System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14658
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: September 21, 2017 at 00:00 UTC
- **Assigned By**: forcepoint
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19447
- **State**: PUBLISHED
- **Published Date**: June 17, 2019 at 19:37 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stack-based buffer overflow can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) 5.4.0.1031 when parsing the URI string. An attacker can leverage this to gain remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32684
- **State**: PUBLISHED
- **Published Date**: June 14, 2021 at 23:05 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, and logs commands, effectively making them unusable. Version 1.5.3 contains patches for the problems.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-670: Security Weakness
### Affected Products
**scandipwa - create-magento-app**
Affected versions:
- >= 1.5.1, <= 1.5.2 (Status: affected)
### References
1. [](https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4)
2. [](https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42417
- **State**: PUBLISHED
- **Published Date**: October 03, 2024 at 22:32 UTC
- **Last Updated**: October 04, 2024 at 14:14 UTC
- **Reserved Date**: October 01, 2024 at 17:18 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script Handler_CFG.ashx. An authenticated attacker may be able to exploit this issue to cause delay in the targeted product.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-277-03)
2. [](https://www.deltaww.com/en-US/Cybersecurity_Advisory)
### Credits
- Michael Heinzl reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21139
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 22:39 UTC
- **Last Updated**: February 10, 2025 at 23:02 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web Answers). Supported versions that are affected are 7.0.0.0.0, 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - Business Intelligence Enterprise Edition**
Affected versions:
- 7.0.0.0.0 (Status: affected)
- 7.6.0.0.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3153
- **State**: PUBLISHED
- **Published Date**: August 27, 2010 at 18:10 UTC
- **Last Updated**: August 07, 2024 at 03:03 UTC
- **Reserved Date**: August 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in Adobe InDesign CS4 6.0, InDesign CS5 7.0.2 and earlier, Adobe InDesign Server CS5 7.0.2 and earlier, and Adobe InCopy CS5 7.0.2 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an .indl, .indp, .indt, or .inx file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adobe.com/support/security/bulletins/apsb10-24.html)
2. [41126](http://secunia.com/advisories/41126)
3. [1024612](http://www.securitytracker.com/id?1024612)
4. [20100825 Adobe InDesign CS4 DLL Hijacking Exploit (ibfs32.dll)](http://www.securityfocus.com/archive/1/513340/100/0/threaded)
5. [14775](http://www.exploit-db.com/exploits/14775/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46335
- **State**: REJECTED
- **Last Updated**: January 05, 2023 at 00:00 UTC
- **Reserved Date**: November 29, 2022 at 00:00 UTC
- **Assigned By**: Proofpoint
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8038
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 19:55 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26934
- **State**: PUBLISHED
- **Published Date**: May 10, 2022 at 20:33 UTC
- **Last Updated**: January 02, 2025 at 18:57 UTC
- **Reserved Date**: March 11, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Graphics Component Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [Windows Graphics Component Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26934) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8827
- **State**: PUBLISHED
- **Published Date**: May 08, 2017 at 06:10 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
forgotpassword.php in GeniXCMS 1.0.2 lacks a rate limit, which might allow remote attackers to cause a denial of service (login inability) or possibly conduct Arbitrary User Password Reset attacks via a series of requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/semplon/GeniXCMS/issues/75) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4696
- **State**: PUBLISHED
- **Published Date**: January 18, 2011 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 03:02 UTC
- **Reserved Date**: January 18, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Joomla! 1.5.x before 1.5.22 allow remote attackers to execute arbitrary SQL commands via the (1) filter_order or (2) filter_order_Dir parameter in a com_contact action to index.php, a different vulnerability than CVE-2010-4166. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20101112 CVE request: Joomla 1.5.21 SQL Injection and Information Disclosure](http://openwall.com/lists/oss-security/2010/11/12/5)
2. [](http://developer.joomla.org/security/news/9-security/10-core-security/323-20101101-core-sqli-info-disclosurevulnerabilities.html)
3. [42133](http://secunia.com/advisories/42133)
4. [[oss-security] 20101112 Re: CVE request: Joomla 1.5.21 SQL Injection and Information Disclosure](http://openwall.com/lists/oss-security/2010/11/12/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20148
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 15:58 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware **
Affected versions:
- n/a (Status: affected)
### References
1. [20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1563
- **State**: PUBLISHED
- **Published Date**: May 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:51 UTC
- **Reserved Date**: May 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bugzilla 2.10 through 2.18, 2.19.1, and 2.19.2 displays a different error message depending on whether a product exists or not, which allows remote attackers to determine hidden products.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CLSA-2005:1040](http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=001040)
2. [](http://www.bugzilla.org/security/2.16.8/)
3. [20050512 Security Advisory for Bugzilla 2.18, 2.19.2, and 2.16.8](http://marc.info/?l=bugtraq&m=111592031902962&w=2)
4. [ADV-2005-0533](http://www.vupen.com/english/advisories/2005/0533)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=287109)
6. [13606](http://www.securityfocus.com/bid/13606)
7. [15338](http://secunia.com/advisories/15338)
8. [16425](http://www.osvdb.org/16425) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7024
- **State**: PUBLISHED
- **Published Date**: September 23, 2024 at 22:47 UTC
- **Last Updated**: September 25, 2024 at 17:48 UTC
- **Reserved Date**: July 23, 2024 at 13:09 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Low)
### Affected Products
**Google - Chrome**
Affected versions:
- 126.0.6478.54 (Status: affected)
### References
1. [](https://issues.chromium.org/issues/334120897) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3106
- **State**: PUBLISHED
- **Published Date**: September 05, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 03:47 UTC
- **Reserved Date**: April 17, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite and Server before 6.20.7 rev18, 6.22.0 before rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allow remote attackers to inject arbitrary web script or HTML via (1) embedded VBScript, (2) object/data Base64 content, (3) a Content-Type header, or (4) UTF-16 encoding, aka Bug IDs 25957, 26237, 26243, and 26244.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130603 Open-Xchange Security Advisory 2013-06-03](http://archives.neohapsis.com/archives/bugtraq/2013-06/0012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2435
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 19:00 UTC
- **Last Updated**: October 02, 2024 at 16:18 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).
### Affected Products
**Oracle Corporation - MySQL Connectors**
Affected versions:
- 8.0.13 and prior (Status: affected)
- 2.1.8 and prior (Status: affected)
### References
1. [106616](http://www.securityfocus.com/bid/106616)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
3. [](https://security.netapp.com/advisory/ntap-20190118-0002/)
4. [openSUSE-SU-2020:0409](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00044.html)
5. [openSUSE-SU-2020:0430](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00053.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6066
- **State**: PUBLISHED
- **Published Date**: December 04, 2012 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 02:32 UTC
- **Reserved Date**: December 04, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
freeSSHd.exe in freeSSHd through 1.2.6 allows remote attackers to bypass authentication via a crafted session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20121201 FreeSSHD Remote Authentication Bypass Zeroday Exploit](http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28578
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 10:48 UTC
- **Last Updated**: August 29, 2024 at 18:23 UTC
- **Reserved Date**: March 17, 2023 at 11:41 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in Core Services while executing the command for removing a single event listener.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 315 5G IoT Modem (Status: affected)
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- AR9380 (Status: affected)
- C-V2X 9150 (Status: affected)
- CSR8811 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- FSM10055 (Status: affected)
- FSM10056 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8064 (Status: affected)
- IPQ8065 (Status: affected)
- IPQ8068 (Status: affected)
- IPQ8070 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- MDM9250 (Status: affected)
- PMP8074 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA0000 (Status: affected)
- QCA4024 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8072 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9377 (Status: affected)
- QCA9886 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCA9980 (Status: affected)
- QCA9984 (Status: affected)
- QCA9985 (Status: affected)
- QCA9986 (Status: affected)
- QCA9990 (Status: affected)
- QCA9992 (Status: affected)
- QCA9994 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM4325 (Status: affected)
- QCM4490 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN5021 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5054 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6100 (Status: affected)
- QCN6102 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN9000 (Status: affected)
- QCN9001 (Status: affected)
- QCN9002 (Status: affected)
- QCN9003 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QCS2290 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS4490 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8250 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8180X+SDX55 (Status: affected)
- SC8380XP (Status: affected)
- SD 455 (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD460 (Status: affected)
- SD626 (Status: affected)
- SD660 (Status: affected)
- SD662 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD730 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SDX71M (Status: affected)
- SG4150P (Status: affected)
- SG8275P (Status: affected)
- SM4125 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM8550P (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Smart Display 200 Platform (APQ5053-AA) (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 625 Mobile Platform (Status: affected)
- Snapdragon 626 Mobile Platform (Status: affected)
- Snapdragon 630 Mobile Platform (Status: affected)
- Snapdragon 636 Mobile Platform (Status: affected)
- Snapdragon 660 Mobile Platform (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 665 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 690 5G Mobile Platform (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 710 Mobile Platform (Status: affected)
- Snapdragon 712 Mobile Platform (Status: affected)
- Snapdragon 720G Mobile Platform (Status: affected)
- Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected)
- Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected)
- Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected)
- Snapdragon 750G 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c Compute Platform (SC7180-AC) (Status: affected)
- Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro" (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon X12 LTE Modem (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X70 Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR1 Platform (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- Snapdragon XR2+ Gen 1 Platform (Status: affected)
- Snapdragon Auto 4G Modem (Status: affected)
- SRV1H (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR1120 (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2230P (Status: affected)
- Vision Intelligence 100 Platform (APQ8053-AA) (Status: affected)
- Vision Intelligence 200 Platform (APQ8053-AC) (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3615 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3999 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32244
- **State**: PUBLISHED
- **Published Date**: April 10, 2025 at 08:09 UTC
- **Last Updated**: April 10, 2025 at 15:45 UTC
- **Reserved Date**: April 04, 2025 at 10:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in QuantumCloud SEO Help allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SEO Help: from n/a through 6.6.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**QuantumCloud - SEO Help**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/seo-help/vulnerability/wordpress-seo-help-plugin-6-6-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31208
- **State**: PUBLISHED
- **Published Date**: July 17, 2022 at 22:36 UTC
- **Last Updated**: August 03, 2024 at 07:11 UTC
- **Reserved Date**: May 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Infiray IRAY-A8Z3 1.0.957. The webserver contains an endpoint that can execute arbitrary commands by manipulating the cmd_string URL parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.infiray.com/infrared-security-database.html)
2. [](https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3393
- **State**: PUBLISHED
- **Published Date**: June 26, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 25, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25833](http://secunia.com/advisories/25833)
2. [wireshark-dhcpbootp-dos(35113)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35113)
3. [25877](http://secunia.com/advisories/25877)
4. [RHSA-2008:0059](http://www.redhat.com/support/errata/RHSA-2008-0059.html)
5. [](http://www.wireshark.org/security/wnpa-sec-2007-02.html)
6. [RHSA-2007:0710](http://www.redhat.com/support/errata/RHSA-2007-0710.html)
7. [26499](http://secunia.com/advisories/26499)
8. [25987](http://secunia.com/advisories/25987)
9. [26004](http://secunia.com/advisories/26004)
10. [GLSA-200708-12](http://security.gentoo.org/glsa/glsa-200708-12.xml)
11. [RHSA-2007:0709](http://www.redhat.com/support/errata/RHSA-2007-0709.html)
12. [MDKSA-2007:145](http://www.mandriva.com/security/advisories?name=MDKSA-2007:145)
13. [22588](http://secunia.com/advisories/22588/)
14. [1018315](http://www.securitytracker.com/id?1018315)
15. [](https://issues.rpath.com/browse/RPL-1498)
16. [24662](http://www.securityfocus.com/bid/24662)
17. [28583](http://secunia.com/advisories/28583)
18. [](http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html)
19. [37639](http://osvdb.org/37639)
20. [ADV-2007-2353](http://www.vupen.com/english/advisories/2007/2353)
21. [DSA-1322](http://www.debian.org/security/2007/dsa-1322)
22. [SUSE-SR:2007:015](http://www.novell.com/linux/security/advisories/2007_15_sr.html)
23. [oval:org.mitre.oval:def:11010](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14724
- **State**: PUBLISHED
- **Published Date**: September 11, 2019 at 11:28 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.851, an insecure object reference allows an attacker to edit an e-mail forwarding destination of a victim's account via an attacker account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://centos-webpanel.com/changelog-cwp7)
2. [](https://packetstormsecurity.com/files/154404/Control-Web-Panel-0.9.8.851-Privilege-Escalation.html)
3. [](https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-14724.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56004
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:13 UTC
- **Last Updated**: December 16, 2024 at 20:05 UTC
- **Reserved Date**: December 14, 2024 at 19:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Alex W Fowler Easy Site Importer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Site Importer: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Alex W Fowler - Easy Site Importer**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/easy-site-importer/vulnerability/wordpress-easy-site-importer-plugin-1-0-1-settings-change-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33235
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 15:44 UTC
- **Reserved Date**: June 14, 2022 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Information disclosure due to buffer over-read in WLAN firmware while parsing security context info attributes. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009 (Status: affected)
- APQ8096AU (Status: affected)
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- AR9380 (Status: affected)
- CSR8811 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- IPQ4018 (Status: affected)
- IPQ4028 (Status: affected)
- IPQ4029 (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5018 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8064 (Status: affected)
- IPQ8069 (Status: affected)
- IPQ8070 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071 (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072 (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074 (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9574 (Status: affected)
- MDM9640 (Status: affected)
- MSM8996AU (Status: affected)
- PMP8074 (Status: affected)
- QAM8295P (Status: affected)
- QCA1062 (Status: affected)
- QCA1064 (Status: affected)
- QCA2062 (Status: affected)
- QCA2064 (Status: affected)
- QCA2065 (Status: affected)
- QCA2066 (Status: affected)
- QCA4020 (Status: affected)
- QCA4024 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6335 (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6428 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6438 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA8072 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCA9379 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCA9898 (Status: affected)
- QCA9980 (Status: affected)
- QCA9984 (Status: affected)
- QCA9990 (Status: affected)
- QCA9992 (Status: affected)
- QCA9994 (Status: affected)
- QCC5100 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCN5021 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5054 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6100 (Status: affected)
- QCN6102 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN7605 (Status: affected)
- QCN7606 (Status: affected)
- QCN9000 (Status: affected)
- QCN9001 (Status: affected)
- QCN9002 (Status: affected)
- QCN9003 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QCS2290 (Status: affected)
- QCS405 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS603 (Status: affected)
- QCS605 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCX315 (Status: affected)
- QRB5165 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QSM8250 (Status: affected)
- QSM8350 (Status: affected)
- SA4150P (Status: affected)
- SA415M (Status: affected)
- SA515M (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SC8180X+SDX55 (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD 8cx Gen2 (Status: affected)
- SD 8cx Gen3 (Status: affected)
- SD460 (Status: affected)
- SD480 (Status: affected)
- SD660 (Status: affected)
- SD662 (Status: affected)
- SD665 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD678 (Status: affected)
- SD680 (Status: affected)
- SD690 5G (Status: affected)
- SD695 (Status: affected)
- SD710 (Status: affected)
- SD712 (Status: affected)
- SD720G (Status: affected)
- SD730 (Status: affected)
- SD750G (Status: affected)
- SD765 (Status: affected)
- SD765G (Status: affected)
- SD768G (Status: affected)
- SD778G (Status: affected)
- SD780G (Status: affected)
- SD7c (Status: affected)
- SD820 (Status: affected)
- SD845 (Status: affected)
- SD850 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SD888 (Status: affected)
- SD888 5G (Status: affected)
- SDX20 (Status: affected)
- SDX20M (Status: affected)
- SDX24 (Status: affected)
- SDX50M (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDX65 (Status: affected)
- SDXR1 (Status: affected)
- SDXR2 5G (Status: affected)
- SM4125 (Status: affected)
- SM4375 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR2150P (Status: affected)
- WCD9326 (Status: affected)
- WCD9330 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3660B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3991 (Status: affected)
- WCN3998 (Status: affected)
- WCN3999 (Status: affected)
- WCN6740 (Status: affected)
- WCN6750 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WCN7850 (Status: affected)
- WCN7851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/december-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29509
- **State**: PUBLISHED
- **Published Date**: July 03, 2024 at 00:00 UTC
- **Last Updated**: March 20, 2025 at 19:06 UTC
- **Reserved Date**: March 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Artifex Ghostscript before 10.03.0 has a heap-based overflow when PDFPassword (e.g., for runpdf) has a \000 byte in the middle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.ghostscript.com/show_bug.cgi?id=707510)
2. [](https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb)
3. [](https://www.openwall.com/lists/oss-security/2024/07/03/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46896
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 00:00 UTC
- **Last Updated**: November 20, 2024 at 20:08 UTC
- **Reserved Date**: July 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in PX4-Autopilot allows attackers to cause a denial of service via handler function handling msgid 332.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PX4/PX4-Autopilot/issues/18369) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16719
- **State**: PUBLISHED
- **Published Date**: September 23, 2019 at 13:35 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WTCMS 1.0 allows index.php?g=admin&m=index&a=index CSRF with resultant XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/344/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0290
- **State**: PUBLISHED
- **Published Date**: May 17, 2018 at 03:00 UTC
- **Last Updated**: November 29, 2024 at 15:09 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the TCP stack of Cisco SocialMiner could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the notification system. The vulnerability is due to faulty handling of new TCP connections to the affected application. An attacker could exploit this vulnerability by sending a malicious TCP packet to the vulnerable service. An exploit could allow the attacker to create a DoS condition by interrupting certain phone services. A manual restart of the service may be required to restore full functionalities. Cisco Bug IDs: CSCvh48368.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**n/a - Cisco SocialMiner Notification System**
Affected versions:
- Cisco SocialMiner Notification System (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-socmin-dos)
2. [104201](http://www.securityfocus.com/bid/104201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8872
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Improper Verification of Cryptographic Signature in AVM FRITZ!Box 6810 LTE after firmware 5.22, FRITZ!Box 6840 LTE after firmware 5.23, and other models with firmware 5.50.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/130040/AVM-FRITZ-Box-Firmware-Signature-Bypass.html)
2. [20150121 [RT-SA-2014-010] AVM FRITZ!Box Firmware Signature Bypass](http://seclists.org/fulldisclosure/2015/Jan/86)
3. [20150121 [RT-SA-2014-010] AVM FRITZ!Box Firmware Signature Bypass](http://www.securityfocus.com/archive/1/534522/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54039
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 20:42 UTC
- **Last Updated**: December 11, 2024 at 14:51 UTC
- **Reserved Date**: November 27, 2024 at 16:21 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Connect**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/connect/apsb24-99.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21552
- **State**: PUBLISHED
- **Published Date**: May 21, 2021 at 20:05 UTC
- **Last Updated**: September 16, 2024 at 23:46 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Wyse Windows Embedded System versions WIE10 LTSC 2019 and earlier contain an improper authorization vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to bypass the restricted environment and perform unauthorized actions on the affected system.
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Dell - Wyse Windows Embedded (WES)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000186134/dsa-2021-096-dell-wyse-windows-embedded-system-security-update-for-an-improper-authorization-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1536
- **State**: PUBLISHED
- **Published Date**: March 30, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Phoetux.net PhxContacts 0.93.1 beta and earlier allow remote attackers to execute arbitrary SQL commands via the (1) motclef and (2) nbr_line_view parameters in (a) carnet.php, and the (3) id_contact parameter in (b) contact_view.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17306](http://www.securityfocus.com/bid/17306)
2. [20060328 PhxContacts <= 0.93.1 beta Multiple SQL injection & xss](http://www.securityfocus.com/archive/1/429259/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5019
- **State**: PUBLISHED
- **Published Date**: June 25, 2024 at 20:29 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 16, 2024 at 15:59 UTC
- **Assigned By**: ProgressSoftware
### Vulnerability Description
In WhatsUp Gold versions released before 2023.1.3,
an unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This vulnerability allows reading of any file with iisapppool\NmConsole privileges.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Progress Software Corporation - WhatsUp Gold**
Affected versions:
- 2023.1.0 (Status: affected)
### References
1. [](https://www.progress.com/network-monitoring)
2. [](https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024)
### Credits
- Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4456
- **State**: PUBLISHED
- **Published Date**: August 21, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 21, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the SimpleFAQ (com_simplefaq) 2.11 component for Mambo allows remote attackers to execute arbitrary SQL commands via the aid parameter. NOTE: it was later reported that 2.40 is also affected, and that the component can be used in Joomla! in addition to Mambo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3041](http://securityreason.com/securityalert/3041)
2. [simplefaq-index-sql-injection(36113)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36113)
3. [26556](http://secunia.com/advisories/26556)
4. [20070820 Joomla Component SimpleFAQ V2.11 - Remote SQL Injection](http://www.securityfocus.com/archive/1/477232/100/0/threaded)
5. [4296](https://www.exploit-db.com/exploits/4296)
6. [25376](http://www.securityfocus.com/bid/25376)
7. [20070820 Mambo Component SimpleFAQ V2.11 - Remote SQL Injection](http://www.securityfocus.com/archive/1/477174/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30279
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 15:52 UTC
- **Last Updated**: June 06, 2025 at 16:36 UTC
- **Reserved Date**: March 20, 2025 at 02:53 UTC
- **Assigned By**: qnap
### Vulnerability Description
An improper certificate validation vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to compromise the security of the system.
We have already fixed the vulnerability in the following version:
File Station 5 5.5.6.4847 and later
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**QNAP Systems Inc. - File Station 5**
Affected versions:
- 5.5.x (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-25-16)
### Credits
- coral |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9760
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:55 UTC
- **Reserved Date**: January 15, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the displayLogin function in html/index.php in GOsa allows remote attackers to inject arbitrary web script or HTML via the username.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97104](http://www.securityfocus.com/bid/97104)
2. [[oss-security] 20160115 Re: Security issues in GOsa](http://www.openwall.com/lists/oss-security/2016/01/15/11)
3. [](https://github.com/gosa-project/gosa-core/commit/e35b990464a2c2cf64d6833a217ed944876e7732) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11077
- **State**: PUBLISHED
- **Published Date**: November 26, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 03:06 UTC
- **Reserved Date**: May 14, 2018 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
'getlogs' utility in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1 and 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 is affected by an OS command injection vulnerability. A malicious Avamar admin user may potentially be able to execute arbitrary commands under root privilege.
### Affected Products
**Dell EMC - Avamar**
Affected versions:
- 7.2.0 (Status: affected)
- 7.2.1 (Status: affected)
- 7.3.0 (Status: affected)
- 7.3.1 (Status: affected)
- 7.4.0 (Status: affected)
- 7.4.1 (Status: affected)
- 7.5.0 (Status: affected)
- 7.5.1 (Status: affected)
- 18.1 (Status: affected)
**Dell EMC - Integrated Data Protection Appliance**
Affected versions:
- 2.0 (Status: affected)
- 2.1 (Status: affected)
- 2.2 (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2018-0029.html)
2. [20181120 DSA-2018-155: Dell EMC Avamar and Integrated Data Protection Appliance Command Injection Vulnerability](https://seclists.org/fulldisclosure/2018/Nov/51)
3. [105971](http://www.securityfocus.com/bid/105971)
4. [1042153](http://www.securitytracker.com/id/1042153) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2206
- **State**: PUBLISHED
- **Published Date**: May 14, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:49 UTC
- **Reserved Date**: May 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Maian Music 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) keywords parameter in a search action to index.php, and the (2) msg_script parameter to admin/inc/footer.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29032](http://www.securityfocus.com/bid/29032)
2. [maian-music-index-footer-xss(42210)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42210)
3. [3884](http://securityreason.com/securityalert/3884)
4. [30066](http://secunia.com/advisories/30066)
5. [20080503 Maian Music v1.1 Multiple Vulnerabilities (Xss/SQL Injection)](http://www.securityfocus.com/archive/1/491590/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3338
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:26 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - Marketing**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95500](http://www.securityfocus.com/bid/95500)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6258
- **State**: PUBLISHED
- **Published Date**: August 02, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [](http://xenbits.xen.org/xsa/advisory-182.html)
3. [](http://xenbits.xen.org/xsa/xsa182-4.6.patch)
4. [](http://support.citrix.com/article/CTX214954)
5. [GLSA-201611-09](https://security.gentoo.org/glsa/201611-09)
6. [](http://xenbits.xen.org/xsa/xsa182-unstable.patch)
7. [](http://xenbits.xen.org/xsa/xsa182-4.5.patch)
8. [DSA-3633](http://www.debian.org/security/2016/dsa-3633)
9. [1036446](http://www.securitytracker.com/id/1036446)
10. [92131](http://www.securityfocus.com/bid/92131) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1010018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1010018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1010018
- **State**: PUBLISHED
- **Published Date**: July 16, 2019 at 12:35 UTC
- **Last Updated**: August 05, 2024 at 03:07 UTC
- **Reserved Date**: March 20, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
Zammad GmbH Zammad 2.3.0 and earlier is affected by: Cross Site Scripting (XSS) - CWE-80. The impact is: Execute java script code on users browser. The component is: web app. The attack vector is: the victim must open a ticket. The fixed version is: 2.3.1, 2.2.2 and 2.1.3.
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**Zammad GmbH - Zammad**
Affected versions:
- ≤ 2.3.0 [fixed: 2.3.1 (Status: affected)
- 2.2.2 and 2.1.3] (Status: affected)
### References
1. [](https://github.com/zammad/zammad/compare/ea50d0c...238784d)
2. [](https://github.com/zammad/zammad/compare/5c983f6...1a9af7d)
3. [](https://github.com/zammad/zammad/issues/1869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37517
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 04, 2024 at 14:07 UTC
- **Reserved Date**: June 09, 2024 at 13:11 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.13.7.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Brainstorm Force - Spectra**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ultimate-addons-for-gutenberg/wordpress-spectra-plugin-2-13-7-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5227
- **State**: PUBLISHED
- **Published Date**: January 28, 2020 at 22:40 UTC
- **Last Updated**: August 04, 2024 at 08:22 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Feedgen (python feedgen) before 0.9.0 is susceptible to XML Denial of Service attacks. The *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to XML Denial of Service Attacks (e.g. XML Bomb). This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only. This problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-776: Security Weakness
### Affected Products
**lkiesow - python-feedgen**
Affected versions:
- < 0.9.0 (Status: affected)
### References
1. [](https://github.com/lkiesow/python-feedgen/security/advisories/GHSA-g8q7-xv52-hf9f)
2. [](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses)
3. [](https://github.com/lkiesow/python-feedgen/commit/f57a01b20fa4aaaeccfa417f28e66b4084b9d0cf)
4. [FEDORA-2020-8493201e90](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6I5ENUYGFNMIH6ZQ62FZ6VU2WD3SIOI/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1708
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting vulnerability (XSS) in BasiliX Webmail 1.10 allows remote attackers to execute arbitrary script as other users by injecting script into the (1) subject or (2) message fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5060](http://www.securityfocus.com/bid/5060)
2. [basilix-webmail-headers-css(9384)](https://exchange.xforce.ibmcloud.com/vulnerabilities/9384)
3. [20020619 [VulnWatch] BasiliX multiple vulnerabilities](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0117.html)
4. [20020618 BasiliX multiple vulnerabilities](http://online.securityfocus.com/archive/1/277710) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1305
- **State**: PUBLISHED
- **Published Date**: June 07, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 13:32 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DOORS Next Generation (DNG/RRC) 6.0.2 and 6.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125459.
### Affected Products
**IBM - Rational DOORS Next Generation**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
### References
1. [98834](http://www.securityfocus.com/bid/98834)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/125459)
3. [](http://www.ibm.com/support/docview.wss?uid=swg22002799) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0347
- **State**: PUBLISHED
- **Published Date**: February 04, 2021 at 17:10 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In ccu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11; Patch ID: ALPS05377188.
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.1, Android-9, Android-10, Android-11 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-acknowledgements) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4265
- **State**: PUBLISHED
- **Published Date**: August 26, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92640](http://www.securityfocus.com/bid/92640)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-16-488)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-26.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000668
- **State**: PUBLISHED
- **Published Date**: September 06, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 04:09 UTC
- **Reserved Date**: September 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
jsish version 2.4.70 2.047 contains a CWE-125: Out-of-bounds Read vulnerability in function jsi_ObjArrayLookup (jsiObj.c:274) that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute crafted javascript code. This vulnerability appears to have been fixed in 2.4.71.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jsish.org/fossil/jsi/tktview?name=9602dbd997) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40041
- **State**: PUBLISHED
- **Published Date**: January 07, 2022 at 22:39 UTC
- **Last Updated**: August 04, 2024 at 02:27 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a Cross-Site Scripting(XSS) vulnerability in HUAWEI WS318n product when processing network settings. Due to insufficient validation of user input, a local authenticated attacker could exploit this vulnerability by injecting special characters. Successful exploit could cause certain information disclosure. Affected product versions include: WS318n-21 10.0.2.2, 10.0.2.5 and 10.0.2.6.
### Affected Products
**n/a - WS318n-21**
Affected versions:
- 10.0.2.2 (Status: affected)
- 10.0.2.5 (Status: affected)
- 10.0.2.6 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211229-01-xss-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15836
- **State**: PUBLISHED
- **Published Date**: August 30, 2019 at 16:08 UTC
- **Last Updated**: August 05, 2024 at 00:56 UTC
- **Reserved Date**: August 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-ultimate-recipe plugin before 3.12.7 for WordPress has stored XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/9394)
2. [](https://wordpress.org/plugins/wp-ultimate-recipe/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36566
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 17:08 UTC
- **Last Updated**: April 14, 2025 at 22:46 UTC
- **Reserved Date**: June 23, 2023 at 20:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Common Data Model SDK Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Microsoft Common Data Model SDK for Java**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Common Data Model SDK for TypeScript**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Common Data Model SDK for Python**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Common Data Model SDK for C#**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Common Data Model SDK Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36566) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1190
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in PHPRecipeBook 1.24 through 2.17 allows remote attackers to inject arbitrary web script or HTML via a recipe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=193940)
2. [2755](http://www.osvdb.org/2755)
3. [phprecipebook-recipe-xss(13574)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13574)
4. [10109](http://secunia.com/advisories/10109)
5. [8963](http://www.securityfocus.com/bid/8963) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38289
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 12:33 UTC
- **Last Updated**: August 04, 2024 at 01:37 UTC
- **Reserved Date**: August 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue has been discovered in Novastar-VNNOX-iCare Novaicare 7.16.0 that gives attacker privilege escalation and allows attackers to view corporate information and SMTP server details, delete users, view roles, and other unspecified impacts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation)
2. [](https://twitter.com/viperbluff/status/1439941380244230150?s=20&t=iPSn8eNxaxUKis5OKSQJRQ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14275
- **State**: PUBLISHED
- **Published Date**: July 31, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 16, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the spawnPageFromTemplate method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6038.
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.1.1049 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-18-735) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31891
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:52 UTC
- **Last Updated**: April 01, 2025 at 15:38 UTC
- **Reserved Date**: April 01, 2025 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gosign Gosign – Posts Slider Block allows Stored XSS. This issue affects Gosign – Posts Slider Block: from n/a through 1.1.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Gosign - Gosign – Posts Slider Block**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/gosign-posts-slider-block/vulnerability/wordpress-gosign-posts-slider-block-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- theviper17 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42586
- **State**: PUBLISHED
- **Published Date**: May 23, 2022 at 10:39 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap buffer overflow was discovered in copy_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LibreDWG/libredwg/issues/350) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9402
- **State**: PUBLISHED
- **Published Date**: September 20, 2019 at 15:12 UTC
- **Last Updated**: August 06, 2024 at 08:51 UTC
- **Reserved Date**: September 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The users-ultra plugin before 1.5.59 for WordPress has uultra-form-cvs-form-conf arbitrary file upload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8243)
2. [](https://wordpress.org/plugins/users-ultra/#developers)
3. [](https://seclists.org/bugtraq/2015/Nov/93) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31759
- **State**: PUBLISHED
- **Published Date**: May 23, 2023 at 00:00 UTC
- **Last Updated**: January 17, 2025 at 20:03 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Weak Security in the 433MHz keyfob of Kerui W18 Alarm System v1.0 allows attackers to gain full access via a code replay attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ashallen.net/wireless-alarm-system-vulnerability-disclosure)
2. [](https://ashallen.net/wireless-alarm-system-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000400
- **State**: PUBLISHED
- **Published Date**: January 26, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:00 UTC
- **Reserved Date**: November 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only lists upstream and downstream projects that the current user has access to.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2017-10-11/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4918
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28029
- **State**: PUBLISHED
- **Published Date**: April 21, 2022 at 19:05 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/classes/Master.php?f=delete_type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5826
- **State**: PUBLISHED
- **Published Date**: November 10, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Texas Imperial Software WFTPD Pro Server 3.23.1.1 allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via crafted APPE commands that contain "/" (slash) or "\" (backslash) characters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20942](http://www.securityfocus.com/bid/20942)
2. [1837](http://securityreason.com/securityalert/1837)
3. [1017173](http://securitytracker.com/id?1017173)
4. [2734](https://www.exploit-db.com/exploits/2734)
5. [20061108 WFTPD Pro Server 3.23 Buffer Overflow](http://marc.info/?l=full-disclosure&m=116295408114746&w=2)
6. [20061107 WFTPD Pro Server 3.23 Buffer Overflow](http://marc.info/?l=full-disclosure&m=116289234522958&w=2)
7. [wftpd-appe-bo(30079)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30079)
8. [20061107 WFTPD Pro Server 3.23 Buffer Overflow](http://www.securityfocus.com/archive/1/450851/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1878
- **State**: PUBLISHED
- **Published Date**: November 02, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 16:23 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Robotic Process Automation with Automation Anywhere 11 could disclose sensitive information in a web request that could aid in future attacks against the system. IBM X-Force ID: 151714.
### Affected Products
**IBM - Robotic Process Automation with Automation Anywhere**
Affected versions:
- 11 (Status: affected)
### References
1. [ibm-rpa-cve20181878-info-disc(151714)](https://exchange.xforce.ibmcloud.com/vulnerabilities/151714)
2. [](https://www.ibm.com/support/docview.wss?uid=ibm10735977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0946
- **State**: PUBLISHED
- **Published Date**: May 08, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 14, 2007 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Unspecified vulnerability in Microsoft Internet Explorer 7 on Windows XP SP2, Windows Server 2003 SP1 or SP2, or Windows Vista allows remote attackers to execute arbitrary code via crafted HTML objects, which results in memory corruption, aka the first of two "HTML Objects Memory Corruption Vulnerabilities" and a different issue than CVE-2007-0947.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBST02214](http://www.securityfocus.com/archive/1/468871/100/200/threaded)
2. [ADV-2007-1712](http://www.vupen.com/english/advisories/2007/1712)
3. [34402](http://www.osvdb.org/34402)
4. [23770](http://www.securityfocus.com/bid/23770)
5. [1018019](http://www.securitytracker.com/id?1018019)
6. [SSRT071422](http://www.securityfocus.com/archive/1/468871/100/200/threaded)
7. [MS07-027](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027)
8. [23769](http://secunia.com/advisories/23769)
9. [ie-html-memory-code-execution(33255)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33255)
10. [TA07-128A](http://www.us-cert.gov/cas/techalerts/TA07-128A.html)
11. [oval:org.mitre.oval:def:1441](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1441) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32715
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 16:53 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 17, 2024 at 10:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Olive Themes Olive One Click Demo Import.This issue affects Olive One Click Demo Import: from n/a through 1.1.1.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Olive Themes - Olive One Click Demo Import**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/olive-one-click-demo-import/wordpress-olive-one-click-demo-import-plugin-1-1-1-arbitrary-file-download-vulnerability?_s_id=cve)
### Credits
- Yudistira Arya (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2164
- **State**: PUBLISHED
- **Published Date**: June 22, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Kjtechforce mailman beta1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via (1) the code parameter to activate.php or (2) the dest parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8884](https://www.exploit-db.com/exploits/8884)
2. [8885](https://www.exploit-db.com/exploits/8885)
3. [20090605 ('dest') Blind (SQLi) EXPLOIT --Kjtechforce mailman Beta-1 -->](http://www.securityfocus.com/archive/1/504136/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2018
- **State**: PUBLISHED
- **Published Date**: May 13, 2020 at 19:07 UTC
- **Last Updated**: September 16, 2024 at 23:50 UTC
- **Reserved Date**: December 04, 2019 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama's management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.12; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Palo Alto Networks - PAN-OS**
Affected versions:
- 8.0.* (Status: affected)
- 7.1 (Status: affected)
- 8.1 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://security.paloaltonetworks.com/CVE-2020-2018)
### Credits
- This issue was found by Ben Nott of Palo Alto Networks during internal security review. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7004
- **State**: PUBLISHED
- **Published Date**: August 19, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Electronic Logbook (ELOG) before 2.7.1 has unknown impact and attack vectors, possibly related to elog.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://midas.psi.ch/elog/download/ChangeLog)
2. [ADV-2008-0265](http://www.vupen.com/english/advisories/2008/0265)
3. [elog-elogc-bo(39903)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39903)
4. [41684](http://www.osvdb.org/41684) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3845
- **State**: PUBLISHED
- **Published Date**: April 26, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:31 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
In Hyland Perceptive Document Filters 11.4.0.2647 - x86/x64 Windows/Linux, a crafted OpenDocument document can lead to a SkCanvas object double free resulting in direct code execution.
### Affected Products
**Hyland Software, Inc. - Perceptive Document Filters**
Affected versions:
- 11.4.0.2647 - x86/x64 Windows/Linux (Status: affected)
### References
1. [104023](http://www.securityfocus.com/bid/104023)
2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0528) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30728
- **State**: REJECTED
- **Published Date**: April 10, 2024 at 00:00 UTC
- **Last Updated**: May 27, 2024 at 00:14 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0159
- **State**: PUBLISHED
- **Published Date**: April 14, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-777-1](https://usn.ubuntu.com/777-1/)
2. [oval:org.mitre.oval:def:9634](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9634)
3. [35137](http://secunia.com/advisories/35137)
4. [34608](http://secunia.com/advisories/34608)
5. [35166](http://secunia.com/advisories/35166)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=490617)
7. [](http://support.apple.com/kb/HT3549)
8. [37471](http://secunia.com/advisories/37471)
9. [DSA-1801](http://www.debian.org/security/2009/dsa-1801)
10. [FEDORA-2009-5275](https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01449.html)
11. [35308](http://secunia.com/advisories/35308)
12. [](http://bugs.pardus.org.tr/show_bug.cgi?id=9532)
13. [35253](http://secunia.com/advisories/35253)
14. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html)
15. [35074](http://secunia.com/advisories/35074)
16. [34481](http://www.securityfocus.com/bid/34481)
17. [35138](http://secunia.com/advisories/35138)
18. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html)
19. [oval:org.mitre.oval:def:8386](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8386)
20. [SSA:2009-154-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.566238)
21. [SSRT101144](http://marc.info/?l=bugtraq&m=136482797910018&w=2)
22. [FEDORA-2009-5273](https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01414.html)
23. [SUSE-SR:2009:011](http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html)
24. [oval:org.mitre.oval:def:19392](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19392)
25. [35630](http://secunia.com/advisories/35630)
26. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded)
27. [ntp-cookedprint-bo(49838)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49838)
28. [53593](http://osvdb.org/53593)
29. [1022033](http://www.securitytracker.com/id?1022033)
30. [oval:org.mitre.oval:def:8665](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8665)
31. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html)
32. [RHSA-2009:1651](https://rhn.redhat.com/errata/RHSA-2009-1651.html)
33. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297)
34. [oval:org.mitre.oval:def:5411](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5411)
35. [RHSA-2009:1040](http://rhn.redhat.com/errata/RHSA-2009-1040.html)
36. [MDVSA-2009:092](http://www.mandriva.com/security/advisories?name=MDVSA-2009:092)
37. [35416](http://secunia.com/advisories/35416)
38. [](https://support.ntp.org/bugs/show_bug.cgi?id=1144)
39. [HPSBUX02859](http://marc.info/?l=bugtraq&m=136482797910018&w=2)
40. [35336](http://secunia.com/advisories/35336)
41. [NetBSD-SA2009-006](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-006.txt.asc)
42. [RHSA-2009:1039](http://rhn.redhat.com/errata/RHSA-2009-1039.html)
43. [35169](http://secunia.com/advisories/35169)
44. [GLSA-200905-08](http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml)
45. [ADV-2009-0999](http://www.vupen.com/english/advisories/2009/0999)
46. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316)
47. [](http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&REV=1.1565) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1067
- **State**: PUBLISHED
- **Published Date**: May 11, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1045, CVE-2016-1046, CVE-2016-1047, CVE-2016-1048, CVE-2016-1049, CVE-2016-1050, CVE-2016-1051, CVE-2016-1052, CVE-2016-1053, CVE-2016-1054, CVE-2016-1055, CVE-2016-1056, CVE-2016-1057, CVE-2016-1058, CVE-2016-1059, CVE-2016-1060, CVE-2016-1061, CVE-2016-1065, CVE-2016-1066, CVE-2016-1068, CVE-2016-1069, CVE-2016-1070, CVE-2016-1075, CVE-2016-1094, CVE-2016-1121, CVE-2016-1122, CVE-2016-4102, and CVE-2016-4107.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [90512](http://www.securityfocus.com/bid/90512)
2. [1035828](http://www.securitytracker.com/id/1035828)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-16-315)
4. [](https://helpx.adobe.com/security/products/acrobat/apsb16-14.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-10040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-10040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-10040
- **State**: PUBLISHED
- **Published Date**: January 13, 2023 at 19:22 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: January 13, 2023 at 19:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in gitlearn. It has been declared as problematic. This vulnerability affects the function getGrade/getOutOf of the file scripts/config.sh of the component Escape Sequence Handler. The manipulation leads to injection. The attack can be initiated remotely. The patch is identified as 3faa5deaa509012069afe75cd03c21bda5050a64. It is recommended to apply a patch to fix this issue. VDB-218302 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**n/a - gitlearn**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.218302)
2. [](https://vuldb.com/?ctiid.218302)
3. [](https://github.com/mikeizbicki/gitlearn/pull/31)
4. [](https://github.com/mikeizbicki/gitlearn/commit/3faa5deaa509012069afe75cd03c21bda5050a64)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5039
- **State**: PUBLISHED
- **Published Date**: November 12, 2008 at 20:18 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the League module for PHP-Nuke, possibly 2.4, allows remote attackers to inject arbitrary web script or HTML via the tid parameter in a team action to modules.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31952](http://www.securityfocus.com/bid/31952)
2. [4575](http://securityreason.com/securityalert/4575)
3. [nukeleague-module-sql-injection(46154)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46154)
4. [20081028 PHP-Nuke Module League (team&tid) XSS Vulnerability](http://www.securityfocus.com/archive/1/497855/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0025
- **State**: PUBLISHED
- **Published Date**: March 10, 2021 at 15:52 UTC
- **Last Updated**: August 04, 2024 at 05:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In deletePackageVersionedInternal of PackageManagerService.java, there is a possible way to exit Screen Pinning due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-135604684
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4107
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16248
- **State**: PUBLISHED
- **Published Date**: June 20, 2019 at 15:46 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
b3log Solo 2.9.3 has XSS in the Input page under the "Publish Articles" menu with an ID of "articleTags" stored in the "tag" JSON field, which allows remote attackers to inject arbitrary Web scripts or HTML via a carefully crafted site name in an admin-authenticated HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/b3log/solo/issues/12489) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21003
- **State**: PUBLISHED
- **Published Date**: June 03, 2021 at 14:00 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pbootcms v2.0.3 is vulnerable to Cross Site Scripting (XSS) via admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Computer2200/-/issues/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33764
- **State**: PUBLISHED
- **Published Date**: June 01, 2023 at 00:00 UTC
- **Last Updated**: January 09, 2025 at 17:41 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eMedia Consulting simpleRedak up to v2.47.23.05 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component #/de/casting/show/detail/<ID>.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29058
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 02:53 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Qimou CMS v.3.34.0 allows a remote attacker to execute arbitrary code via the upgrade.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.wjlin0.com/halo-img/74CMSv3.34.0%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.zip) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39861
- **State**: PUBLISHED
- **Published Date**: September 29, 2021 at 15:40 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb21-55.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3669
- **State**: PUBLISHED
- **Published Date**: July 10, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in the Innovasys DockStudioXP InnovaDSXP2.OCX ActiveX Control have unspecified attack vectors and impact, including a denial of service via "improper use" of the SaveToFile function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43960](http://osvdb.org/43960)
2. [20070707 [Eleytt] 7LIPIEC2007](http://www.securityfocus.com/archive/1/473187)
3. [24834](http://www.securityfocus.com/bid/24834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3264
- **State**: PUBLISHED
- **Published Date**: September 25, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1472.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT100720](http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03489683)
2. [SSRT100715](http://marc.info/?l=bugtraq&m=134825051608877&w=2)
3. [HPSBMU02815](http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03489683) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6709
- **State**: PUBLISHED
- **Published Date**: December 23, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:34 UTC
- **Reserved Date**: December 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in MGinternet Property Site Manager allow remote attackers to execute arbitrary SQL commands via the (1) p parameter to (a) detail.asp; the (2) l, (3) typ, or (4) loc parameter to (b) listings.asp; or the (5) Password or (6) Username parameter to (c) admin_login.asp. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061114 Property Site Manager [login bypass ,multiples injection sql & xss (get)]](http://www.securityfocus.com/archive/1/451565)
2. [21073](http://www.securityfocus.com/bid/21073)
3. [propertysite-adminlogin-sql-injection(30289)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30289)
4. [2078](http://securityreason.com/securityalert/2078)
5. [propertysite-listings-sql-injection(30291)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2226
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:58 UTC
- **Last Updated**: August 01, 2024 at 19:03 UTC
- **Reserved Date**: March 06, 2024 at 15:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the id parameter in the google-map block in all versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access and higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**themeisle - Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/217d3148-d411-4fff-a4f6-d5d02ef207af?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3050429/otter-blocks)
### Credits
- Ngô Thiên An |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6304
- **State**: PUBLISHED
- **Published Date**: March 06, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 17:38 UTC
- **Reserved Date**: October 31, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [65929](http://www.securityfocus.com/bid/65929)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21666093)
3. [ibm-algo-cve20136304-dir-traversal(88535)](https://exchange.xforce.ibmcloud.com/vulnerabilities/88535) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7637
- **State**: PUBLISHED
- **Published Date**: February 08, 2019 at 11:00 UTC
- **Last Updated**: August 04, 2024 at 20:54 UTC
- **Reserved Date**: February 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html)
2. [[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html)
3. [](https://bugzilla.libsdl.org/show_bug.cgi?id=4497)
4. [](https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720)
5. [openSUSE-SU-2019:1213](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html)
6. [openSUSE-SU-2019:1223](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html)
7. [openSUSE-SU-2019:1261](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html)
8. [openSUSE-SU-2019:1632](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00081.html)
9. [openSUSE-SU-2019:1633](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00071.html)
10. [USN-4143-1](https://usn.ubuntu.com/4143-1/)
11. [USN-4156-1](https://usn.ubuntu.com/4156-1/)
12. [USN-4156-2](https://usn.ubuntu.com/4156-2/)
13. [[debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update](https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html)
14. [[debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update](https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html)
15. [FEDORA-2020-24652fe41c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/)
16. [[debian-lts-announce] 20211031 [SECURITY] [DLA 2803-1] libsdl2 security update](https://lists.debian.org/debian-lts-announce/2021/10/msg00031.html)
17. [[debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update](https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23095
- **State**: REJECTED
- **Last Updated**: December 30, 2022 at 00:00 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53206
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 13:49 UTC
- **Last Updated**: May 04, 2025 at 13:00 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix use-after-free of nreq in reqsk_timer_handler().
The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with
__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().
Then, oreq should be passed to reqsk_put() instead of req; otherwise
use-after-free of nreq could happen when reqsk is migrated but the
retry attempt failed (e.g. due to timeout).
Let's pass oreq to reqsk_put().
### Affected Products
**Linux - Linux**
Affected versions:
- 8459d61fbf24967839a70235165673148c7c7f17 (Status: affected)
- 5071beb59ee416e8ab456ac8647a4dabcda823b1 (Status: affected)
- 997ae8da14f1639ce6fb66a063dab54031cd61b3 (Status: affected)
- 51e34db64f4e43c7b055ccf881b7f3e0c31bb26d (Status: affected)
- e8c526f2bdf1845bedaf6a478816a3d06fa78b8f (Status: affected)
- e8c526f2bdf1845bedaf6a478816a3d06fa78b8f (Status: affected)
- 106e457953315e476b3642ef24be25ed862aaba3 (Status: affected)
- c964bf65f80a14288d767023a1b300b30f5b9cd0 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.12 (Status: affected)
- 0 (Status: unaffected)
- 5.15.174 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2dcc86fefe09ac853158afd96b60d544af115dc5)
2. [](https://git.kernel.org/stable/c/9a3c1ad93e6fba67b3a637cfa95a57a6685e4908)
3. [](https://git.kernel.org/stable/c/65ed89cad1f57034c256b016e89e8c0a4ec7c65b)
4. [](https://git.kernel.org/stable/c/d0eb14cb8c08b00c36a3d5dc57a6f428b301f721)
5. [](https://git.kernel.org/stable/c/6d845028609a4af0ad66f499ee0bd5789122b067)
6. [](https://git.kernel.org/stable/c/c31e72d021db2714df03df6c42855a1db592716c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6191
- **State**: PUBLISHED
- **Published Date**: November 30, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Armin Burger p.mapper 3.2.0 beta3 allow remote attackers to execute arbitrary PHP code via a URL in the _SESSION[PM_INCPHP] parameter to (1) incphp/globals.php or (2) plugins/export/mc_table.php. NOTE: it could be argued that this vulnerability is caused by a problem in PHP and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in p.mapper.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26614](http://www.securityfocus.com/bid/26614)
2. [pmapper-sessionpmincphp-file-include(38732)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38732)
3. [27876](http://secunia.com/advisories/27876)
4. [](http://www.packetstormsecurity.org/0711-exploits/pmapper-rfi.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32876
- **State**: PUBLISHED
- **Published Date**: January 02, 2024 at 02:49 UTC
- **Last Updated**: June 03, 2025 at 14:46 UTC
- **Reserved Date**: May 16, 2023 at 03:04 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.
### Affected Products
**MediaTek, Inc. - MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798**
Affected versions:
- Android 11.0, 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/January-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11526
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 18:48 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Softing uaGate SI 1.60.01. A maintenance script, that is executable via sudo, is vulnerable to file path injection. This enables the Attacker to write files with superuser privileges in specific locations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.mioso.com/CVE-2019-11526-en.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24750
- **State**: PUBLISHED
- **Published Date**: December 21, 2021 at 08:45 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - WP Visitor Statistics (Real Time Traffic)**
Affected versions:
- 4.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de)
2. [](https://plugins.trac.wordpress.org/changeset/2622268)
3. [](http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0483
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 19:31 UTC
- **Last Updated**: January 15, 2025 at 20:06 UTC
- **Reserved Date**: January 15, 2025 at 12:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Fanli2012 native-php-cms 1.0 and classified as problematic. This vulnerability affects unknown code of the file /fladmin/jump.php. The manipulation of the argument message/error leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**Fanli2012 - native-php-cms**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-291928 | Fanli2012 native-php-cms jump.php cross site scripting](https://vuldb.com/?id.291928)
2. [VDB-291928 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.291928)
3. [Submit #475240 | Fanli2012 native-php-cms 1.0 reflection XSS](https://vuldb.com/?submit.475240)
4. [](https://github.com/Fanli2012/native-php-cms/issues/5)
5. [](https://github.com/Fanli2012/native-php-cms/issues/5#issue-2769894596)
### Credits
- LVZC (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5092
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A use-after-free vulnerability can occur when the thread for a Web Worker is freed from memory prematurely instead of from memory in the main thread while cancelling fetch operations. This vulnerability affects Firefox < 58.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [1040270](http://www.securitytracker.com/id/1040270)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1418074)
3. [USN-3544-1](https://usn.ubuntu.com/3544-1/)
4. [102786](http://www.securityfocus.com/bid/102786)
5. [](https://www.mozilla.org/security/advisories/mfsa2018-02/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3992
- **State**: PUBLISHED
- **Published Date**: December 01, 2021 at 10:45 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: November 21, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
kimai2 is vulnerable to Improper Access Control
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**kevinpapst - kevinpapst/kimai2**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93)
2. [](https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30783
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:54 UTC
- **Last Updated**: March 27, 2025 at 18:56 UTC
- **Reserved Date**: March 26, 2025 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in jgwhite33 WP Google Review Slider allows SQL Injection. This issue affects WP Google Review Slider: from n/a through 16.0.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**jgwhite33 - WP Google Review Slider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-google-places-review-slider/vulnerability/wordpress-wp-google-review-slider-plugin-16-0-csrf-to-sql-injection-vulnerability?_s_id=cve)
### Credits
- astra.r3verii (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36037
- **State**: PUBLISHED
- **Published Date**: August 29, 2022 at 17:35 UTC
- **Last Updated**: April 23, 2025 at 17:47 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
kirby is a content management system (CMS) that adapts to many different projects and helps you build your own ideal interface. Cross-site scripting (XSS) is a type of vulnerability that allows execution of any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. If bad actors gain access to your group of authenticated Panel users they can escalate their privileges via the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. The multiselect field allows selection of tags from an autocompleted list. Unfortunately, the Panel in Kirby 3.5 used HTML rendering for the raw option value. This allowed **attackers with influence on the options source** to store HTML code. The browser of the victim who visited a page with manipulated multiselect options in the Panel will then have rendered this malicious HTML code when the victim opened the autocomplete dropdown. Users are *not* affected by this vulnerability if you don't use the multiselect field or don't use it with options that can be manipulated by attackers. The problem has been patched in Kirby 3.5.8.1.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**getkirby - kirby**
Affected versions:
- < 3.5.8.1 (Status: affected)
### References
1. [](https://github.com/getkirby/kirby/security/advisories/GHSA-3f89-869f-5w76)
2. [](https://github.com/getkirby/kirby/commit/b5b8863885e17556abc070dde1e20aec15fbfdf5)
3. [](https://github.com/getkirby/kirby/releases/tag/3.5.8.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33807
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 15:51 UTC
- **Last Updated**: February 13, 2025 at 15:52 UTC
- **Reserved Date**: April 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in /model/get_teacher_timetable.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the grade parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2019.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1654
- **State**: PUBLISHED
- **Published Date**: March 24, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: March 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Ne7sshSftp::addOpenHandle function in ne7ssh_sftp.cpp in NetSieben SSH Library (ne7ssh) before 1.2.1 allows user-assisted remote SFTP servers to cause a denial of service (crash) or possibly execute arbitrary code via multiple file transfers, related to multiple open file handles in SFTP (1) put and (2) get operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ne7ssh-addopenhandle-bo(33504)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33504)
2. [43555](http://osvdb.org/43555)
3. [](http://netsieben.com/files/CHANGELOG) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.