System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5935
- **State**: PUBLISHED
- **Published Date**: May 17, 2019 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to bypass access restriction to change user information without access privileges via the Item function of User Information.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 4.0.0 to 4.10.1 (Status: affected)
### References
1. [](http://jvn.jp/en/jp/JVN58849431/index.html)
2. [](https://kb.cybozu.support/article/35497/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29004
- **State**: PUBLISHED
- **Published Date**: May 23, 2022 at 15:38 UTC
- **Last Updated**: August 03, 2024 at 06:10 UTC
- **Reserved Date**: April 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Diary Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name parameter in search-result.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://phpgurukul.com)
2. [](https://phpgurukul.com/e-diary-management-system-using-php-and-mysql/)
3. [](https://github.com/sudoninja-noob/CVE-2022-29004/blob/main/CVE-2022-29004.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1008
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0889, CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0988, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4014
- **State**: PUBLISHED
- **Published Date**: January 14, 2009 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 09, 2008 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33525](http://secunia.com/advisories/33525)
2. [ADV-2009-0115](http://www.vupen.com/english/advisories/2009/0115)
3. [](http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html)
4. [1021572](http://www.securitytracker.com/id?1021572)
5. [33177](http://www.securityfocus.com/bid/33177) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4168
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 13:20 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**star7th - star7th/showdoc**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c)
2. [](https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0447
- **State**: PUBLISHED
- **Published Date**: June 20, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 19, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Custom HTTP Errors capability in Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute script in the Local Zone via an argument to shdocvw.dll that causes a "javascript:" link to be generated.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030617 Script Injection to Custom HTTP Errors in Local Zone (GM#014-IE)](http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/005763.html)
2. [20030617 Script Injection to Custom HTTP Errors in Local Zone (GM#014-IE)](http://marc.info/?l=bugtraq&m=105585933614773&w=2)
3. [](http://security.greymagic.com/adv/gm014-ie/)
4. [20030617 Script Injection to Custom HTTP Errors in Local Zone (GM#014-IE)](http://marc.info/?l=ntbugtraq&m=105585142406147&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1174
- **State**: PUBLISHED
- **Published Date**: March 31, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: March 30, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Web Services Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 and 7.0 before 7.0.0.3 has an unspecified "security problem" in the XML digital-signature specification, which has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34506](http://www.securityfocus.com/bid/34506)
2. [35301](http://secunia.com/advisories/35301)
3. [34131](http://secunia.com/advisories/34131)
4. [34461](http://secunia.com/advisories/34461)
5. [](http://www-01.ibm.com/support/docview.wss?uid=swg27006876)
6. [](http://www-01.ibm.com/support/docview.wss?uid=swg21384925)
7. [ADV-2009-1464](http://www.vupen.com/english/advisories/2009/1464)
8. [](http://www-01.ibm.com/support/docview.wss?uid=swg27014463)
9. [PK80596](http://www-01.ibm.com/support/docview.wss?uid=swg1PK80596) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2868
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:09 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Human Resources component of Oracle E-Business Suite (subcomponent: General Utilities). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Human Resources accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Human Resources**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
- 12.2.7 (Status: affected)
### References
1. [1040694](http://www.securitytracker.com/id/1040694)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
3. [103837](http://www.securityfocus.com/bid/103837) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3956
- **State**: PUBLISHED
- **Published Date**: July 24, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 24, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38595](http://osvdb.org/38595)
2. [4205](https://www.exploit-db.com/exploits/4205)
3. [24977](http://www.securityfocus.com/bid/24977)
4. [26141](http://secunia.com/advisories/26141)
5. [teamspeak-login-dos(35518)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35518) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31705
- **State**: PUBLISHED
- **Published Date**: April 29, 2024 at 00:00 UTC
- **Last Updated**: August 20, 2024 at 17:05 UTC
- **Reserved Date**: April 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Infotel Conseil GLPI v.10.X.X and after allows a remote attacker to execute arbitrary code via the insufficient validation of user-supplied input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/V3locidad/GLPI_POC_Plugins_Shell)
2. [](https://seclists.org/fulldisclosure/2024/Apr/23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7908
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 21:25 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify product information.
### Affected Products
**n/a - Magento 2**
Affected versions:
- Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 (Status: affected)
### References
1. [](https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6836
- **State**: PUBLISHED
- **Published Date**: January 01, 2007 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 17:39 UTC
- **Reserved Date**: January 01, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in osp-cert in IBM OS/400 V5R3M0 have unspecified impact and attack vectors, related to ASN.1 parsing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22978](http://secunia.com/advisories/22978)
2. [MA29469](http://www-1.ibm.com/support/search.wss?rs=0&q=MA29469&apar=only)
3. [](http://www-1.ibm.com/support/docview.wss?uid=nas38b2ee8e7abe99d0b86256eb600477b8c)
4. [21189](http://www.securityfocus.com/bid/21189) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41596
- **State**: PUBLISHED
- **Published Date**: October 04, 2021 at 16:48 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 24, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://suitecrm.com)
2. [](https://github.com/salesagility/SuiteCRM)
3. [](https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_33)
4. [](https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_22)
5. [](https://github.com/ach-ing/cves/blob/main/CVE-2021-41596.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32749
- **State**: PUBLISHED
- **Published Date**: June 08, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 20:44 UTC
- **Reserved Date**: May 15, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pydio Cells allows users by default to create so-called external users in order to share files with them. By modifying the HTTP request sent when creating such an external user, it is possible to assign the new user arbitrary roles. By assigning all roles to a newly created user, access to all cells and non-personal workspaces is granted.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses)
2. [20230530 [RT-SA-2023-003] Pydio Cells: Unauthorised Role Assignments](http://seclists.org/fulldisclosure/2023/May/18)
3. [](http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html)
4. [](https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1690
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 19:42 UTC
- **Last Updated**: October 08, 2024 at 16:17 UTC
- **Reserved Date**: December 02, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows WalletService Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [Windows WalletService Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1690) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17265
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: September 20, 2018 at 00:00 UTC
- **Assigned By**: cspcert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32881
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 19:52 UTC
- **Reserved Date**: April 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. By default, the GID is the user's phone number unless they specifically opt out. A phone number is very sensitive information because it can be tied back to individuals. The app does not encrypt the GID in messages.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gotenna.com)
2. [](https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27211
- **State**: PUBLISHED
- **Published Date**: May 21, 2021 at 12:04 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nordic Semiconductor nRF52840 devices through 2020-10-19 have improper protection against physical side channels. The flash read-out protection (APPROTECT) can be bypassed by injecting a fault during the boot phase.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.aisec.fraunhofer.de/en/FirmwareProtection.html)
2. [](https://eprint.iacr.org/2021/640)
3. [](https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/)
4. [](https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf)
5. [](https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16826
- **State**: REJECTED
- **Last Updated**: December 02, 2022 at 00:00 UTC
- **Reserved Date**: September 24, 2019 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43051
- **State**: PUBLISHED
- **Published Date**: December 14, 2021 at 19:20 UTC
- **Last Updated**: September 16, 2024 at 21:09 UTC
- **Reserved Date**: October 27, 2021 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious custom API clients with network access to execute internal API operations outside of the scope of those granted to it. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Server: versions 10.10.6 and below, TIBCO Spotfire Server: versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1, and TIBCO Spotfire Server: versions 11.5.0 and 11.6.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**TIBCO Software Inc. - TIBCO Spotfire Server**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO Spotfire Server**
Affected versions:
- 11.0.0 (Status: affected)
- 11.1.0 (Status: affected)
- 11.2.0 (Status: affected)
- 11.3.0 (Status: affected)
- 11.4.0 (Status: affected)
- 11.4.1 (Status: affected)
**TIBCO Software Inc. - TIBCO Spotfire Server**
Affected versions:
- 11.5.0 (Status: affected)
- 11.6.0 (Status: affected)
### References
1. [](https://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2021/12/tibco-security-advisory-december-14-2021-tibco-spotfire-server-2021-43051) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7275
- **State**: PUBLISHED
- **Published Date**: December 20, 2016 at 05:54 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 mishandles library loading, which allows local users to gain privileges via a crafted application, aka "Microsoft Office OLE DLL Side Loading Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-148](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-148)
2. [1037441](http://www.securitytracker.com/id/1037441)
3. [94665](http://www.securityfocus.com/bid/94665) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6237
- **State**: PUBLISHED
- **Published Date**: April 14, 2020 at 18:36 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions, SAP Business Objects Business Intelligence Platform, version 4.1, 4.2, dswsbobje web application allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure.
### Affected Products
**SAP SE - SAP Business Objects Business Intelligence Platform**
Affected versions:
- < 4.1 (Status: affected)
- < 4.2 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202)
2. [](https://launchpad.support.sap.com/#/notes/2898077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2315
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 13:48 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability.
### Affected Products
**Juniper Networks - Junos OS on EX series Ethernet Switches with IPv6 enabled**
Affected versions:
- 12.3 prior to 12.3R12-S4, 12.3R13 (Status: affected)
- 13.3 prior to 13.3R10 (Status: affected)
- 14.1 prior to 14.1R8-S3, 14.1R9 (Status: affected)
- 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40 (Status: affected)
- 14.1X55 prior to 14.1X55-D35 (Status: affected)
- 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8 (Status: affected)
- 15.1 prior to 15.1R5 (Status: affected)
- 16.1 before 16.1R3 (Status: affected)
- 16.2 before 16.2R1-S3, 16.2R2 (Status: affected)
- 17.1R1 and all subsequent releases have a resolution for this vulnerability (Status: affected)
### References
1. [1038253](http://www.securitytracker.com/id/1038253)
2. [97615](http://www.securityfocus.com/bid/97615)
3. [](https://kb.juniper.net/JSA10781) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20447
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 19:22 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: February 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jobberbase 2.0 has SQL injection via the PATH_INFO to the jobs-in endpoint.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/47311)
2. [](https://packetstormsecurity.com/files/152503/Jobberbase-CMS-2.0-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34507
- **State**: PUBLISHED
- **Published Date**: May 05, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in includes/CommentFormatter/CommentParser.php in MediaWiki before 1.39.7, 1.40.x before 1.40.3, and 1.41.x before 1.41.1. XSS can occur because of mishandling of the 0x1b character, as demonstrated by Special:RecentChanges#%1b0000000.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T355538)
2. [FEDORA-2024-2c564b942d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4376
- **State**: PUBLISHED
- **Published Date**: December 21, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 21, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the daintree_sna_read function in the Daintree SNA file parser in Wireshark 1.2.0 through 1.2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4022)
2. [37916](http://secunia.com/advisories/37916)
3. [oval:org.mitre.oval:def:16435](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16435)
4. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4294)
5. [37842](http://secunia.com/advisories/37842)
6. [ADV-2009-3596](http://www.vupen.com/english/advisories/2009/3596)
7. [61177](http://osvdb.org/61177)
8. [FEDORA-2009-13592](https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01248.html)
9. [37407](http://www.securityfocus.com/bid/37407)
10. [1023374](http://www.securitytracker.com/id?1023374)
11. [](http://www.wireshark.org/security/wnpa-sec-2009-09.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5248
- **State**: PUBLISHED
- **Published Date**: June 30, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: June 03, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The StopProxy command in LSC.Services.SystemService in Lenovo Solution Center before 3.3.003 allows local users to terminate arbitrary processes via the PID argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/len_7814)
2. [](https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-012/?fid=8073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0725
- **State**: PUBLISHED
- **Published Date**: August 20, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: July 22, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [win-ntfs-bypass-auditing(9869)](http://www.iss.net/security_center/static/9869.php)
2. [5484](http://www.securityfocus.com/bid/5484)
3. [A081602-1](http://www.atstake.com/research/advisories/2000/a081602-1.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1216
- **State**: PUBLISHED
- **Published Date**: March 09, 2008 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Lotus Quickr 8.0 server, and possibly QuickPlace 7.x, does not properly identify URIs containing cross-site scripting (XSS) attack strings, which allows remote attackers to inject arbitrary web script or HTML via a Calendar OpenDocument action to main.nsf with a Count parameter containing a JavaScript event in a malformed element, as demonstrated by an onload event in an IFRAME element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3721](http://securityreason.com/securityalert/3721)
2. [27925](http://www.securityfocus.com/bid/27925)
3. [29072](http://secunia.com/advisories/29072)
4. [20080222 IBM Quickr 8 Calendar Xss Injection (Bypass Quickr 8.0 Xss Filter)](http://www.securityfocus.com/archive/1/488620/100/100/threaded)
5. [ADV-2008-0667](http://www.vupen.com/english/advisories/2008/0667) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0328
- **State**: PUBLISHED
- **Published Date**: April 05, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 13:03 UTC
- **Reserved Date**: November 23, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
An information disclosure vulnerability in the NVIDIA crypto driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel 3.10. Android ID: A-33898322. References: N-CVE-2017-0328.
### Affected Products
**Nvidia Corporation - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
### References
1. [97347](http://www.securityfocus.com/bid/97347)
2. [](https://source.android.com/security/bulletin/2017-04-01.html)
3. [1038201](http://www.securitytracker.com/id/1038201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12067
- **State**: PUBLISHED
- **Published Date**: June 25, 2018 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The sell function of a smart contract implementation for Substratum (SUB), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://peckshield.com/2018/06/11/tradeTrap/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14988
- **State**: PUBLISHED
- **Published Date**: March 11, 2021 at 18:07 UTC
- **Last Updated**: August 04, 2024 at 13:00 UTC
- **Reserved Date**: June 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows XSS in the login page via the loginmessage parameter, the text editor via the src attribute of HTML elements, the translations menu via the foldername parameter, the author page via the link URL, or the upload image functionality via an SVG document containing JavaScript.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://tvrbk.github.io/cve/2021/03/09/brXM.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44794
- **State**: PUBLISHED
- **Published Date**: January 27, 2022 at 12:27 UTC
- **Last Updated**: September 16, 2024 at 18:48 UTC
- **Reserved Date**: December 10, 2021 at 00:00 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Kron - Single Connect**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-22-0093)
### Credits
- Gokhan SAHIN |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1837
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:43 UTC
- **Reserved Date**: June 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The getAlbumToDisplay function in idsShared.pm for Image Display System (IDS) 0.81 allows remote attackers to determine the existence of arbitrary directories via ".." sequences in the album parameter, which generates different error messages depending on whether the directory exists or not.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ids-dir-existence(9201)](http://www.iss.net/security_center/static/9201.php)
2. [20020528 Information Disclosure Vulnerability in IDS 0.8x](http://online.securityfocus.com/archive/1/274433)
3. [4870](http://www.securityfocus.com/bid/4870)
4. [](http://ids.sourceforge.net/ChangeLog.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3169
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 17:00 UTC
- **Last Updated**: April 03, 2025 at 17:38 UTC
- **Reserved Date**: April 03, 2025 at 08:04 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Projeqtor up to 12.0.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /tool/saveAttachment.php. The manipulation of the argument attachmentFiles leads to unrestricted upload. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 12.0.3 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains, that "this vulnerability can be exploited only on not securely installed instances, as it is adviced during product install: attachment directory should be out of web reach, so that even if executable file can be uploaded, it cannot be executed through the web."
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**n/a - Projeqtor**
Affected versions:
- 12.0.0 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.2 (Status: affected)
### References
1. [VDB-303128 | Projeqtor saveAttachment.php unrestricted upload](https://vuldb.com/?id.303128)
2. [VDB-303128 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.303128)
3. [Submit #543250 | Projeqtor 12.0.2 Improper Input Validation](https://vuldb.com/?submit.543250)
4. [](https://github.com/deadmilkman/cve-reports/blob/main/01-projeqtor-rce/readme.md)
5. [](https://github.com/deadmilkman/cve-reports/blob/main/01-projeqtor-rce/readme.md#proof-of-concept-poc)
### Credits
- deadmilkman (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6578
- **State**: PUBLISHED
- **Published Date**: February 02, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 06:10 UTC
- **Reserved Date**: February 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection exists in the JE PayperVideo 3.0.0 component for Joomla! via the usr_plan parameter in a view=myplans&task=myplans.usersubscriptions request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43948](https://www.exploit-db.com/exploits/43948) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2526
- **State**: PUBLISHED
- **Published Date**: May 22, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 17:51 UTC
- **Reserved Date**: May 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in index.php in PHP Easy Galerie 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the includepath parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20245](http://secunia.com/advisories/20245)
2. [ADV-2006-1932](http://www.vupen.com/english/advisories/2006/1932)
3. [phpeasygalerie-index-file-include(26602)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26602)
4. [936](http://securityreason.com/securityalert/936)
5. [18060](http://www.securityfocus.com/bid/18060)
6. [20060521 PHP Easy Galerie Index.PHP Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/434695/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6009
- **State**: PUBLISHED
- **Published Date**: June 15, 2024 at 15:31 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 14, 2024 at 15:44 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268699.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**itsourcecode - Event Calendar**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-268699 | itsourcecode Event Calendar process.php regDelete sql injection](https://vuldb.com/?id.268699)
2. [VDB-268699 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.268699)
3. [Submit #357243 | itsourcecode Event Calendar In PHP 1.0 SQL Injection](https://vuldb.com/?submit.357243)
4. [](https://github.com/AutoZhou1/cve/issues/1)
### Credits
- Code099 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3418
- **State**: PUBLISHED
- **Published Date**: August 15, 2019 at 14:44 UTC
- **Last Updated**: August 04, 2024 at 19:12 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: zte
### Vulnerability Description
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by cross-site scripting vulnerability (XSS). Due to incomplete input validation, an authorized user can exploit this vulnerability to execute malicious scripts.
### Affected Products
**ZTE - ZXHN F670**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010163) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45886
- **State**: PUBLISHED
- **Published Date**: March 13, 2022 at 01:30 UTC
- **Last Updated**: August 04, 2024 at 04:54 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PONTON X/P Messenger before 3.11.2. Anti-CSRF tokens are globally valid, making the web application vulnerable to a weakened version of CSRF, where an arbitrary token of a low-privileged user (such as operator) can be used to confirm actions of higher-privileged ones (such as xpadmin).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ponton.de/products/xpmessenger/)
2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-080.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15709
- **State**: PUBLISHED
- **Published Date**: June 01, 2020 at 18:37 UTC
- **Last Updated**: October 25, 2024 at 14:01 UTC
- **Reserved Date**: August 27, 2019 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.
### Affected Products
**n/a - Fortinet FortiAP-S/W2, FortiAP-U**
Affected versions:
- FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-19-298) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3280
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:25 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: JSON). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.12 and prior (Status: affected)
### References
1. [1041888](http://www.securitytracker.com/id/1041888)
2. [105607](http://www.securityfocus.com/bid/105607)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
4. [](https://security.netapp.com/advisory/ntap-20181018-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30225
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 22:37 UTC
- **Last Updated**: January 02, 2025 at 19:24 UTC
- **Reserved Date**: May 03, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30225) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0383
- **State**: PUBLISHED
- **Published Date**: January 19, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 12:19 UTC
- **Reserved Date**: January 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WDaemon 9.5.4 allows remote attackers to access the /WorldClient.dll URI on TCP port 3000, which has unknown impact. NOTE: The researcher reports that the vendor response was "this is not a security bug.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070118 The vulnerabilities festival !](http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html)
2. [34661](http://osvdb.org/34661)
3. [](http://www.hackers.ir/advisories/festival.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32218
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 18:28 UTC
- **Last Updated**: May 22, 2025 at 18:27 UTC
- **Reserved Date**: June 01, 2022 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An information disclosure vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to the actionLinkHandler method was found to allow Message ID Enumeration with Regex MongoDB queries.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Rocket.chat**
Affected versions:
- Fixed in 4.7.5, 4.8.2 and 5.0> (Status: affected)
### References
1. [](https://hackerone.com/reports/1406953) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1154
- **State**: PUBLISHED
- **Published Date**: February 10, 2025 at 19:31 UTC
- **Last Updated**: February 12, 2025 at 15:49 UTC
- **Reserved Date**: February 10, 2025 at 07:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in xxyopen Novel up to 3.4.1. Affected by this issue is some unknown functionality of the file /api/front/search/books. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**xxyopen - Novel**
Affected versions:
- 3.4.0 (Status: affected)
- 3.4.1 (Status: affected)
### References
1. [VDB-295058 | xxyopen Novel books sql injection](https://vuldb.com/?id.295058)
2. [VDB-295058 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295058)
3. [Submit #492531 | xxyopen https://github.com/201206030/novel <= 3.4.1 SQL Injection](https://vuldb.com/?submit.492531)
4. [](https://gist.github.com/GSBP0/9d26bf092647018e39eb515fb6c1eb0a)
### Credits
- GSBP (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5076
- **State**: PUBLISHED
- **Published Date**: October 16, 2012 at 21:29 UTC
- **Last Updated**: February 10, 2025 at 19:53 UTC
- **Reserved Date**: September 22, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2012:1398](http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html)
2. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
3. [RHSA-2012:1386](http://rhn.redhat.com/errata/RHSA-2012-1386.html)
4. [RHSA-2012:1391](http://rhn.redhat.com/errata/RHSA-2012-1391.html)
5. [51029](http://secunia.com/advisories/51029)
6. [51390](http://secunia.com/advisories/51390)
7. [RHSA-2012:1467](http://rhn.redhat.com/errata/RHSA-2012-1467.html)
8. [oval:org.mitre.oval:def:16641](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16641)
9. [](http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html)
10. [51326](http://secunia.com/advisories/51326) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4545
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4034
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:52 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 22, 2024 at 18:06 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Virtue theme for WordPress is vulnerable to Stored Cross-Site Scripting via a Post Author's name in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping when the latest posts feature is enabled on the homepage. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**britner - Virtue**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d8272233-afb3-46f1-ab85-189a3923e29d?source=cve)
2. [](https://themes.trac.wordpress.org/browser/virtue/3.4.8/templates/home/blog-home.php#L87)
3. [](https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=225592%40virtue&new=225592%40virtue&sfp_email=&sfph_mail=#file18)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25287
- **State**: PUBLISHED
- **Published Date**: June 02, 2021 at 15:13 UTC
- **Last Updated**: August 03, 2024 at 19:56 UTC
- **Reserved Date**: January 17, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode)
2. [](https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470)
3. [FEDORA-2021-77756994ba](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/)
4. [GLSA-202107-33](https://security.gentoo.org/glsa/202107-33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1425
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 18:53 UTC
- **Last Updated**: August 04, 2024 at 18:20 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when Visual Studio fails to properly validate hardlinks while extracting archived files, aka 'Visual Studio Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Microsoft Visual Studio 2017**
Affected versions:
- version 15.9 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019**
Affected versions:
- 16.0 (Status: affected)
- 16.3 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1425) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47318
- **State**: PUBLISHED
- **Published Date**: January 17, 2023 at 00:00 UTC
- **Last Updated**: April 04, 2025 at 15:54 UTC
- **Reserved Date**: December 28, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
### Affected Products
**ruby-git - ruby-git**
Affected versions:
- versions prior to v1.13.0 (Status: affected)
### References
1. [](https://github.com/ruby-git/ruby-git)
2. [](https://github.com/ruby-git/ruby-git/pull/602)
3. [](https://jvn.jp/en/jp/JVN16765254/index.html)
4. [FEDORA-2023-e3985c2b3b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/)
5. [[debian-lts-announce] 20230130 [SECURITY] [DLA 3303-1] ruby-git security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14967
- **State**: PUBLISHED
- **Published Date**: December 20, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 19:42 UTC
- **Reserved Date**: October 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In IKARUS anti.virus before 2.16.18, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x83000080.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.greyhathacker.net/?p=995) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26968
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:17 UTC
- **Last Updated**: April 17, 2025 at 15:49 UTC
- **Reserved Date**: February 17, 2025 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in webbernaut Cloak Front End Email allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cloak Front End Email: from n/a through 1.9.5.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**webbernaut - Cloak Front End Email**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cloak-front-end-email/vulnerability/wordpress-cloak-front-end-email-1-9-5-broken-access-control-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2573
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mysql-udf-directory-traversal(21738)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21738)
2. [20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions](http://marc.info/?l=bugtraq&m=112360618320729&w=2)
3. [](http://www.appsecinc.com/resources/alerts/mysql/2005-001.html)
4. [](http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA)
5. [20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions](http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html)
6. [](http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20114
- **State**: PUBLISHED
- **Published Date**: November 04, 2024 at 01:48 UTC
- **Last Updated**: March 13, 2025 at 14:37 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09037038; Issue ID: MSV-1714.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**MediaTek, Inc. - MT6765, MT6768, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8188, MT8195**
Affected versions:
- Android 12.0, 13.0, 14.0, 15.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/November-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23158
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 10:28 UTC
- **Reserved Date**: January 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in Art Gallery Management System Project v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the message parameter on the enquiry page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip)
2. [](https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/)
3. [](https://github.com/y0gesh-verma/CVE/blob/main/CVE-2023-23158/CVE-2023-23158.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9015
- **State**: PUBLISHED
- **Published Date**: February 22, 2019 at 16:00 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Path Traversal vulnerability was discovered in MOPCMS through 2018-11-30, leading to deletion of unexpected critical files. The exploitation point is in the "column management" function. The path added to the column is not verified. When a column is deleted by an attacker, the corresponding directory is deleted, as demonstrated by ./ to delete the entire web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yangsuda/mopcms/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21165
- **State**: PUBLISHED
- **Published Date**: February 16, 2024 at 18:33 UTC
- **Last Updated**: August 26, 2024 at 18:06 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In DevmemIntUnmapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2024-01-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27919
- **State**: PUBLISHED
- **Published Date**: March 25, 2022 at 19:55 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gradle Enterprise before 2022.1 allows remote code execution if the installation process did not specify an initial configuration file. The configuration allows certain anonymous access to administration and an API.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.gradle.com/advisory/2022-05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38615
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 16:22 UTC
- **Last Updated**: August 03, 2024 at 11:02 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SmartVista SVFE2 v2.2.22 was discovered to contain multiple SQL injection vulnerabilities via the UserForm:j_id88, UserForm:j_id90, and UserForm:j_id92 parameters at /SVFE2/pages/feegroups/service_group.jsf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bpcbt.com)
2. [](http://smartvista.com)
3. [](https://tf1t.gitbook.io/mycve/smartvista/smartvista-svfe2/sql-injection-in-service-group-feature-of-smartvista-svfe2-version-2.2.22-cve-2022-38615) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30986
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:51 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A device configuration issue was addressed with an updated configuration. This issue is fixed in macOS Monterey 12.1. A device may be passively tracked by its Bluetooth MAC address.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212978) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0143
- **State**: PUBLISHED
- **Published Date**: February 11, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: January 04, 2010 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Unspecified vulnerability in the administrative interface in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65921.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080b17904.html)
2. [38525](http://secunia.com/advisories/38525)
3. [20100210 Multiple Vulnerabilities in Cisco IronPort Encryption Appliance](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b17903.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10126
- **State**: PUBLISHED
- **Published Date**: January 10, 2017 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: January 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Splunk Web in Splunk Enterprise 5.0.x before 5.0.17, 6.0.x before 6.0.13, 6.1.x before 6.1.12, 6.2.x before 6.2.12, 6.3.x before 6.3.8, and 6.4.x before 6.4.4 allows remote attackers to conduct HTTP request injection attacks and obtain sensitive REST API authentication-token information via unspecified vectors, aka SPL-128840.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.splunk.com/view/SP-CAAAPSR)
2. [95412](http://www.securityfocus.com/bid/95412) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22129
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 03:40 UTC
- **Last Updated**: August 01, 2024 at 22:35 UTC
- **Reserved Date**: January 05, 2024 at 10:21 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Companion - version <3.1.38, has a URL with parameter that could be vulnerable to XSS attack. The attacker could send a malicious link to a user that would possibly allow an attacker to retrieve the sensitive information and cause minor impact on the integrity of the web application.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SAP_SE - SAP Companion**
Affected versions:
- <3.1.38 (Status: affected)
### References
1. [](https://me.sap.com/notes/3404025)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5023
- **State**: PUBLISHED
- **Published Date**: December 29, 2011 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 00:23 UTC
- **Reserved Date**: December 28, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Pligg CMS 1.1.4 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the search program, a different vulnerability than CVE-2011-3986.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sitewat.ch/Advisory/View/6)
2. [](http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2257)
3. [51274](http://www.securityfocus.com/bid/51274) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8718
- **State**: PUBLISHED
- **Published Date**: October 13, 2017 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 22:14 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Microsoft JET Database Engine in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to take control of an affected system, due to how it handles objects in memory, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8717.
### Affected Products
**Microsoft Corporation - Microsoft JET Database Engine**
Affected versions:
- Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8718)
2. [101162](http://www.securityfocus.com/bid/101162)
3. [1039527](http://www.securitytracker.com/id/1039527) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8180
- **State**: REJECTED
- **Published Date**: April 09, 2021 at 16:16 UTC
- **Last Updated**: April 09, 2021 at 16:16 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39907
- **State**: PUBLISHED
- **Published Date**: December 08, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 15:11 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Integer overflow vulnerability in Samsung decoding library for video thumbnails prior to SMR Dec-2022 Release 1 allows local attacker to perform Out-Of-Bounds Write.
### CVSS Metrics
- **CVSS Base Score**: 6.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Q(10) and R(11) OS with libsadapter, S(12) and T(13) OS with libsthmbcadapter (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2340
- **State**: PUBLISHED
- **Published Date**: April 03, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 12, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the XCloner plugin before 3.1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that create website backups via a request to wp-admin/plugins.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32701](http://www.exploit-db.com/exploits/32701)
2. [66280](http://www.securityfocus.com/bid/66280)
3. [](https://www.htbridge.com/advisory/HTB23206)
4. [57362](http://secunia.com/advisories/57362)
5. [20140402 Сross-Site Request Forgery (CSRF) in XCloner Wordpress Plugin](http://www.securityfocus.com/archive/1/531712/100/0/threaded)
6. [](http://wordpress.org/plugins/xcloner-backup-and-restore/changelog/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17648
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Entrepreneur Dating Script 2.0.1 has SQL Injection via the search_result.php marital, gender, country, or profileid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43278](https://www.exploit-db.com/exploits/43278) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3302
- **State**: PUBLISHED
- **Published Date**: October 25, 2022 at 00:00 UTC
- **Last Updated**: May 09, 2025 at 19:02 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.185.1 does not validate ids before using them in a SQL statement, which could lead to SQL injection exploitable by high privilege users such as admin
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - Spam protection, AntiSpam, FireWall by CleanTalk**
Affected versions:
- 5.185.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b)
### Credits
- Nguyen Duy Quoc Khanh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7220
- **State**: PUBLISHED
- **Published Date**: December 16, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Buffer overflow in the XDRBuffer::grow function in js/src/vm/Xdr.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1178033)
2. [](http://www.mozilla.org/security/announce/2015/mfsa2015-144.html)
3. [GLSA-201512-10](https://security.gentoo.org/glsa/201512-10)
4. [openSUSE-SU-2015:2353](http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html)
5. [openSUSE-SU-2016:0308](http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html)
6. [FEDORA-2015-7ab3d3afcf](http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html)
7. [USN-2833-1](http://www.ubuntu.com/usn/USN-2833-1)
8. [](https://hg.mozilla.org/mozilla-central/rev/e4b9e72f934f)
9. [79280](http://www.securityfocus.com/bid/79280)
10. [openSUSE-SU-2016:0307](http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html)
11. [FEDORA-2015-51b1105902](http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html)
12. [1034426](http://www.securitytracker.com/id/1034426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40476
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:11 UTC
- **Last Updated**: September 18, 2024 at 18:29 UTC
- **Reserved Date**: August 14, 2023 at 21:06 UTC
- **Assigned By**: zdi
### Vulnerability Description
GStreamer H265 Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the parsing of H265 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-21768.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**GStreamer - GStreamer**
Affected versions:
- 1.22.4 and 8dddb9ad2009705dfc3e50d59d7c56fc7314cfc3 (Status: affected)
### References
1. [ZDI-23-1458](https://www.zerodayinitiative.com/advisories/ZDI-23-1458/)
2. [vendor-provided URL](https://gstreamer.freedesktop.org/security/sa-2023-0008.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0770
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: October 12, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in GuildFTPd Server 0.97 allows remote attacker to execute arbitrary code via a long SITE command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS](http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html)
2. [guildftpd-site-bo(6612)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6612)
3. [](http://www.nitrolic.com/help/history.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36151
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:32 UTC
- **Last Updated**: August 04, 2024 at 00:47 UTC
- **Reserved Date**: July 05, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
### Affected Products
**Apache Software Foundation - Apache Gobblin**
Affected versions:
- Apache Gobblin (Status: affected)
### References
1. [](https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0)
### Credits
- Apache Gobblin would like to thank Jonathan Leitschuh for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8929
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 25, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Kenexa LMS on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
### Affected Products
**IBM Corporation - Kenexa LMS on Cloud**
Affected versions:
- 13.0 (Status: affected)
- 13.1 (Status: affected)
- 13.2 (Status: affected)
- 13.2.2 (Status: affected)
- 13.2.3 (Status: affected)
- 13.2.4 (Status: affected)
- 14.0.0 (Status: affected)
- 14.1.0 (Status: affected)
- 14.2.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21992072)
2. [95437](http://www.securityfocus.com/bid/95437) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23692
- **State**: PUBLISHED
- **Published Date**: May 31, 2024 at 09:36 UTC
- **Last Updated**: February 13, 2025 at 17:39 UTC
- **Reserved Date**: January 19, 2024 at 17:35 UTC
- **Assigned By**: VulnCheck
### Vulnerability Description
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1336: Security Weakness
### Affected Products
**Rejetto - HTTP File Server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://vulncheck.com/advisories/rejetto-unauth-rce)
2. [](https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/)
3. [](https://github.com/rapid7/metasploit-framework/pull/19240)
### Credits
- Arseniy Sharoglazov |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25126
- **State**: REJECTED
- **Last Updated**: February 03, 2023 at 00:00 UTC
- **Reserved Date**: February 02, 2023 at 00:00 UTC
- **Assigned By**: Gallagher
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4798, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4798 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4798
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 13, 2011 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4100
- **State**: PUBLISHED
- **Published Date**: November 01, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 27, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Insight Control Performance Management before 6.1 update 2 allows remote attackers to read arbitrary files via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44583](http://www.securityfocus.com/bid/44583)
2. [hp-performance-info-disclosure(62883)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62883)
3. [HPSBMA02600](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02574359)
4. [ADV-2010-2833](http://www.vupen.com/english/advisories/2010/2833)
5. [SSRT100239](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02574359)
6. [1024675](http://www.securitytracker.com/id?1024675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1060
- **State**: PUBLISHED
- **Published Date**: February 22, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: February 22, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the member function in classes/member.php in WSN Guest 1.24 allows remote attackers to execute arbitrary SQL commands via the wsnuser cookie to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46444](http://www.securityfocus.com/bid/46444)
2. [wsnguest-member-wsnuser-sql-injection(65527)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65527)
3. [20110218 www.eVuln.com : "wsnuser" Cookie SQL Injection vulnerability in WSN Guest](http://www.securityfocus.com/archive/1/516519/100/0/threaded)
4. [](http://evuln.com/vulns/174/summary.html)
5. [8101](http://securityreason.com/securityalert/8101)
6. [43374](http://secunia.com/advisories/43374) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12919
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in OLEStream::WriteVT_LPSTR in olestrm.cpp in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service via a crafted fpx image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/08/09/libfpx-heap-based-buffer-overflow-in-olestreamwritevt_lpstr-olestrm-cpp/)
2. [[oss-security] 20170817 libfpx: heap-based buffer overflow in OLEStream:riteVT_LPSTR (olestrm.cpp)](http://www.openwall.com/lists/oss-security/2017/08/17/13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20916
- **State**: PUBLISHED
- **Published Date**: March 06, 2025 at 05:04 UTC
- **Last Updated**: March 06, 2025 at 15:04 UTC
- **Reserved Date**: November 06, 2024 at 02:30 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Out-of-bounds read in reading string of SPen in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Notes**
Affected versions:
- 4.4.26.71 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24157
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 18:18 UTC
- **Last Updated**: March 25, 2025 at 15:42 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gnuboard g6 / https://github.com/gnuboard/g6 commit c2cc1f5069e00491ea48618d957332d90f6d40e4 is vulnerable to Cross Site Scripting (XSS) via board.py.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gnuboard/g6/issues/314) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0941
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: November 24, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kootenay Web KW Whois 1.0 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "whois" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1883](http://www.securityfocus.com/bid/1883)
2. [kw-whois-meta(5438)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5438)
3. [20001029 Re: Remote command execution via KW Whois 1.0 (addition)](http://archives.neohapsis.com/archives/bugtraq/2000-10/0420.html)
4. [20001029 Remote command execution via KW Whois 1.0](http://archives.neohapsis.com/archives/bugtraq/2000-10/0419.html)
5. [](http://www.kootenayweb.bc.ca/scripts/whois.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10924
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 04, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.44 (32bit) with FPX Plugin 4.47 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000a529."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.irfanview.net/main_history.htm)
2. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10924) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8447
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 20:19 UTC
- **Last Updated**: May 14, 2025 at 22:39 UTC
- **Reserved Date**: September 05, 2024 at 01:54 UTC
- **Assigned By**: redhat
### Vulnerability Description
A security issue was discovered in the LRA Coordinator component of Narayana. When Cancel is called in LRA, an execution time of approximately 2 seconds occurs. If Join is called with the same LRA ID within that timeframe, the application may crash or hang indefinitely, leading to a denial of service.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-833: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat JBoss EAP XP 5.0 Update 2.0**
**Red Hat - Red Hat JBoss Enterprise Application Platform 8**
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8**
Affected versions:
- 0:800.6.1-1.GA_redhat_00001.1.el8eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8**
Affected versions:
- 0:4.1.119-1.Final_redhat_00002.1.el8eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8**
Affected versions:
- 0:4.1.119-1.Final_redhat_00002.1.el8eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8**
Affected versions:
- 0:2.0.16-2.redhat_00003.1.el8eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8**
Affected versions:
- 0:8.0.6-15.GA_redhat_00009.1.el8eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9**
Affected versions:
- 0:800.6.1-1.GA_redhat_00001.1.el9eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9**
Affected versions:
- 0:4.1.119-1.Final_redhat_00002.1.el9eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9**
Affected versions:
- 0:4.1.119-1.Final_redhat_00002.1.el9eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9**
Affected versions:
- 0:2.0.16-2.redhat_00003.1.el9eap (Status: unaffected)
**Red Hat - Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9**
Affected versions:
- 0:8.0.6-15.GA_redhat_00009.1.el9eap (Status: unaffected)
**Red Hat - Red Hat JBoss Data Grid 7**
**Red Hat - Red Hat JBoss Enterprise Application Platform 7**
**Red Hat - Red Hat JBoss Enterprise Application Platform Expansion Pack**
### References
1. [RHSA-2025:3357](https://access.redhat.com/errata/RHSA-2025:3357)
2. [RHSA-2025:3358](https://access.redhat.com/errata/RHSA-2025:3358)
3. [RHSA-2025:7620](https://access.redhat.com/errata/RHSA-2025:7620)
4. [](https://access.redhat.com/security/cve/CVE-2024-8447)
5. [RHBZ#2335206](https://bugzilla.redhat.com/show_bug.cgi?id=2335206)
6. [](https://github.com/jbosstm/narayana/pull/2293) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21967
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 17:06 UTC
- **Last Updated**: January 02, 2025 at 18:35 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21967) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8136
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 06:46 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that Windows handles objects in memory, aka "Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [1040849](http://www.securitytracker.com/id/1040849)
2. [104044](http://www.securityfocus.com/bid/104044)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23639
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:06 UTC
- **Last Updated**: January 17, 2025 at 19:19 UTC
- **Reserved Date**: January 16, 2025 at 11:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan MDC YouTube Downloader allows Stored XSS.This issue affects MDC YouTube Downloader: from n/a through 3.0.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Nazmul Ahsan - MDC YouTube Downloader**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mdc-youtube-downloader/vulnerability/wordpress-mdc-youtube-downloader-plugin-3-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11636
- **State**: PUBLISHED
- **Published Date**: July 26, 2017 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GraphicsMagick 1.3.26 has a heap overflow in the WriteRGBImage() function in coders/rgb.c when processing multiple frames that have non-identical widths.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://hg.code.sf.net/p/graphicsmagick/code/rev/39961adf974c)
2. [DSA-4321](https://www.debian.org/security/2018/dsa-4321)
3. [[debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html)
4. [99978](http://www.securityfocus.com/bid/99978)
5. [USN-4206-1](https://usn.ubuntu.com/4206-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44435
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:14 UTC
- **Last Updated**: September 18, 2024 at 18:30 UTC
- **Reserved Date**: September 28, 2023 at 18:02 UTC
- **Assigned By**: zdi
### Vulnerability Description
Kofax Power PDF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22040.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Kofax - Power PDF**
Affected versions:
- 5.0.0.57 (5.0.0.10.0.23307) (Status: affected)
### References
1. [ZDI-23-1607](https://www.zerodayinitiative.com/advisories/ZDI-23-1607/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42381
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 00:00 UTC
- **Last Updated**: July 31, 2024 at 17:03 UTC
- **Reserved Date**: July 31, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
os/linux/elf.rb in Homebrew brew before 4.2.20 uses ldd to load ELF files obtained from untrusted sources, which allows attackers to achieve code execution via an ELF file with a custom .interp section. NOTE: this code execution would occur during an un-sandboxed binary relocation phase, which occurs before a user would expect execution of downloaded package content. (237d1e783f7ee261beaba7d3f6bde22da7148b0a was the tested vulnerable version.)
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Homebrew/brew/tree/237d1e783f7ee261beaba7d3f6bde22da7148b0a)
2. [](https://github.com/trailofbits/publications/blob/master/reviews/2023-08-28-homebrew-securityreview.pdf)
3. [](https://blog.trailofbits.com/2024/07/30/our-audit-of-homebrew/)
4. [](https://brew.sh/2024/07/30/homebrew-security-audit/)
5. [](https://github.com/Homebrew/brew/commit/916b37388d3851a8a93a8e9b4adc38873680ead7)
6. [](https://github.com/Homebrew/brew/releases/tag/4.2.20)
7. [](https://github.com/Homebrew/brew/pull/17136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11219
- **State**: PUBLISHED
- **Published Date**: November 27, 2024 at 05:31 UTC
- **Last Updated**: November 27, 2024 at 12:03 UTC
- **Reserved Date**: November 14, 2024 at 14:55 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**themeisle - Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e9ab63-d61e-40f1-a5cb-432f33dfd2a6?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/otter-blocks/tags/3.0.6/inc/plugins/class-dynamic-content.php#L222)
### Credits
- Michael Mazzolini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0484
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:29 UTC
- **Last Updated**: September 16, 2024 at 16:49 UTC
- **Reserved Date**: February 03, 2022 at 00:00 UTC
- **Assigned By**: Mirantis
### Vulnerability Description
Lack of validation of URLs causes Mirantis Container Cloud Lens Extension before v3.1.1 to open external programs other than the default browser to perform sign on to a new cluster. An attacker could host a webserver which serves a malicious Mirantis Container Cloud configuration file and induce the victim to add a new cluster via its URL. This issue affects: Mirantis Mirantis Container Cloud Lens Extension v3 versions prior to v3.1.1.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Mirantis - Mirantis Container Cloud Lens Extension**
Affected versions:
- v3 (Status: affected)
### References
1. [](https://github.com/Mirantis/security/blob/main/advisories/0005.md)
### Credits
- Mirantis PSIRT |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20675
- **State**: PUBLISHED
- **Published Date**: April 06, 2022 at 18:13 UTC
- **Last Updated**: November 06, 2024 at 16:28 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the TCP/IP stack of Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Secure Email and Web Manager, formerly Security Management Appliance, could allow an unauthenticated, remote attacker to crash the Simple Network Management Protocol (SNMP) service, resulting in a denial of service (DoS) condition. This vulnerability is due to an open port listener on TCP port 199. An attacker could exploit this vulnerability by connecting to TCP port 199. A successful exploit could allow the attacker to crash the SNMP service, resulting in a DoS condition.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**Cisco - Cisco Web Security Appliance (WSA)**
Affected versions:
- n/a (Status: affected)
### References
1. [20220406 Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-SNMP-JLAJksWK) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13224
- **State**: PUBLISHED
- **Published Date**: January 31, 2025 at 06:00 UTC
- **Last Updated**: March 20, 2025 at 20:38 UTC
- **Reserved Date**: January 08, 2025 at 19:31 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The SlideDeck 1 Lite Content Slider WordPress plugin through 1.4.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - SlideDeck 1 Lite Content Slider**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/32a90907-e82f-41b3-b20e-d10a722e2999/)
### Credits
- Hassan Khan Yusufzai - Splint3r7
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8679
- **State**: PUBLISHED
- **Published Date**: August 13, 2020 at 03:21 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.
### Affected Products
**n/a - Intel(R) Graphics Drivers Advisory**
Affected versions:
- Before version 26.20.100.7755 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45444
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 01:51 UTC
- **Last Updated**: September 04, 2024 at 13:21 UTC
- **Reserved Date**: August 29, 2024 at 06:19 UTC
- **Assigned By**: huawei
### Vulnerability Description
Access permission verification vulnerability in the WMS module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.2.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 14.0.0 (Status: affected)
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/9/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.