](https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2926 - **State**: PUBLISHED - **Published Date**: May 22, 2012 at 15:00 UTC - **Last Updated**: August 06, 2024 at 19:50 UTC - **Reserved Date**: May 22, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [fisheye-crucible-xml-dos(75682)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75682) 2. [49146](http://secunia.com/advisories/49146) 3. [](http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17) 4. [](http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17) 5. [81993](http://osvdb.org/81993) 6. [](http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17) 7. [53595](http://www.securityfocus.com/bid/53595) 8. [](http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17) 9. [](http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17) 10. [jira-xml-dos(75697)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75697)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52944 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 00:00 UTC - **Last Updated**: November 19, 2024 at 15:49 UTC - **Reserved Date**: November 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Veritas Enterprise Vault before 15.1 UPD882911, ZDI-CAN-24698. It allows an authenticated remote attacker to inject a parameter into an HTTP request, allowing for Cross-Site Scripting while viewing archived content. This could reflect back to an authenticated user without sanitization if executed by that user. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:L/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.veritas.com/support/en_US/security/VTS24-013)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0391 - **State**: PUBLISHED - **Published Date**: January 23, 2008 at 01:00 UTC - **Last Updated**: August 07, 2024 at 07:46 UTC - **Reserved Date**: January 22, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description inc/elementz.php in aliTalk 1.9.1.1 does not properly verify authentication, which allows remote attackers to add an arbitrary user account via a modified lilil parameter, in conjunction with the ubild and pa parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4922](https://www.exploit-db.com/exploits/4922) 2. [27315](http://www.securityfocus.com/bid/27315)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16618 - **State**: PUBLISHED - **Published Date**: June 19, 2019 at 17:48 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VTech Storio Max before 56.D3JM6 allows remote command execution via shell metacharacters in an Android activity name. It exposes the storeintenttranslate.x service on port 1668 listening for requests on localhost. Requests submitted to this service are checked for a string of random characters followed by the name of an Android activity to start. Activities are started by inserting their name into a string that is executed in a shell command. By inserting metacharacters this can be exploited to run arbitrary commands as root. The requests also match those of the HTTP protocol and can be triggered on any web page rendered on the device by requesting resources stored at an http://127.0.0.1:1668/ URI, as demonstrated by the http://127.0.0.1:1668/dacdb70556479813fab2d92896596eef?';{ping,example.org}' URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.vtech.com/en/our-businesses/product-support/) 2. [](https://www.surecloud.com/sc-blog/vtech)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30713 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 14:29 UTC - **Last Updated**: January 29, 2025 at 17:25 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited.. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212529) 2. [](https://support.apple.com/kb/HT212805) 3. [20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina](http://seclists.org/fulldisclosure/2021/Sep/40)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45278 - **State**: PUBLISHED - **Published Date**: October 08, 2024 at 03:21 UTC - **Last Updated**: October 08, 2024 at 13:57 UTC - **Reserved Date**: August 26, 2024 at 10:39 UTC - **Assigned By**: sap ### Vulnerability Description SAP Commerce Backoffice does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SAP_SE - SAP Commerce Backoffice** Affected versions: - HY_COM 2205 (Status: affected) - COM_CLOUD 2211 (Status: affected) ### References 1. [](https://me.sap.com/notes/3507545) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38880, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38880 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38880 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 13:56 UTC - **Last Updated**: August 03, 2024 at 11:02 UTC - **Reserved Date**: August 29, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The affected version is 0.1.0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pypi.org/project/democritus-strings/) 2. [](https://github.com/democritus-project/d8s-urls/issues/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13418, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13418 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13418 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 03:21 UTC - **Last Updated**: May 02, 2025 at 14:47 UTC - **Reserved Date**: January 15, 2025 at 18:30 UTC - **Assigned By**: Wordfence ### Vulnerability Description Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **G5Theme - Benaa Framework** Affected versions: - * (Status: affected) **G5Theme - April Framework** Affected versions: - * (Status: affected) **G5Theme - Beyot Framework** Affected versions: - * (Status: affected) **G5Theme - Auteur Framework** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve) 2. [](https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24808 - **State**: PUBLISHED - **Published Date**: February 07, 2023 at 00:02 UTC - **Last Updated**: March 10, 2025 at 21:15 UTC - **Reserved Date**: January 30, 2023 at 14:43 UTC - **Assigned By**: GitHub_M ### Vulnerability Description PDFio is a C library for reading and writing PDF files. In versions prior to 1.1.0 a denial of service (DOS) vulnerability exists in the pdfio parser. Crafted pdf files can cause the program to run at 100% utilization and never terminate. The pdf which causes this crash found in testing is about 28kb in size and was discovered via fuzzing. Anyone who uses this library either as a standalone binary or as a library can be DOSed when attempting to parse this type of file. Web servers or other automated processes which rely on this code to turn pdf submissions into plaintext can be DOSed when an attacker uploads the pdf. Please see the linked GHSA for an example pdf. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-835: Security Weakness ### Affected Products **michaelrsweet - pdfio** Affected versions: - < 1.1.0 (Status: affected) ### References 1. [https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf](https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf) 2. [https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb](https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38748 - **State**: PUBLISHED - **Published Date**: November 01, 2024 at 14:17 UTC - **Last Updated**: November 05, 2024 at 15:31 UTC - **Reserved Date**: June 19, 2024 at 11:16 UTC - **Assigned By**: Patchstack ### Vulnerability Description Access Control vulnerability in TheInnovs EleForms allows . This issue affects EleForms: from n/a through 2.9.9.9. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **TheInnovs - EleForms** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/all-contact-form-integration-for-elementor/wordpress-eleforms-plugin-2-9-9-9-broken-access-control-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2285 - **State**: PUBLISHED - **Published Date**: July 02, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: July 01, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0. ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **vim - vim/vim** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736) 2. [](https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe) 3. [FEDORA-2022-b06fbea2c7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/) 4. [FEDORA-2022-9d7a58e376](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/) 5. [GLSA-202208-32](https://security.gentoo.org/glsa/202208-32) 6. [[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html) 7. [GLSA-202305-16](https://security.gentoo.org/glsa/202305-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22074, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22074 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22074 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 05:25 UTC - **Last Updated**: August 03, 2024 at 03:00 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory Corruption during wma file playback due to integer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables** Affected versions: - APQ8009, APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, CSRB31024, MDM9150, MDM9206, MDM9250, MDM9607, MDM9626, MDM9628, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8937, MSM8953, MSM8996AU, PM8937, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9367, QCA9377, QCA9379, QCM2290, QCM4290, QCM6125, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QRB5165, QRB5165M, QRB5165N, Qualcomm215, SA415M, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD 8cx Gen2, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD675, SD678, SD680, SD690 5G, SD730, SD750G, SD765, SD765G, SD768G, SD780G, SD835, SD855, SD865 5G, SD870, SD888 5G, SDM429W, SDM630, SDW2500, SDX20, SDX24, SDX55, SDX55M, SDX65, SDXR1, SDXR2 5G, SM7250P, SM7450, SM8475, SM8475P, SW5100, S ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/september-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13037 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts(). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23) 2. [](https://support.apple.com/HT208221) 3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971) 4. [](https://github.com/the-tcpdump-group/tcpdump/commit/2c2cfbd2b771ac888bc5c4a6d922f749d3822538) 5. [1039307](http://www.securitytracker.com/id/1039307) 6. [](http://www.tcpdump.org/tcpdump-changes.txt) 7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29063 - **State**: PUBLISHED - **Published Date**: November 24, 2020 at 20:58 UTC - **Last Updated**: August 04, 2024 at 16:48 UTC - **Reserved Date**: November 24, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. A custom encryption algorithm is used to store encrypted passwords. This algorithm will XOR the password with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27844 - **State**: PUBLISHED - **Published Date**: June 10, 2024 at 20:56 UTC - **Last Updated**: March 13, 2025 at 14:47 UTC - **Reserved Date**: February 26, 2024 at 15:32 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved checks. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5. A website's permission dialog may persist after navigation away from the site. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214106) 2. [](https://support.apple.com/en-us/HT214108) 3. [](https://support.apple.com/en-us/HT214103) 4. [](https://support.apple.com/kb/HT214106) 5. [](https://support.apple.com/kb/HT214103) 6. [](https://support.apple.com/kb/HT214108) 7. [](http://seclists.org/fulldisclosure/2024/Jun/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46234 - **State**: PUBLISHED - **Published Date**: October 26, 2023 at 14:31 UTC - **Last Updated**: February 13, 2025 at 17:14 UTC - **Reserved Date**: October 19, 2023 at 20:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-347: Security Weakness ### Affected Products **browserify - browserify-sign** Affected versions: - >= 2.6.0, <= 4.2.1 (Status: affected) ### References 1. [https://github.com/browserify/browserify-sign/security/advisories/GHSA-x9w5-v3q2-3rhw](https://github.com/browserify/browserify-sign/security/advisories/GHSA-x9w5-v3q2-3rhw) 2. [https://github.com/browserify/browserify-sign/commit/85994cd6348b50f2fd1b73c54e20881416f44a30](https://github.com/browserify/browserify-sign/commit/85994cd6348b50f2fd1b73c54e20881416f44a30) 3. [](https://lists.debian.org/debian-lts-announce/2023/10/msg00040.html) 4. [](https://www.debian.org/security/2023/dsa-5539) 5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/) 6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4502 - **State**: PUBLISHED - **Published Date**: July 23, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 11:20 UTC - **Reserved Date**: June 20, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1) large or (2) negative value in the Extranonc2_size parameter in a mining.subscribe response and a crafted mining.notify request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [68831](http://www.securityfocus.com/bid/68831) 2. [](https://github.com/luke-jr/bfgminer/commit/ff7f30129f15f7a2213f8ced0cd65c9a331493d9) 3. [](https://github.com/sgminer-dev/sgminer/commit/bac5831b355f916e0696b7bbcccfc51c057b729a) 4. [](https://github.com/sgminer-dev/sgminer/issues/258) 5. [20140722 CVE-2014-4502 : Invalid Handling of Length Parameter in Stratum mining.notify Message Leads to Heap Overflow](http://seclists.org/fulldisclosure/2014/Jul/119) 6. [](https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb00272e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0420 - **State**: PUBLISHED - **Published Date**: April 24, 2023 at 18:30 UTC - **Last Updated**: February 04, 2025 at 18:44 UTC - **Reserved Date**: January 20, 2023 at 08:51 UTC - **Assigned By**: WPScan ### Vulnerability Description The Custom Post Type and Taxonomy GUI Manager WordPress plugin through 1.1 does not have CSRF, and is lacking sanitising as well as escaping in some parameters, allowing attackers to make a logged in admin put Stored Cross-Site Scripting payloads via CSRF ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) - CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - Custom Post Type and Taxonomy GUI Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/266e417f-ece7-4ff5-a724-4d9c8e2f3faa) ### Credits - Shreya Pohekar - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1462 - **State**: PUBLISHED - **Published Date**: February 03, 2015 at 16:00 UTC - **Last Updated**: August 06, 2024 at 04:47 UTC - **Reserved Date**: February 03, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201512-08](https://security.gentoo.org/glsa/201512-08) 2. [openSUSE-SU-2015:0285](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html) 3. [1031672](http://securitytracker.com/id/1031672) 4. [FEDORA-2015-1437](http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148950.html) 5. [](http://blog.clamav.net/2015/01/clamav-0986-has-been-released.html) 6. [SUSE-SU-2015:0298](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html) 7. [FEDORA-2015-1461](http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148958.html) 8. [62536](http://secunia.com/advisories/62536)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39739 - **State**: PUBLISHED - **Published Date**: October 24, 2023 at 00:00 UTC - **Last Updated**: September 12, 2024 at 15:51 UTC - **Reserved Date**: August 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The leakage of the client secret in REGINA SWEETS&BAKERY Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39739.md) 2. [](https://liff.line.me/1656985266-EmlxqQQx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2973 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: July 31, 2011 at 00:00 UTC - **Assigned By**: sgi ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44209 - **State**: PUBLISHED - **Published Date**: October 04, 2023 at 19:44 UTC - **Last Updated**: September 19, 2024 at 15:31 UTC - **Reserved Date**: September 26, 2023 at 20:08 UTC - **Assigned By**: Acronis ### Vulnerability Description Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29051. ### Weakness Classification (CWE) - CWE-610: Security Weakness ### Affected Products **Acronis - Acronis Agent** Affected versions: - unspecified (Status: affected) ### References 1. [SEC-2119](https://security-advisory.acronis.com/advisories/SEC-2119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11425 - **State**: PUBLISHED - **Published Date**: January 17, 2025 at 09:00 UTC - **Last Updated**: February 12, 2025 at 17:09 UTC - **Reserved Date**: November 19, 2024 at 15:35 UTC - **Assigned By**: schneider ### Vulnerability Description CWE-131: Incorrect Calculation of Buffer Size vulnerability exists that could cause Denial-of-Service of the product when an unauthenticated user is sending a crafted HTTPS packet to the webserver. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-131: Security Weakness ### Affected Products **Schneider Electric - Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety)** Affected versions: - Versions prior to SV4.30 (Status: affected) **Schneider Electric - Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)** Affected versions: - Versions prior to SV4.21 (Status: affected) **Schneider Electric - BMENOR2200H** Affected versions: - All Versions (Status: affected) **Schneider Electric - EVLink Pro AC** Affected versions: - Versions prior to v1.3.10 (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-01.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20049 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 17:02 UTC - **Last Updated**: August 03, 2024 at 01:55 UTC - **Reserved Date**: October 12, 2021 at 00:00 UTC - **Assigned By**: MediaTek ### Vulnerability Description In vpu, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05954679; Issue ID: ALPS05954679. ### Affected Products **MediaTek, Inc. - MT6779, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8788** Affected versions: - Android 10.0, 11.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/March-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3661 - **State**: PUBLISHED - **Published Date**: December 21, 2011 at 02:00 UTC - **Last Updated**: August 06, 2024 at 23:46 UTC - **Reserved Date**: September 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=691299) 2. [MDVSA-2011:192](http://www.mandriva.com/security/advisories?name=MDVSA-2011:192) 3. [47334](http://secunia.com/advisories/47334) 4. [1026447](http://www.securitytracker.com/id?1026447) 5. [1026446](http://www.securitytracker.com/id?1026446) 6. [49055](http://secunia.com/advisories/49055) 7. [1026445](http://www.securitytracker.com/id?1026445) 8. [firefox-yarr-dos(71909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71909) 9. [oval:org.mitre.oval:def:14424](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14424) 10. [](http://www.mozilla.org/security/announce/2011/mfsa2011-54.html) 11. [47302](http://secunia.com/advisories/47302) 12. [openSUSE-SU-2012:0039](http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html) 13. [openSUSE-SU-2012:0007](http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43567 - **State**: PUBLISHED - **Published Date**: November 04, 2022 at 22:21 UTC - **Last Updated**: May 05, 2025 at 20:34 UTC - **Reserved Date**: October 20, 2022 at 18:37 UTC - **Assigned By**: Splunk ### Vulnerability Description In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Splunk - Splunk Enterprise** Affected versions: - 8.1 (Status: affected) - 8.2 (Status: affected) - 9.0 (Status: affected) ### References 1. [](https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html) 2. [](https://research.splunk.com/application/baa41f09-df48-4375-8991-520beea161be/) ### Credits - Danylo Dmytriiev (DDV_UA)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8192 - **State**: PUBLISHED - **Published Date**: October 17, 2019 at 20:19 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-49.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27727, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27727 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27727 - **State**: PUBLISHED - **Published Date**: April 09, 2023 at 00:00 UTC - **Last Updated**: February 12, 2025 at 16:13 UTC - **Reserved Date**: March 05, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/nginx/njs/issues/617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21093, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21093 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21093 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 21:26 UTC - **Last Updated**: November 06, 2024 at 15:07 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.22 and 21.3-21.13. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Oracle Corporation - Database - Enterprise Edition** Affected versions: - 19.3 (Status: affected) - 21.3 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4331 - **State**: PUBLISHED - **Published Date**: December 17, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:38 UTC - **Reserved Date**: December 17, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in merchant.ihtml in iHTML Merchant Version 2 Pro allows remote attackers to execute arbitrary SQL commands via the (1) step, (2) id, and (3) pid parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15911](http://www.securityfocus.com/bid/15911) 2. [21808](http://www.osvdb.org/21808) 3. [18089](http://secunia.com/advisories/18089) 4. [](http://pridels0.blogspot.com/2005/12/ihtml-merchant-version-2-pro-sql-inj.html) 5. [ADV-2005-2967](http://www.vupen.com/english/advisories/2005/2967)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26756, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26756 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26756 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 17:00 UTC - **Last Updated**: May 04, 2025 at 08:55 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this case 'MD_RECOVERY_RUNNING' is set directly, however, there is no guarantee that md_do_sync() will be executed, hence stop_sync_thread() will hang because 'MD_RECOVERY_RUNNING' can't be cleared. Last patch make sure that md_do_sync() will set MD_RECOVERY_DONE, however, following hang can still be triggered by dm-raid test shell/lvconvert-raid-reshape.sh occasionally: [root@fedora ~]# cat /proc/1982/stack [<0>] stop_sync_thread+0x1ab/0x270 [md_mod] [<0>] md_frozen_sync_thread+0x5c/0xa0 [md_mod] [<0>] raid_presuspend+0x1e/0x70 [dm_raid] [<0>] dm_table_presuspend_targets+0x40/0xb0 [dm_mod] [<0>] __dm_destroy+0x2a5/0x310 [dm_mod] [<0>] dm_destroy+0x16/0x30 [dm_mod] [<0>] dev_remove+0x165/0x290 [dm_mod] [<0>] ctl_ioctl+0x4bb/0x7b0 [dm_mod] [<0>] dm_ctl_ioctl+0x11/0x20 [dm_mod] [<0>] vfs_ioctl+0x21/0x60 [<0>] __x64_sys_ioctl+0xb9/0xe0 [<0>] do_syscall_64+0xc6/0x230 [<0>] entry_SYSCALL_64_after_hwframe+0x6c/0x74 Meanwhile mddev->recovery is: MD_RECOVERY_RUNNING | MD_RECOVERY_INTR | MD_RECOVERY_RESHAPE | MD_RECOVERY_FROZEN Fix this problem by remove the code to register sync_thread directly from raid10 and raid5. And let md_check_recovery() to register sync_thread. ### Affected Products **Linux - Linux** Affected versions: - f67055780caac6a99f43834795c43acf99eba6a6 (Status: affected) - f67055780caac6a99f43834795c43acf99eba6a6 (Status: affected) **Linux - Linux** Affected versions: - 2.6.17 (Status: affected) - 0 (Status: unaffected) - 6.7.7 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/13b520fb62b772e408f9b79c5fe18ad414e90417) 2. [](https://git.kernel.org/stable/c/ad39c08186f8a0f221337985036ba86731d6aafe)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19546, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19546 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19546 - **State**: PUBLISHED - **Published Date**: December 05, 2019 at 17:18 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: December 03, 2019 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Norton Password Manager, prior to 6.6.2.5, may be susceptible to an information disclosure issue, which is a type of vulnerability whereby there is an unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information. ### Affected Products **n/a - Norton Password Manager** Affected versions: - prior to 6.6.2.5 (Status: affected) ### References 1. [](https://support.symantec.com/us/en/article.SYMSA1499.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9735 - **State**: PUBLISHED - **Published Date**: June 16, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 16, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [99104](http://www.securityfocus.com/bid/99104) 2. [[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1](https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E) 3. [[activemq-issues] 20190820 [jira] [Created] (AMQ-7279) Security Vulnerabilities in Libraries - jackson-databind-2.9.8.jar, tomcat-servlet-api-8.0.53.jar, tomcat-websocket-api-8.0.53.jar, zookeeper-3.4.6.jar, guava-18.0.jar, jetty-all-9.2.26.v20180806.jar, scala-library-2.11.0.jar](https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E) 4. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E) 5. [[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E) 6. [[hadoop-common-dev] 20191030 [jira] [Created] (HADOOP-16676) Security Vulnerability for dependency jetty-xml -please upgrade](https://lists.apache.org/thread.html/36870f6c51f5bc25e6f7bb1fcace0e57e81f1524019b11f466738559%40%3Ccommon-dev.hadoop.apache.org%3E) 7. [[hadoop-common-issues] 20191030 [jira] [Created] (HADOOP-16676) Security Vulnerability for dependency jetty-xml -please upgrade](https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a%40%3Ccommon-issues.hadoop.apache.org%3E) 8. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) 9. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 10. [](https://bugs.debian.org/864631) 11. [](https://github.com/eclipse/jetty.project/issues/1556) 12. [[debian-lts-announce] 20210514 [SECURITY] [DLA 2661-1] jetty9 security update](https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html) 13. [](https://www.oracle.com//security-alerts/cpujul2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27626, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27626 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27626 - **State**: PUBLISHED - **Published Date**: October 20, 2022 at 05:50 UTC - **Last Updated**: May 08, 2025 at 13:42 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description A vulnerability regarding concurrent execution using shared resource with improper synchronization ('Race Condition') is found in the session processing functionality of Out-of-Band (OOB) Management. This allows remote attackers to execute arbitrary commands via unspecified vectors. The following models with Synology DiskStation Manager (DSM) versions before 7.1.1-42962-2 may be affected: DS3622xs+, FS3410, and HD6500. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Synology - DiskStation Manager (DSM)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.synology.com/security/advisory/Synology_SA_22_17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6495 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 22:03 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698) 2. [SUSE-SU-2015:0743](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html) 3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html) 4. [70496](http://www.securityfocus.com/bid/70496) 5. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16665 - **State**: PUBLISHED - **Published Date**: November 08, 2017 at 17:00 UTC - **Last Updated**: September 17, 2024 at 00:26 UTC - **Reserved Date**: November 08, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RemObjects Remoting SDK 9 1.0.0.0 for Delphi is vulnerable to a reflected Cross Site Scripting (XSS) attack via the service parameter to the /soap URI, triggering an invalid attempt to generate WSDL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://talk.remobjects.com/t/reflected-cross-site-scripting-xss-vulnerability/14662)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4230 - **State**: PUBLISHED - **Published Date**: July 06, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Memory leak in Cisco Headend System Release allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, aka Bug ID CSCus91854. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032747](http://www.securitytracker.com/id/1032747) 2. [20150629 Cisco Headend System Releases Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39562) 3. [75464](http://www.securityfocus.com/bid/75464)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5272, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5272 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5272 - **State**: PUBLISHED - **Published Date**: September 29, 2023 at 16:31 UTC - **Last Updated**: August 02, 2024 at 07:52 UTC - **Reserved Date**: September 29, 2023 at 06:33 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file edit_parcel.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-240885 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Best Courier Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.240885) 2. [](https://vuldb.com/?ctiid.240885) 3. [](https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%204.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26657, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26657 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26657 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 07:13 UTC - **Last Updated**: April 08, 2025 at 14:50 UTC - **Reserved Date**: February 12, 2025 at 21:05 UTC - **Assigned By**: sap ### Vulnerability Description SAP KMC WPC allows an unauthenticated attacker to remotely retrieve usernames by a simple parameter query which could expose sensitive information causing low impact on confidentiality of the application. This has no effect on integrity and availability. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **SAP_SE - SAP KMC WPC** Affected versions: - KMC-WPC 7.50 (Status: affected) ### References 1. [](https://me.sap.com/notes/3568307) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0077 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:27 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Predictable TCP sequence numbers allow spoofing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [tcp-seq-predict(139)](https://exchange.xforce.ibmcloud.com/vulnerabilities/139)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1350, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1350 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1350 - **State**: PUBLISHED - **Published Date**: July 01, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:34 UTC - **Reserved Date**: January 08, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Settings in Apple iOS before 7.1.2 allows physically proximate attackers to bypass an intended iCloud password requirement, and turn off the Find My iPhone service, by leveraging incorrect state management. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [68276](http://www.securityfocus.com/bid/68276) 2. [APPLE-SA-2014-06-30-3](http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html) 3. [1030500](http://www.securitytracker.com/id/1030500)