System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25477
- **State**: PUBLISHED
- **Published Date**: July 02, 2024 at 00:00 UTC
- **Last Updated**: October 29, 2024 at 14:53 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://realtek.com)
2. [](https://www.realtek.com/images/safe-report/Realtek_RtsPer_RtsUer_Security_Advisory_Report.pdf)
3. [](https://gist.github.com/zwclose/feb16f1424779a61cb1d9f6d5681408a)
4. [](https://zwclose.github.io/2024/10/14/rtsper1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18992
- **State**: PUBLISHED
- **Published Date**: December 03, 2019 at 19:32 UTC
- **Last Updated**: August 05, 2024 at 02:02 UTC
- **Reserved Date**: November 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenWrt 18.06.4 allows XSS via these Name fields to the cgi-bin/luci/admin/network/firewall/rules URI: "Open ports on router" and "New forward rule" and "New Source NAT" (this can occur, for example, on a TP-Link Archer C7 device).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/openwrt/luci/commit/3961268597abba4c2b231790cb4aa7936e73cdf8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3799
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The Apple ID OD plug-in in Apple OS X before 10.10.5 allows attackers to change arbitrary user passwords via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-390)
2. [76340](http://www.securityfocus.com/bid/76340)
3. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html)
4. [](https://support.apple.com/kb/HT205031)
5. [1033276](http://www.securitytracker.com/id/1033276) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9559
- **State**: PUBLISHED
- **Published Date**: June 16, 2017 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 12, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The MEA Financial vision-bank/id420406345 app 3.0.1 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8383
- **State**: REJECTED
- **Published Date**: April 13, 2021 at 20:41 UTC
- **Last Updated**: April 13, 2021 at 20:41 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2143
- **State**: PUBLISHED
- **Published Date**: July 22, 2022 at 14:59 UTC
- **Last Updated**: April 16, 2025 at 16:13 UTC
- **Reserved Date**: June 20, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Advantech iView - iView**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-03)
2. [](http://packetstormsecurity.com/files/168108/Advantech-iView-NetworkServlet-Command-Injection.html)
### Credits
- rgod, working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6061
- **State**: PUBLISHED
- **Published Date**: November 11, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Microsoft Skype for Business 2016, Lync 2010 and 2013 SP1, Lync 2010 Attendee, and Lync Room System allows remote attackers to inject arbitrary web script or HTML via an instant-message session, aka "Server Input Validation Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034126](http://www.securitytracker.com/id/1034126)
2. [1034127](http://www.securitytracker.com/id/1034127)
3. [MS15-123](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-123) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7023
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 02:00 UTC
- **Last Updated**: September 13, 2024 at 14:59 UTC
- **Reserved Date**: December 20, 2023 at 17:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tongda OA 2017 up to 11.9. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/vehicle/query/delete.php. The manipulation of the argument VU_ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-248570 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Tongda - OA 2017**
Affected versions:
- 11.0 (Status: affected)
- 11.1 (Status: affected)
- 11.2 (Status: affected)
- 11.3 (Status: affected)
- 11.4 (Status: affected)
- 11.5 (Status: affected)
- 11.6 (Status: affected)
- 11.7 (Status: affected)
- 11.8 (Status: affected)
- 11.9 (Status: affected)
### References
1. [](https://vuldb.com/?id.248570)
2. [](https://vuldb.com/?ctiid.248570)
3. [](https://github.com/xiatiandeyu123/cve/blob/main/sql.md)
### Credits
- xiatiandeyu123 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24406
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:37 UTC
- **Last Updated**: March 17, 2025 at 20:51 UTC
- **Reserved Date**: January 21, 2025 at 17:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An unauthenticated attacker could exploit this vulnerability to modify files that are stored outside the restricted directory. Exploitation of this issue does not require user interaction.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Adobe - Adobe Commerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb25-08.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3101
- **State**: PUBLISHED
- **Published Date**: September 23, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: April 29, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The login form in the Web component in IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not insert a delay after a failed authentication attempt, which makes it easier for remote attackers to obtain access via a brute-force attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-clearquest-cve20143101-bruteforce(94268)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94268)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21682946)
3. [1030884](http://www.securitytracker.com/id/1030884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16409
- **State**: PUBLISHED
- **Published Date**: December 09, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of the Adobe graphics module responsible for displaying textual data. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
### Affected Products
**n/a - Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions**
Affected versions:
- Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions (Status: affected)
### References
1. [1039791](http://www.securitytracker.com/id/1039791)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb17-36.html)
3. [102140](http://www.securityfocus.com/bid/102140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41954
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 19:23 UTC
- **Last Updated**: July 31, 2024 at 20:30 UTC
- **Reserved Date**: July 24, 2024 at 16:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these credentials, a malicious user could create new accounts for the web application and much more. The vulnerability is fixed in 1.5.10.41.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**FOGProject - fogproject**
Affected versions:
- < 1.5.10.41 (Status: affected)
### References
1. [https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c](https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c)
2. [https://github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90](https://github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1197
- **State**: PUBLISHED
- **Published Date**: December 15, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:46 UTC
- **Reserved Date**: December 14, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in inshop.pl in Insite inShop allows remote attackers to inject arbitrary web script or HTML via the screen parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [insite-inmail-inshop-xss(18268)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18268)
2. [20041124 XSS in Brazilian Insite products](http://marc.info/?l=bugtraq&m=110140029419018&w=2)
3. [13188](http://secunia.com/advisories/13188/)
4. [11758](http://www.securityfocus.com/bid/11758) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26490
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 00:00 UTC
- **Last Updated**: October 31, 2024 at 15:15 UTC
- **Reserved Date**: February 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in the Addon JD Simple module of flusity-CMS v2.33 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title text field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/2111715623/cms/blob/main/2.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19680
- **State**: PUBLISHED
- **Published Date**: January 13, 2020 at 20:06 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.proofpoint.com/us/security/cve-2019-19680)
2. [](https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2020-0001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4262
- **State**: PUBLISHED
- **Published Date**: November 24, 2011 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 18:09 UTC
- **Reserved Date**: November 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted MP4 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://service.real.com/realplayer/security/11182011_player/en/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23368
- **State**: PUBLISHED
- **Published Date**: July 01, 2024 at 14:17 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 16, 2024 at 03:27 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption when allocating and accessing an entry in an SMEM partition.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- APQ8064AU (Status: affected)
- AQT1000 (Status: affected)
- AR8035 (Status: affected)
- AR9380 (Status: affected)
- CSR8811 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- FSM10055 (Status: affected)
- FSM10056 (Status: affected)
- FSM20055 (Status: affected)
- FSM20056 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ4018 (Status: affected)
- IPQ4019 (Status: affected)
- IPQ4028 (Status: affected)
- IPQ4029 (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5300 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8064 (Status: affected)
- IPQ8065 (Status: affected)
- IPQ8068 (Status: affected)
- IPQ8070 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- MDM9628 (Status: affected)
- MDM9650 (Status: affected)
- MSM8996AU (Status: affected)
- PMP8074 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA0000 (Status: affected)
- QCA4024 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA7500 (Status: affected)
- QCA8072 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCA9880 (Status: affected)
- QCA9886 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCA9898 (Status: affected)
- QCA9980 (Status: affected)
- QCA9984 (Status: affected)
- QCA9985 (Status: affected)
- QCA9990 (Status: affected)
- QCA9992 (Status: affected)
- QCA9994 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCM2150 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM4325 (Status: affected)
- QCM4490 (Status: affected)
- QCM5430 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN5021 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5054 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6100 (Status: affected)
- QCN6102 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN9000 (Status: affected)
- QCN9001 (Status: affected)
- QCN9002 (Status: affected)
- QCN9003 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QCS2290 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS4490 (Status: affected)
- QCS5430 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm 205 Mobile Platform (Status: affected)
- Qualcomm 215 Mobile Platform (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD660 (Status: affected)
- SD670 (Status: affected)
- SD730 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDM429W (Status: affected)
- SDX55 (Status: affected)
- SDX65M (Status: affected)
- SG4150P (Status: affected)
- SG8275P (Status: affected)
- SM4125 (Status: affected)
- SM6250 (Status: affected)
- SM6370 (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM8550P (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 210 Processor (Status: affected)
- Snapdragon 212 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 660 Mobile Platform (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 690 5G Mobile Platform (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 710 Mobile Platform (Status: affected)
- Snapdragon 720G Mobile Platform (Status: affected)
- Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected)
- Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected)
- Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected)
- Snapdragon 750G 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 820 Automotive Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon X12 LTE Modem (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR1 Platform (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- Snapdragon XR2+ Gen 1 Platform (Status: affected)
- Snapdragon Auto 4G Modem (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR1120 (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- TalynPlus (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680 (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42918
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 20:21 UTC
- **Last Updated**: August 02, 2024 at 19:30 UTC
- **Reserved Date**: September 14, 2023 at 19:05 UTC
- **Assigned By**: apple
### Vulnerability Description
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213940) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1302
- **State**: PUBLISHED
- **Published Date**: April 07, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 07, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39108](http://www.securityfocus.com/bid/39108)
2. [](http://packetstormsecurity.org/1003-exploits/joomladwgraph-lfi.txt)
3. [11978](http://www.exploit-db.com/exploits/11978)
4. [39200](http://secunia.com/advisories/39200)
5. [63345](http://osvdb.org/63345) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46159
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 14:15 UTC
- **Last Updated**: April 23, 2025 at 16:33 UTC
- **Reserved Date**: November 28, 2022 at 17:27 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Discourse is an open-source discussion platform. In version 2.8.13 and prior on the `stable` branch and version 2.9.0.beta14 and prior on the `beta` and `tests-passed` branches, any authenticated user can create an unlisted topic. These topics, which are not readily available to other users, can take up unnecessary site resources. A patch for this issue is available in the `main` branch of Discourse. There are no known workarounds available.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**discourse - discourse**
Affected versions:
- <= 2.8.13 (Status: affected)
- >= 2.9.0.beta0, <= 2.9.0.beta14 (Status: affected)
### References
1. [https://github.com/discourse/discourse/security/advisories/GHSA-qf99-xpx6-hgxp](https://github.com/discourse/discourse/security/advisories/GHSA-qf99-xpx6-hgxp)
2. [https://github.com/discourse/discourse/commit/0ce38bd7bce862db251b882613ab7053ca777382](https://github.com/discourse/discourse/commit/0ce38bd7bce862db251b882613ab7053ca777382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21355
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 18:02 UTC
- **Last Updated**: May 09, 2025 at 18:21 UTC
- **Reserved Date**: December 08, 2023 at 22:45 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-591: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21355) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3732
- **State**: PUBLISHED
- **Published Date**: November 21, 2005 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 21, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://cvs.sourceforge.net/viewcvs.py/ipsec-tools/ipsec-tools/src/racoon/isakmp_agg.c?r1=1.20.2.3&r2=1.20.2.4&diff_format=u)
2. [oval:org.mitre.oval:def:9857](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9857)
3. [18616](http://secunia.com/advisories/18616)
4. [](http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en)
5. [20210](http://secunia.com/advisories/20210)
6. [15523](http://www.securityfocus.com/bid/15523)
7. [[ipsec-tools-devel] 20051120 Potential DoS fixed in ipsec-tools](http://sourceforge.net/mailarchive/forum.php?thread_id=9017454&forum_id=32000)
8. [1015254](http://securitytracker.com/id?1015254)
9. [DSA-965](http://www.debian.org/security/2006/dsa-965)
10. [20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation](http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html)
11. [18742](http://secunia.com/advisories/18742)
12. [GLSA-200512-04](http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml)
13. [](http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/)
14. [20060501-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc)
15. [RHSA-2006:0267](http://rhn.redhat.com/errata/RHSA-2006-0267.html)
16. [19833](http://secunia.com/advisories/19833)
17. [17668](http://secunia.com/advisories/17668)
18. [FLSA-2006:190941](http://www.securityfocus.com/archive/1/436343/100/0/threaded)
19. [18115](http://secunia.com/advisories/18115)
20. [17822](http://secunia.com/advisories/17822)
21. [USN-221-1](https://usn.ubuntu.com/221-1/)
22. [MDKSA-2006:020](http://www.mandriva.com/security/advisories?name=MDKSA-2006:020)
23. [17980](http://secunia.com/advisories/17980)
24. [ADV-2005-2521](http://www.vupen.com/english/advisories/2005/2521)
25. [SUSE-SA:2005:070](http://www.novell.com/linux/security/advisories/2005_70_ipsec.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18939
- **State**: PUBLISHED
- **Published Date**: November 05, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: November 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in WUZHI CMS 4.1.0. There is stored XSS in index.php?m=core&f=index via a seventh input field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wuzhicms/wuzhicms/issues/159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43969
- **State**: PUBLISHED
- **Published Date**: September 17, 2024 at 22:33 UTC
- **Last Updated**: September 18, 2024 at 14:11 UTC
- **Reserved Date**: August 18, 2024 at 21:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spiffy Plugins Spiffy Calendar allows SQL Injection.This issue affects Spiffy Calendar: from n/a through 4.9.12.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Spiffy Plugins - Spiffy Calendar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-12-sql-injection-vulnerability?_s_id=cve)
### Credits
- Certus Cybersecurity (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22319
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 14:53 UTC
- **Last Updated**: November 14, 2024 at 14:40 UTC
- **Reserved Date**: January 20, 2023 at 17:45 UTC
- **Assigned By**: talos
### Vulnerability Description
A sql injection vulnerability exists in the requestHandlers.js LoginAuth functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a malicious packet to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Milesight - MilesightVPN**
Affected versions:
- v2.0.2 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8254
- **State**: PUBLISHED
- **Published Date**: December 19, 2019 at 19:44 UTC
- **Last Updated**: August 04, 2024 at 21:17 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Photoshop CC versions before 20.0.8 and 21.0.x before 21.0.2 have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Photoshop CC**
Affected versions:
- Adobe Photoshop CC versions before 20.0.8 and 21.0.x before 21.0.2 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb19-56.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11266
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: July 13, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42819
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 20:05 UTC
- **Reserved Date**: October 11, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An access issue was addressed with improved access restrictions. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, macOS Monterey 12.6. An app may be able to read sensitive location information.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213443)
2. [](https://support.apple.com/en-us/HT213444)
3. [](https://support.apple.com/en-us/HT213488) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1203
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lotus Domino SMTP server 4.63 through 5.08 allows remote attackers to cause a denial of service (CPU consumption) by forging an email message with the sender as bounce@[127.0.0.1] (localhost), which causes Domino to enter a mail loop.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lotus-domino-bounced-message-dos(7012)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7012)
2. [20010823 Lotus Domino DoS solution](http://www.securityfocus.com/archive/1/209754)
3. [20000520 Infinite loop in LOTUS NOTE 5.0.3. SMTP SERVER](http://marc.info/?l=vuln-dev&m=95886062521327&w=2)
4. [3212](http://www.securityfocus.com/bid/3212)
5. [20010820 Lotus Domino DoS](http://www.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-01-21&end=2002-01-27&mid=209116&threads=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20225
- **State**: PUBLISHED
- **Published Date**: July 13, 2022 at 18:23 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getSubscriptionProperty of SubscriptionController.java, there is a possible read of a sensitive identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-213457638
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 Android-12L (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32542
- **State**: PUBLISHED
- **Published Date**: May 28, 2021 at 08:10 UTC
- **Last Updated**: September 16, 2024 at 19:05 UTC
- **Reserved Date**: May 10, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The parameters of the specific functions in the CTS Web trading system do not filter special characters, which allows unauthenticated attackers can remotely perform reflected XSS and obtain the users’ connection token that triggered the attack.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SysJust - CTS Web**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-4758-82b05-1.html)
2. [](https://www.chtsecurity.com/news/40e165e2-e539-49bc-bcf1-e3b27c29e344) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47029
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 10:34 UTC
- **Last Updated**: October 25, 2024 at 15:57 UTC
- **Reserved Date**: September 16, 2024 at 19:14 UTC
- **Assigned By**: Google_Devices
### Vulnerability Description
In TrustySharedMemoryManager::GetSharedMemory of ondevice/trusty/trusty_shared_memory_manager.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2024-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11649
- **State**: PUBLISHED
- **Published Date**: November 25, 2024 at 01:31 UTC
- **Last Updated**: November 26, 2024 at 21:30 UTC
- **Reserved Date**: November 24, 2024 at 15:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**1000 Projects - Beauty Parlour Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-285970 | 1000 Projects Beauty Parlour Management System search-appointment.php sql injection](https://vuldb.com/?id.285970)
2. [VDB-285970 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.285970)
3. [Submit #451245 | 1000 Projects Beauty Parlour Management System PHP SQLite Project V1.0 SQL Injection](https://vuldb.com/?submit.451245)
4. [](https://github.com/zgaz/CVE/issues/1)
5. [](https://1000projects.org/)
### Credits
- zhugeaozun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38524
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 14:43 UTC
- **Last Updated**: June 10, 2025 at 14:56 UTC
- **Reserved Date**: June 18, 2024 at 16:37 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GeoServer is an open source server that allows users to share and edit geospatial data. org.geowebcache.GeoWebCacheDispatcher.handleFrontPage(HttpServletRequest, HttpServletResponse) has no check to hide potentially sensitive information from users except for a hidden system property to hide the storage locations that defaults to showing the locations. This vulnerability is fixed in 2.26.2 and 2.25.6.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**geoserver - geoserver**
Affected versions:
- >= 2.26.0, < 2.26.2 (Status: affected)
- < 2.25.6 (Status: affected)
### References
1. [https://github.com/geoserver/geoserver/security/advisories/GHSA-jm79-7xhw-6f6f](https://github.com/geoserver/geoserver/security/advisories/GHSA-jm79-7xhw-6f6f)
2. [https://github.com/GeoWebCache/geowebcache/issues/1344](https://github.com/GeoWebCache/geowebcache/issues/1344)
3. [https://github.com/GeoWebCache/geowebcache/pull/1345](https://github.com/GeoWebCache/geowebcache/pull/1345)
4. [https://github.com/geoserver/geoserver/pull/8189](https://github.com/geoserver/geoserver/pull/8189)
5. [https://osgeo-org.atlassian.net/browse/GEOS-11677](https://osgeo-org.atlassian.net/browse/GEOS-11677) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7189
- **State**: PUBLISHED
- **Published Date**: December 31, 2023 at 15:00 UTC
- **Last Updated**: August 02, 2024 at 08:57 UTC
- **Reserved Date**: December 30, 2023 at 16:50 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - S-CMS**
Affected versions:
- 2.0_build20220529-20231006 (Status: affected)
### References
1. [](https://vuldb.com/?id.249391)
2. [](https://vuldb.com/?ctiid.249391)
3. [](https://note.zhaoj.in/share/9yaojoQvesLu)
### Credits
- glzjin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22218
- **State**: PUBLISHED
- **Published Date**: October 18, 2022 at 02:46 UTC
- **Last Updated**: May 12, 2025 at 14:44 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-754: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- unspecified (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
- 19.4 (Status: affected)
- 20.2 (Status: affected)
- 20.3 (Status: affected)
- 20.4 (Status: affected)
- 21.1 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA69901) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45014
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 15:13 UTC
- **Last Updated**: May 04, 2025 at 09:31 UTC
- **Reserved Date**: August 21, 2024 at 05:34 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
s390/boot: Avoid possible physmem_info segment corruption
When physical memory for the kernel image is allocated it does not
consider extra memory required for offsetting the image start to
match it with the lower 20 bits of KASLR virtual base address. That
might lead to kernel access beyond its memory range.
### Affected Products
**Linux - Linux**
Affected versions:
- 693d41f7c938f92d881e6a51525e6c132a186afd (Status: affected)
- 693d41f7c938f92d881e6a51525e6c132a186afd (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10 (Status: affected)
- 0 (Status: unaffected)
- 6.10.7 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a944cba5d57687b747023c3bc074fcf9c790f7df)
2. [](https://git.kernel.org/stable/c/d7fd2941ae9a67423d1c7bee985f240e4686634f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8229
- **State**: PUBLISHED
- **Published Date**: August 10, 2020 at 13:35 UTC
- **Last Updated**: August 04, 2024 at 09:56 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**n/a - Desktop Client**
Affected versions:
- Fixed in 2.6.5 (Status: affected)
### References
1. [](https://hackerone.com/reports/588562)
2. [](https://nextcloud.com/security/advisory/?id=NC-SA-2020-034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13674
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 07:32 UTC
- **Last Updated**: February 19, 2025 at 16:40 UTC
- **Reserved Date**: January 23, 2025 at 18:15 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Cosmic Blocks (40+) Content Editor Blocks Collection plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cwp_social_share' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**berginformatik - Cosmic Blocks (40+) Content Editor Blocks Collection**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5cccd266-48a8-481e-8fbd-db5a9a72f55a?source=cve)
2. [](https://wordpress.org/plugins/cosmic-blocks/)
### Credits
- SOPROBRO |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46058
- **State**: PUBLISHED
- **Published Date**: October 23, 2023 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 14:22 UTC
- **Reserved Date**: October 16, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in Geeklog-Core geeklog v.2.2.2 allows a remote attacker to execute arbitrary code via a crafted payload to the grp_desc parameter of the admin/group.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6753
- **State**: PUBLISHED
- **Published Date**: September 28, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The sunnat e rasool (aka com.imsoft.sunnat_e_rasool) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#433513](http://www.kb.cert.org/vuls/id/433513)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2671
- **State**: PUBLISHED
- **Published Date**: May 12, 2023 at 08:31 UTC
- **Last Updated**: November 22, 2024 at 15:44 UTC
- **Reserved Date**: May 12, 2023 at 06:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file classes/Master.php?f=save_inquiry of the component Contact Form. The manipulation of the argument fullname/contact/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228887.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Lost and Found Information System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.228887)
2. [](https://vuldb.com/?ctiid.228887)
3. [](https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md)
### Credits
- huutuanbg97 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21254
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:58 UTC
- **Last Updated**: March 12, 2025 at 01:42 UTC
- **Reserved Date**: December 10, 2024 at 23:54 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Internet Connection Sharing (ICS) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Internet Connection Sharing (ICS) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40824
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:28 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md)
2. [](https://github.com/bcit-ci/CodeIgniter/issues/6161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3633
- **State**: PUBLISHED
- **Published Date**: May 01, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: May 01, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via vectors related to digital signatures.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032228](http://www.securitytracker.com/id/1032228)
2. [74418](http://www.securityfocus.com/bid/74418)
3. [](http://www.foxitsoftware.com/support/security_bulletins.php#FRD-26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18838
- **State**: PUBLISHED
- **Published Date**: December 13, 2019 at 12:22 UTC
- **Last Updated**: August 05, 2024 at 02:02 UTC
- **Reserved Date**: November 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filter chain before being sent to the client. An encoder filter that invokes route manager APIs that access a request's Host header causes a NULL pointer dereference, resulting in abnormal termination of the Envoy process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/envoyproxy/envoy/commits/master)
2. [](https://groups.google.com/forum/#%21forum/envoy-users)
3. [](https://blog.envoyproxy.io)
4. [](https://github.com/envoyproxy/envoy/security/advisories/GHSA-f2rv-4w6x-rwhc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25576
- **State**: PUBLISHED
- **Published Date**: February 14, 2023 at 15:04 UTC
- **Last Updated**: March 10, 2025 at 21:12 UTC
- **Reserved Date**: February 07, 2023 at 17:10 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
@fastify/multipart is a Fastify plugin to parse the multipart content-type. Prior to versions 7.4.1 and 6.0.1, @fastify/multipart may experience denial of service due to a number of situations in which an unlimited number of parts are accepted. This includes the multipart body parser accepting an unlimited number of file parts, the multipart body parser accepting an unlimited number of field parts, and the multipart body parser accepting an unlimited number of empty parts as field parts. This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x). There are no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**fastify - fastify-multipart**
Affected versions:
- < 6.0.1 (Status: affected)
- >= 7.0.0, < 7.4.1 (Status: affected)
### References
1. [https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g](https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g)
2. [https://github.com/fastify/fastify-multipart/commit/85be81bedf5b29cfd9fe3efc30fb5a17173c1297](https://github.com/fastify/fastify-multipart/commit/85be81bedf5b29cfd9fe3efc30fb5a17173c1297)
3. [https://hackerone.com/reports/1816195](https://hackerone.com/reports/1816195)
4. [https://github.com/fastify/fastify-multipart/releases/tag/v6.0.1](https://github.com/fastify/fastify-multipart/releases/tag/v6.0.1)
5. [https://github.com/fastify/fastify-multipart/releases/tag/v7.4.1](https://github.com/fastify/fastify-multipart/releases/tag/v7.4.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12966
- **State**: PUBLISHED
- **Published Date**: December 26, 2024 at 21:00 UTC
- **Last Updated**: December 27, 2024 at 16:20 UTC
- **Reserved Date**: December 26, 2024 at 07:57 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Job Recruitment 1.0. It has been rated as critical. This issue affects the function cn_update of the file /_parse/_all_edits.php. The manipulation of the argument cname/url leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Job Recruitment**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-289331 | code-projects Job Recruitment _all_edits.php cn_update sql injection](https://vuldb.com/?id.289331)
2. [VDB-289331 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289331)
3. [Submit #469000 | code-projects job-recruitment-php 1/0 Sql injection](https://vuldb.com/?submit.469000)
4. [](https://github.com/Viper0617/cve/blob/main/sql-viper.md)
5. [](https://code-projects.org/)
### Credits
- Viper33 (VulDB User)
- Viper33 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41736
- **State**: PUBLISHED
- **Published Date**: April 29, 2023 at 02:02 UTC
- **Last Updated**: January 30, 2025 at 17:09 UTC
- **Reserved Date**: September 28, 2022 at 17:18 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Scale Container Native Storage Access
5.1.2.1 through 5.1.6.0
contains an unspecified vulnerability that could allow a local user to obtain root privileges. IBM X-Force ID: 237810.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**IBM - Spectrum Scale Container Native Storage Access**
Affected versions:
- 5.1.2.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6964564)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/237810) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3963
- **State**: REJECTED
- **Last Updated**: February 11, 2025 at 01:06 UTC
- **Reserved Date**: July 26, 2023 at 22:01 UTC
- **Assigned By**: GitLab
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7841
- **State**: PUBLISHED
- **Published Date**: November 30, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62735](http://secunia.com/advisories/62735)
2. [RHSA-2015:0695](http://rhn.redhat.com/errata/RHSA-2015-0695.html)
3. [](http://linux.oracle.com/errata/ELSA-2015-3004.html)
4. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40607cbe270a9e8360907cb1e62ddf0736e4864)
5. [[oss-security] 20141113 CVE-2014-7841 Linux kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet](http://www.openwall.com/lists/oss-security/2014/11/13/6)
6. [](https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16016.html)
7. [SUSE-SU-2015:0652](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html)
8. [RHSA-2015:0285](http://rhn.redhat.com/errata/RHSA-2015-0285.html)
9. [RHSA-2015:0087](http://rhn.redhat.com/errata/RHSA-2015-0087.html)
10. [DSA-3093](http://www.debian.org/security/2014/dsa-3093)
11. [SUSE-SU-2015:0481](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html)
12. [71081](http://www.securityfocus.com/bid/71081)
13. [openSUSE-SU-2015:0566](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html)
14. [](https://bugzilla.redhat.com/show_bug.cgi?id=1163087)
15. [RHSA-2015:0284](http://rhn.redhat.com/errata/RHSA-2015-0284.html)
16. [](http://linux.oracle.com/errata/ELSA-2015-3005.html)
17. [SUSE-SU-2015:0529](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html)
18. [](https://github.com/torvalds/linux/commit/e40607cbe270a9e8360907cb1e62ddf0736e4864)
19. [62597](http://secunia.com/advisories/62597)
20. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4)
21. [RHSA-2015:0102](http://rhn.redhat.com/errata/RHSA-2015-0102.html)
22. [62305](http://secunia.com/advisories/62305) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4550
- **State**: PUBLISHED
- **Published Date**: December 16, 2010 at 19:45 UTC
- **Last Updated**: September 16, 2024 at 23:46 UTC
- **Reserved Date**: December 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Lotus Notes Traveler before 8.5.1.3 allows remote attackers to cause a denial of service (sync failure) via a malformed document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-10.lotus.com/ldd/dominowiki.nsf/page.xsp?documentId=A6604E906E0DF2DF8525778B005D4466&action=openDocument)
2. [](http://www-10.lotus.com/ldd/dominowiki.nsf/dx/Lotus_Notes_Traveler_851_FP3_Release_Notes)
3. [LO51818](http://www-1.ibm.com/support/docview.wss?uid=swg1LO51818) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1430, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1430
- **State**: PUBLISHED
- **Published Date**: March 16, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 16, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kb.cert.org/vuls/id/MAPG-8DBRD4)
2. [multiple-starttls-command-execution(65932)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65932)
3. [71020](http://www.osvdb.org/71020)
4. [43676](http://secunia.com/advisories/43676)
5. [46767](http://www.securityfocus.com/bid/46767)
6. [VU#555316](http://www.kb.cert.org/vuls/id/555316)
7. [ADV-2011-0609](http://www.vupen.com/english/advisories/2011/0609) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1003008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1003008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1003008
- **State**: PUBLISHED
- **Published Date**: February 06, 2019 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:21 UTC
- **Reserved Date**: February 06, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.
### Affected Products
**Jenkins project - Jenkins Warnings Next Generation Plugin**
Affected versions:
- 2.1.1 and earlier (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20%282%29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24507
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 13:17 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in Act-On 2023 allows a remote attacker to execute arbitrary code via the newUser parameter in the login.jsp component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Xandsz/2b409acb81e846fc3478600f984785a1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18893
- **State**: PUBLISHED
- **Published Date**: January 03, 2019 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: November 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/HubSpot/jinjava/blob/master/CHANGES.md)
2. [](https://github.com/HubSpot/jinjava/pull/230) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3295
- **State**: REJECTED
- **Published Date**: January 23, 2020 at 15:36 UTC
- **Last Updated**: January 23, 2020 at 15:36 UTC
- **Reserved Date**: September 13, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3698
- **State**: PUBLISHED
- **Published Date**: November 21, 2005 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: November 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Easy Download allows remote attackers to bypass authentication via edit.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15470](http://www.securityfocus.com/bid/15470) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8017
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:11 UTC
- **Last Updated**: March 20, 2025 at 14:19 UTC
- **Reserved Date**: August 20, 2024 at 17:06 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
An XSS vulnerability exists in open-webui/open-webui versions <= 0.3.8, specifically in the function that constructs the HTML for tooltips. This vulnerability allows attackers to perform operations with the victim's privileges, such as stealing chat history, deleting chats, and escalating their own account to an admin if the victim is an admin.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**open-webui - open-webui/open-webui**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/ef06c7c8-1cb2-42a7-a6e6-17b2e1c744f7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8566
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A security feature bypass vulnerability exists when Windows improperly suspends BitLocker Device Encryption, aka "BitLocker Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
### Affected Products
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for ARM64-based Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for ARM64-based Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- Version 1809 for 32-bit Systems (Status: affected)
- Version 1809 for ARM64-based Systems (Status: affected)
- Version 1809 for x64-based Systems (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8566)
2. [105806](http://www.securityfocus.com/bid/105806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51407
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 00:00 UTC
- **Last Updated**: November 04, 2024 at 19:18 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Floodlight SDN OpenFlow Controller v.1.2 has an issue that allows local hosts to construct false broadcast ports causing inter-host communication anomalies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ieeexplore.ieee.org/document/10246976)
2. [](https://github.com/floodlight/floodlight)
3. [](https://github.com/floodlight/floodlight/issues/869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13327
- **State**: PUBLISHED
- **Published Date**: October 03, 2019 at 21:33 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 05, 2019 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of fields within Acroform objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8888.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Reader**
Affected versions:
- 9.5.0.20723 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-850/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4790
- **State**: PUBLISHED
- **Published Date**: September 10, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx, as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01, 6 SP1 and SP2, and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019378](http://www.securitytracker.com/id?1019378)
2. [HPSBST02314](http://marc.info/?l=bugtraq&m=120361015026386&w=2)
3. [4369](https://www.exploit-db.com/exploits/4369)
4. [SSRT080016](http://marc.info/?l=bugtraq&m=120361015026386&w=2)
5. [foxpro-fpole-activex-bo(36496)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36496)
6. [TA08-043C](http://www.us-cert.gov/cas/techalerts/TA08-043C.html)
7. [oval:org.mitre.oval:def:5481](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5481)
8. [ADV-2008-0512](http://www.vupen.com/english/advisories/2008/0512/references)
9. [25571](http://www.securityfocus.com/bid/25571)
10. [MS08-010](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3936
- **State**: PUBLISHED
- **Published Date**: March 27, 2020 at 03:50 UTC
- **Last Updated**: September 16, 2024 at 22:51 UTC
- **Reserved Date**: December 20, 2019 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
UltraLog Express device management interface does not properly filter user inputted string in some specific parameters, attackers can inject arbitrary SQL command.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unisoon - UltraLog Express**
Affected versions:
- 1.4.0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-3451-7d9f0-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7814
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 12, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [101059](http://www.securityfocus.com/bid/101059)
2. [[debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html)
3. [](https://www.mozilla.org/security/advisories/mfsa2017-22/)
4. [1039465](http://www.securitytracker.com/id/1039465)
5. [RHSA-2017:2831](https://access.redhat.com/errata/RHSA-2017:2831)
6. [RHSA-2017:2885](https://access.redhat.com/errata/RHSA-2017:2885)
7. [](https://www.mozilla.org/security/advisories/mfsa2017-21/)
8. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1376036)
9. [DSA-4014](https://www.debian.org/security/2017/dsa-4014)
10. [](https://www.mozilla.org/security/advisories/mfsa2017-23/)
11. [DSA-3987](https://www.debian.org/security/2017/dsa-3987)
12. [GLSA-201803-14](https://security.gentoo.org/glsa/201803-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2974
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 18:24 UTC
- **Reserved Date**: March 09, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sametime Connect 8.5.2 and 9.0, after uninstalling the Sametime Rich Client, could disclose potentially sensitive information related to the Sametime environment as well as other users on the local machine of the user. IBM X-Force ID: 113934.
### Affected Products
**IBM - Sametime**
Affected versions:
- 8.5.2 (Status: affected)
- 8.5.2.1 (Status: affected)
- 9.0 (Status: affected)
- 9.0.0.1 (Status: affected)
- 9.0.1 (Status: affected)
### References
1. [100528](http://www.securityfocus.com/bid/100528)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/113934)
3. [](http://www.ibm.com/support/docview.wss?uid=swg22006444) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1465
- **State**: PUBLISHED
- **Published Date**: March 19, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: February 29, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the HTTP Server in NetMechanica NetDecision before 4.6.1 allows remote attackers to cause a denial of service (application crash) via a long URL in an HTTP request. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [52194](http://www.securityfocus.com/bid/52194)
2. [79651](http://osvdb.org/79651)
3. [netdecision-http-dos(73528)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73528)
4. [](http://secpod.org/advisories/SecPod_Netmechanica_NetDecision_HTTP_Server_DoS_Vuln.txt)
5. [52208](http://www.securityfocus.com/bid/52208)
6. [18541](http://www.exploit-db.com/exploits/18541)
7. [](http://www.netmechanica.com/news/?news_id=26)
8. [](http://secpod.org/blog/?p=484)
9. [48168](http://secunia.com/advisories/48168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0156
- **State**: PUBLISHED
- **Published Date**: March 28, 2018 at 22:00 UTC
- **Last Updated**: November 15, 2024 at 17:53 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**n/a - Cisco IOS and IOS XE**
Affected versions:
- Cisco IOS and IOS XE (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi)
3. [1040596](http://www.securitytracker.com/id/1040596)
4. [103569](http://www.securityfocus.com/bid/103569)
5. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5547
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 00:00 UTC
- **Last Updated**: June 04, 2025 at 13:37 UTC
- **Reserved Date**: June 03, 2025 at 16:40 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. This issue affects some unknown processing of the component CDUP Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**FreeFloat - FTP Server**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-310997 | FreeFloat FTP Server CDUP Command buffer overflow](https://vuldb.com/?id.310997)
2. [VDB-310997 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.310997)
3. [Submit #586981 | FreeFloat FTP Server 1.0 Buffer Overflow](https://vuldb.com/?submit.586981)
4. [](https://fitoxs.com/exploit/exploit-a9c9f7b4f50efc4b4be32e7ec4d3f7dfd7390e9be4ff168d9ab7a0eb911f8f3a1.txt)
### Credits
- Fernando Mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1068
- **State**: PUBLISHED
- **Published Date**: February 22, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 21, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The (1) TTLS CHAP, (2) TTLS MSCHAP, (3) TTLS MSCHAPv2, (4) TTLS PAP, (5) MD5, (6) GTC, (7) LEAP, (8) PEAP MSCHAPv2, (9) PEAP GTC, and (10) FAST authentication methods in Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client store transmitted authentication credentials in plaintext log files, which allows local users to obtain sensitive information by reading these files, aka CSCsg34423.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24258](http://secunia.com/advisories/24258)
2. [33046](http://osvdb.org/33046)
3. [ADV-2007-0690](http://www.vupen.com/english/advisories/2007/0690)
4. [22648](http://www.securityfocus.com/bid/22648)
5. [20070221 Multiple Vulnerabilities in 802.1X Supplicant](http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml)
6. [1017683](http://www.securitytracker.com/id?1017683)
7. [cisco-cssc-password-information-disclosure(32626)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32626)
8. [1017684](http://www.securitytracker.com/id?1017684) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48377
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 15:39 UTC
- **Last Updated**: May 23, 2025 at 15:51 UTC
- **Reserved Date**: May 19, 2025 at 15:46 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to version 9.13.9, a specially crafted URL may be constructed which can inject an XSS payload that is triggered by using some module actions. Version 9.13.9 fixes the issue.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**dnnsoftware - Dnn.Platform**
Affected versions:
- < 9.13.9 (Status: affected)
### References
1. [https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-79m3-rvx2-3qq9](https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-79m3-rvx2-3qq9)
2. [https://github.com/dnnsoftware/Dnn.Platform/commit/351b166492ad4b6509c273dc83211d52238e31a7](https://github.com/dnnsoftware/Dnn.Platform/commit/351b166492ad4b6509c273dc83211d52238e31a7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21694
- **State**: PUBLISHED
- **Published Date**: November 04, 2021 at 16:30 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
### Affected Products
**Jenkins project - Jenkins**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4505
- **State**: PUBLISHED
- **Published Date**: December 07, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55855](http://secunia.com/advisories/55855)
2. [](http://subversion.apache.org/security/CVE-2013-4505-advisory.txt)
3. [100364](http://osvdb.org/100364)
4. [openSUSE-SU-2013:1836](http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html)
5. [openSUSE-SU-2013:1860](http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5036
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 21:08 UTC
- **Last Updated**: August 04, 2024 at 19:40 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packets can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**n/a - Nest Labs**
Affected versions:
- Nest Labs Nest Cam IQ Indoor version 4620002 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0799) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29907
- **State**: PUBLISHED
- **Published Date**: April 29, 2022 at 03:42 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T306815)
2. [](https://gerrit.wikimedia.org/r/c/786959) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0427
- **State**: PUBLISHED
- **Published Date**: June 12, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 18:04 UTC
- **Reserved Date**: January 11, 2024 at 14:11 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The ARForms - Premium WordPress Form Builder Plugin WordPress plugin before 6.4.1 does not properly escape user-controlled input when it is reflected in some of its AJAX actions.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - ARForms - Premium WordPress Form Builder Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1806fef3-d774-46e0-aa48-7a101495f4eb/)
### Credits
- mgthuramoemyint
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4108
- **State**: PUBLISHED
- **Published Date**: August 14, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Bibliography (biblio.module) 4.6 before revision 1.1.1.1.4.11 and 4.7 before revision 1.13.2.5 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21435](http://secunia.com/advisories/21435)
2. [ADV-2006-3227](http://www.vupen.com/english/advisories/2006/3227)
3. [](http://drupal.org/node/77756)
4. [19441](http://www.securityfocus.com/bid/19441)
5. [bibliography-unspecified-sql-injection(28296)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28296) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14571
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:39 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Mobile Service). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. While the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - BI Publisher (formerly XML Publisher)**
Affected versions:
- 11.1.1.9.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4917
- **State**: PUBLISHED
- **Published Date**: December 09, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: November 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201209-25](http://security.gentoo.org/glsa/glsa-201209-25.xml)
2. [](http://kb.vmware.com/kb/1006980)
3. [20081203 VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2](http://www.securityfocus.com/archive/1/498863/100/0/threaded)
4. [oval:org.mitre.oval:def:6246](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246)
5. [32965](http://secunia.com/advisories/32965)
6. [](http://kb.vmware.com/kb/1006986)
7. [20081203 Re: VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2](http://www.securityfocus.com/archive/1/498886/100/0/threaded)
8. [1021301](http://securitytracker.com/id?1021301)
9. [1021300](http://securitytracker.com/id?1021300)
10. [32597](http://www.securityfocus.com/bid/32597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5829
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 01:46 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
An access restriction bypass vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found.
### Affected Products
**Hewlett Packard Enterprise - Aruba ClearPass Policy Manager**
Affected versions:
- 6.6.x (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03730en_us)
2. [](http://www.arubanetworks.com/assets/alert/HPESBHF03730.txt)
3. [98722](http://www.securityfocus.com/bid/98722) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1877
- **State**: PUBLISHED
- **Published Date**: August 18, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: June 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 8.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-1875.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57190](http://osvdb.org/57190)
2. [](http://www.adobe.com/support/security/bulletins/apsb09-12.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0949
- **State**: PUBLISHED
- **Published Date**: February 10, 2016 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Connect before 9.5.2 allows remote attackers to have an unspecified impact via a crafted parameter in a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/connect/apsb16-07.html)
2. [1034978](http://www.securitytracker.com/id/1034978) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3458
- **State**: PUBLISHED
- **Published Date**: September 15, 2012 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 20:05 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5)
2. [50226](http://secunia.com/advisories/50226)
3. [50520](http://secunia.com/advisories/50520)
4. [[oss-security] 20120813 ANN: Beaker 1.6.4 released with important security update](http://www.openwall.com/lists/oss-security/2012/08/13/10)
5. [DSA-2541](http://www.debian.org/security/2012/dsa-2541)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=809267) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3055
- **State**: PUBLISHED
- **Published Date**: June 06, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in Codelib Linker 2.0.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36413](http://osvdb.org/36413)
2. [24277](http://www.securityfocus.com/bid/24277)
3. [ADV-2007-2039](http://www.vupen.com/english/advisories/2007/2039)
4. [linker-index-search-xss(34695)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34695)
5. [20070602 Linker index.php - Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/470346/100/0/threaded)
6. [38374](http://osvdb.org/38374)
7. [25517](http://secunia.com/advisories/25517) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6538
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6135
- **State**: PUBLISHED
- **Published Date**: November 28, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: November 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in IBM WebSphere Application Server 6.1.0 before Fix Pack 3 (6.1.0.3) have unknown impact and attack vectors, related to (1) a "Potential security vulnerability" (PK29725) and (2) "Potential security exposure" (PK30831).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-1.ibm.com/support/docview.wss?uid=swg27007951)
2. [PK30831](http://www-1.ibm.com/support/search.wss?rs=0&q=PK30831&apar=only)
3. [23028](http://secunia.com/advisories/23028)
4. [](http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24013830)
5. [PK29725](http://www-1.ibm.com/support/search.wss?rs=0&q=PK29725&apar=only)
6. [21204](http://www.securityfocus.com/bid/21204)
7. [ADV-2006-4639](http://www.vupen.com/english/advisories/2006/4639) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49306
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:10 UTC
- **Last Updated**: May 04, 2025 at 08:34 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: host: Stop setting the ACPI companion
It is no longer needed. The sysdev pointer is now used when
assigning the ACPI companions to the xHCI ports and USB
devices.
Assigning the ACPI companion here resulted in the
fwnode->secondary pointer to be replaced also for the parent
dwc3 device since the primary fwnode (the ACPI companion)
was shared. That was unintentional and it created potential
side effects like resource leaks.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.17.15 (Status: unaffected)
- 5.18.4 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d7f35934f7ab67bfd9adabc84207e59da9c19108)
2. [](https://git.kernel.org/stable/c/9c185fde906a48368bd2d2a8c17d4b6fb3d670af)
3. [](https://git.kernel.org/stable/c/7fd069d65da2e20b1caec3b7bcf9dfbe28c04bb2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11289
- **State**: PUBLISHED
- **Published Date**: May 07, 2021 at 09:10 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Out of bound write can occur in TZ command handler due to lack of validation of command ID in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, CSR8811, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, IPQ5010, IPQ5018, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8953, PM8996, PM8998, PMC1000H, PMD9607, PMD9655, PMD9655AU, PME605, ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34636
- **State**: PUBLISHED
- **Published Date**: July 18, 2022 at 22:45 UTC
- **Last Updated**: August 03, 2024 at 09:15 UTC
- **Reserved Date**: June 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMA violation occurs during address translation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/riscv-boom/riscv-boom/issues/606)
2. [](https://github.com/openhwgroup/cva6/issues/905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32182
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 15:58 UTC
- **Last Updated**: April 04, 2025 at 18:29 UTC
- **Reserved Date**: April 04, 2025 at 10:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spider Themes Spider Elements – Addons for Elementor allows Stored XSS. This issue affects Spider Elements – Addons for Elementor: from n/a through 1.6.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Spider Themes - Spider Elements – Addons for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/spider-elements/vulnerability/wordpress-spider-elements-addons-for-elementor-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Khalid Yusuf (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30114
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:22 UTC
- **Last Updated**: April 24, 2025 at 18:11 UTC
- **Reserved Date**: March 22, 2024 at 23:57 UTC
- **Assigned By**: HCL
### Vulnerability Description
Insufficient sanitization in HCL Leap allows
client-side script injection in the authoring environment.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**HCL Software - HCL Leap**
Affected versions:
- < 9.3.6 (Status: affected)
### References
1. [](https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119900) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1256
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 07:37 UTC
- **Last Updated**: September 16, 2024 at 21:09 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
aff_liste_langue.php in E-theni allows remote attackers to execute arbitrary PHP code by modifying the rep_include parameter to reference a URL on a remote web server that contains para_langue.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [etheni-afflistelangue-file-include(11013)](http://www.iss.net/security_center/static/11013.php)
2. [6970](http://www.securityfocus.com/bid/6970)
3. [20030106 E-theni (PHP)](http://www.securityfocus.com/archive/1/305381)
4. [20030106 E-theni (PHP)](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0765
- **State**: PUBLISHED
- **Published Date**: March 03, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 04:48 UTC
- **Reserved Date**: March 03, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in Kipper 2.01 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the configfile parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33832](http://secunia.com/advisories/33832)
2. [33640](http://www.securityfocus.com/bid/33640)
3. [kipper-index-file-include(49271)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49271)
4. [7993](https://www.exploit-db.com/exploits/7993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5605
- **State**: PUBLISHED
- **Published Date**: December 16, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in ASP Portal allow remote attackers to execute arbitrary SQL commands via the (1) ItemID parameter to classifieds.asp and the (2) ID parameter to Events.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [aspportal-classifieds-events-sql-injection(47127)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47127)
2. [32662](http://www.securityfocus.com/bid/32662)
3. [aspportal-classifieds-sql-injection(47268)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47268)
4. [4763](http://securityreason.com/securityalert/4763)
5. [7357](https://www.exploit-db.com/exploits/7357) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35924
- **State**: PUBLISHED
- **Published Date**: August 02, 2022 at 17:55 UTC
- **Last Updated**: April 23, 2025 at 17:54 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
NextAuth.js is a complete open source authentication solution for Next.js applications. `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `attacker@attacker.com,victim@victim.com`) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim's e-mail addresses. The attacker could then login as a newly created user with the email being `attacker@attacker.com,victim@victim.com`. This means that basic authorization like `email.endsWith("@victim.com")` in the `signIn` callback would fail to communicate a threat to the developer and would let the attacker bypass authorization, even with an `@attacker.com` address. This vulnerability has been patched in `v4.10.3` and `v3.29.10` by normalizing the email value that is sent to the sign-in endpoint before accessing it anywhere else. We also added a `normalizeIdentifier` callback on the `EmailProvider` configuration, where you can further tweak your requirements for what your system considers a valid e-mail address. (E.g.: strict RFC2821 compliance). Users are advised to upgrade. There are no known workarounds for this vulnerability. If for some reason you cannot upgrade, you can normalize the incoming request using Advanced Initialization.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**nextauthjs - next-auth**
Affected versions:
- >= 4.0.0, < 4.10.3 (Status: affected)
- < 3.29.10 (Status: affected)
### References
1. [](https://next-auth.js.org/configuration/initialization#advanced-initialization)
2. [](https://github.com/nextauthjs/next-auth/security/advisories/GHSA-xv97-c62v-4587)
3. [](https://github.com/nextauthjs/next-auth/commit/afb1fcdae3cc30445038ef588e491d139b916003)
4. [](https://en.wikipedia.org/wiki/Email_address#Local-part)
5. [](https://next-auth.js.org/configuration/callbacks#sign-in-callback)
6. [](https://next-auth.js.org/providers/email)
7. [](https://next-auth.js.org/providers/email#normalizing-the-e-mail-address)
8. [](https://nodemailer.com/message/addresses) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16474
- **State**: PUBLISHED
- **Published Date**: November 06, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 04, 2018 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A stored xss in tianma-static module versions <=1.0.4 allows an attacker to execute arbitrary javascript.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**npm - tianma-static**
Affected versions:
- <=1.0.4 (Status: affected)
### References
1. [](https://hackerone.com/reports/403692) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0081
- **State**: REJECTED
- **Last Updated**: May 16, 2023 at 00:00 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33158
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 17:03 UTC
- **Last Updated**: February 28, 2025 at 21:07 UTC
- **Reserved Date**: May 17, 2023 at 21:16 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-191: Security Weakness
### Affected Products
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office for Universal**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [Microsoft Excel Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33158) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1002201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1002201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1002201
- **State**: PUBLISHED
- **Published Date**: October 15, 2019 at 17:35 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: October 15, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
### Affected Products
**http://haml.info/ - haml**
Affected versions:
- All versions prior to version 5.0.0.beta.2 (Status: affected)
### References
1. [](https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2)
2. [](https://snyk.io/vuln/SNYK-RUBY-HAML-20362)
3. [[debian-lts-announce] 20191110 [SECURITY] [DLA 1986-1] ruby-haml security update](https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html)
4. [GLSA-202007-27](https://security.gentoo.org/glsa/202007-27)
5. [[debian-lts-announce] 20211229 [SECURITY] [DLA 2864-1] ruby-haml security update](https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40387
- **State**: PUBLISHED
- **Published Date**: September 01, 2021 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the server software in Kaseya Unitrends Backup Software before 10.5.5-2. There is authenticated remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://csirt.divd.nl/csirt-divd-nl/cases/DIVD-2021-00014/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.