System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4366
- **State**: PUBLISHED
- **Published Date**: December 20, 2005 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in DRZES HMS 3.2 allow remote attackers to execute arbitrary SQL commands via the (1) plan_id parameter to (a) domains.php, (b) viewusage.php, (c) pop_accounts.php, (d) databases.php, (e) ftp_users.php, (f) crons.php, (g) pass_dirs.php, (h) zone_files.php, (i) htaccess.php, and (j) software.php; (2) the customerPlanID parameter to viewplan.php; (3) the ref_id parameter to referred_plans.php; (4) customerPlanID parameter to listcharges.php; and (5) the domain parameter to (k) pop_accounts.php, (d) databases.php, (e) ftp_users.php, (f) crons.php, (g) pass_dirs.php, (h) zone_files.php, (i) htaccess.php, and (j) software.php. NOTE: the viewinvoice.php invoiceID vector is already covered by CVE-2005-4137.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21186](http://www.osvdb.org/21186)
2. [21183](http://www.osvdb.org/21183)
3. [21189](http://www.osvdb.org/21189)
4. [21187](http://www.osvdb.org/21187)
5. [21181](http://www.osvdb.org/21181)
6. [21180](http://www.osvdb.org/21180)
7. [21184](http://www.osvdb.org/21184)
8. [21188](http://www.osvdb.org/21188)
9. [21182](http://www.osvdb.org/21182)
10. [21179](http://www.osvdb.org/21179)
11. [21192](http://www.osvdb.org/21192)
12. [21190](http://www.osvdb.org/21190)
13. [21185](http://www.osvdb.org/21185)
14. [15644](http://www.securityfocus.com/bid/15644)
15. [](http://pridels0.blogspot.com/2005/11/drzes-hms-32-multiple-vuln.html)
16. [21191](http://www.osvdb.org/21191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43530
- **State**: PUBLISHED
- **Published Date**: January 03, 2023 at 19:50 UTC
- **Last Updated**: April 10, 2025 at 15:18 UTC
- **Reserved Date**: October 20, 2022 at 12:58 UTC
- **Assigned By**: hpe
### Vulnerability Description
Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba ClearPass Policy Manager**
Affected versions:
- ClearPass Policy Manager 6.10.x: 6.10.7 and below, ClearPass Policy Manager 6.9.x: 6.9.12 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22088
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 21:03 UTC
- **Last Updated**: September 13, 2024 at 16:08 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: User Management). Supported versions that are affected are 7.4.0 and 7.4.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Communications Order and Service Management**
Affected versions:
- 7.4.0 (Status: affected)
- 7.4.1 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3636
- **State**: PUBLISHED
- **Published Date**: December 08, 2011 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 21, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the management interface in FreeIPA before 2.1.4 allows remote attackers to hijack the authentication of administrators for requests that make configuration changes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://freeipa.org/page/IPAv2_214) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27770
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 15:21 UTC
- **Reserved Date**: March 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue found in Wondershare Technology Co.,Ltd Edraw-max v.12.0.4 allows a remote attacker to execute arbitrary commands via the edraw-max_setup_full5371.exe file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/liong007/Wondershare/issues/10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4291
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 17, 2010 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1164
- **State**: PUBLISHED
- **Published Date**: April 18, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Yager 5.24 and earlier allows remote attackers to cause a denial of service (application hang) via a packet with a game header that provides less data than indicated by the length.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14967](http://secunia.com/advisories/14967)
2. [13179](http://www.securityfocus.com/bid/13179)
3. [20050414 Multiple vulnerabilities in Yager 5.24](http://marc.info/?l=bugtraq&m=111352154820865&w=2)
4. [yager-freeze-datablock-dos(20104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20104)
5. [](http://aluigi.altervista.org/adv/yagerbof-adv.txt)
6. [15509](http://www.osvdb.org/15509) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23503
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 16:09 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 17, 2024 at 18:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.6.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WPManageNinja LLC - Ninja Tables**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-plugin-5-0-5-broken-access-control-vulnerability?_s_id=cve)
### Credits
- emad (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4409
- **State**: PUBLISHED
- **Published Date**: June 16, 2012 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 07, 2011 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
The Ubuntu One Client for Ubuntu 10.04 LTS, 11.04, 11.10, and 12.04 LTS does not properly validate SSL certificates, which allows remote attackers to spoof a server and modify or read sensitive information via a man-in-the-middle (MITM) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49442](http://secunia.com/advisories/49442)
2. [USN-1465-3](http://ubuntu.com/usn/usn-1465-3)
3. [USN-1465-1](http://ubuntu.com/usn/usn-1465-1)
4. [82748](http://www.osvdb.org/82748)
5. [USN-1465-2](http://ubuntu.com/usn/usn-1465-2)
6. [ubuntuoneclient-ssl-info-disc(76113)](https://exchange.xforce.ibmcloud.com/vulnerabilities/76113)
7. [53828](http://www.securityfocus.com/bid/53828) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7918
- **State**: PUBLISHED
- **Published Date**: December 15, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 22, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Multiple buffer overflows in the F1BookView ActiveX control in F1 Bookview in Schneider Electric ProClima before 6.2 allow remote attackers to execute arbitrary code via the (1) Attach, (2) DefinedName, (3) DefinedNameLocal, (4) ODBCPrepareEx, (5) ObjCreatePolygon, (6) SetTabbedTextEx, or (7) SetValidationRule method, a different vulnerability than CVE-2015-8561.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-631)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-625)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-335-02)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-15-634)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-15-632)
6. [](http://www.zerodayinitiative.com/advisories/ZDI-15-630)
7. [](http://www.zerodayinitiative.com/advisories/ZDI-15-633)
8. [](http://www.zerodayinitiative.com/advisories/ZDI-15-635)
9. [](http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-329-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3159
- **State**: PUBLISHED
- **Published Date**: October 06, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 05, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in messages.php in PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the msg_view parameter, a different vulnerability than CVE-2005-3157 and CVE-2005-3158.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14489](http://www.securityfocus.com/bid/14489)
2. [18708](http://www.osvdb.org/18708)
3. [20050930 Re: PHP-Fusion v6.00.109 SQL Injection / admin|users credentials](http://marc.info/?l=bugtraq&m=112811077320676&w=2)
4. [](http://www.s4a.cc/forum/archive/index.php/t-3585.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3554
- **State**: PUBLISHED
- **Published Date**: October 19, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 20, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to "permissions granted to certain system objects."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.avaya.com/css/P8/documents/100114327)
2. [RHSA-2010:0865](http://www.redhat.com/support/errata/RHSA-2010-0865.html)
3. [](http://support.avaya.com/css/P8/documents/100114315)
4. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
5. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2)
6. [RHSA-2010:0770](http://www.redhat.com/support/errata/RHSA-2010-0770.html)
7. [SSRT100333](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748)
8. [RHSA-2010:0768](http://www.redhat.com/support/errata/RHSA-2010-0768.html)
9. [FEDORA-2010-16240](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html)
10. [oval:org.mitre.oval:def:12189](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12189)
11. [USN-1010-1](http://www.ubuntu.com/usn/USN-1010-1)
12. [](https://bugzilla.redhat.com/show_bug.cgi?id=639880)
13. [oval:org.mitre.oval:def:12449](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12449)
14. [](http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html)
15. [](http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html)
16. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html)
17. [42974](http://secunia.com/advisories/42974)
18. [41972](http://secunia.com/advisories/41972)
19. [ADV-2010-3086](http://www.vupen.com/english/advisories/2010/3086)
20. [HPSBUX02608](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748)
21. [](http://support.avaya.com/css/P8/documents/100123193)
22. [42377](http://secunia.com/advisories/42377)
23. [SUSE-SR:2010:019](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html)
24. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html)
25. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded)
26. [43994](http://www.securityfocus.com/bid/43994)
27. [FEDORA-2010-16312](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html)
28. [FEDORA-2010-16294](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46732
- **State**: PUBLISHED
- **Published Date**: January 17, 2023 at 23:31 UTC
- **Last Updated**: January 17, 2025 at 22:13 UTC
- **Reserved Date**: December 15, 2022 at 18:53 UTC
- **Assigned By**: icscert
### Vulnerability Description
Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status.
### Affected Products
**GE Digital - Proficy Historian**
Affected versions:
- 7.0 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01)
2. [](https://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5925
- **State**: PUBLISHED
- **Published Date**: October 23, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The CoreGraphics component in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2015-5926.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-10-21-4](http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html)
2. [APPLE-SA-2015-10-21-1](http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html)
3. [](https://support.apple.com/HT205375)
4. [APPLE-SA-2015-10-21-2](http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html)
5. [](https://support.apple.com/HT205370)
6. [](https://support.apple.com/HT205378)
7. [1033929](http://www.securitytracker.com/id/1033929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1807
- **State**: PUBLISHED
- **Published Date**: September 07, 2022 at 18:00 UTC
- **Last Updated**: August 03, 2024 at 00:16 UTC
- **Reserved Date**: May 20, 2022 at 00:00 UTC
- **Assigned By**: Sophos
### Vulnerability Description
Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Sophos - Sophos Firewall**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4)
2. [](https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0845
- **State**: PUBLISHED
- **Published Date**: March 04, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Open redirect vulnerability in IBM Rational Requirements Composer 3.x before 3.0.1.6 iFix2 and 4.x before 4.0.6, and Rational DOORS Next Generation 4.x before 4.0.6, allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21664412)
2. [ibm-rrc-cve20140845-redirect(90719)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90719)
3. [65916](http://www.securityfocus.com/bid/65916) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29565
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 19:16 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.SparseFillEmptyRows`. This is because of missing validation(https://github.com/tensorflow/tensorflow/blob/fdc82089d206e281c628a93771336bf87863d5e8/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L230-L231) that was covered under a `TODO`. If the `dense_shape` tensor is empty, then `dense_shape_t.vec<>()` would cause a null pointer dereference in the implementation of the op. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 2.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.1.4 (Status: affected)
- >= 2.2.0, < 2.2.3 (Status: affected)
- >= 2.3.0, < 2.3.3 (Status: affected)
- >= 2.4.0, < 2.4.2 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6pg-pjwc-j585)
2. [](https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4967
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 18:01 UTC
- **Last Updated**: February 27, 2025 at 20:39 UTC
- **Reserved Date**: September 14, 2023 at 15:51 UTC
- **Assigned By**: Citrix
### Vulnerability Description
Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Cloud Software Group - NetScaler ADC**
Affected versions:
- 14.1 (Status: affected)
- 13.1 (Status: affected)
- 13.0 (Status: affected)
- 13.1-FIPS (Status: affected)
- 12.1-FIPS (Status: affected)
- 12.1-NDcPP (Status: affected)
**Cloud Software Group - NetScaler Gateway**
Affected versions:
- 14.1 (Status: affected)
- 13.1 (Status: affected)
- 13.0 (Status: affected)
### References
1. [](https://support.citrix.com/article/CTX579459/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22572
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 12:54 UTC
- **Last Updated**: March 26, 2025 at 18:42 UTC
- **Reserved Date**: January 02, 2023 at 12:54 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerScale OneFS 9.1.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in change password api. A low privilege local attacker could potentially exploit this vulnerability, leading to system takeover.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**Dell - PowerScale OneFS**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000207863/dell-powerscale-onefs-security-updates-for-multiple-security) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0470
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [482](http://www.securityfocus.com/bid/482) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5675
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 15:44 UTC
- **Last Updated**: March 03, 2025 at 16:28 UTC
- **Reserved Date**: October 20, 2023 at 04:42 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 3.2.0 (Status: affected)
- 3.6.0 (Status: affected)
- 3.7.0 (Status: affected)
- 3.8.0 (Status: unaffected)
**Red Hat - Red Hat build of Quarkus 2.13.9.Final**
Affected versions:
- 2.13.9.Final-redhat-00003 (Status: unaffected)
**Red Hat - Red Hat build of Quarkus 2.13.9.Final**
Affected versions:
- 2.13.9.Final-redhat-00003 (Status: unaffected)
**Red Hat - Red Hat build of Quarkus 3.2.9.Final**
Affected versions:
- 3.2.9.Final-redhat-00003 (Status: unaffected)
**Red Hat - Red Hat build of Quarkus 3.2.9.Final**
Affected versions:
- 3.2.9.Final-redhat-00003 (Status: unaffected)
**Red Hat - A-MQ Clients 2**
**Red Hat - Cryostat 2**
**Red Hat - OpenShift Serverless**
**Red Hat - Red Hat build of Apicurio Registry 2**
**Red Hat - Red Hat build of OptaPlanner 8**
**Red Hat - Red Hat Fuse 7**
**Red Hat - Red Hat Integration Camel K 1**
**Red Hat - Red Hat Integration Camel Quarkus 2**
**Red Hat - Red Hat JBoss Enterprise Application Platform 8**
**Red Hat - Red Hat Process Automation 7**
### References
1. [RHSA-2024:0494](https://access.redhat.com/errata/RHSA-2024:0494)
2. [RHSA-2024:0495](https://access.redhat.com/errata/RHSA-2024:0495)
3. [](https://access.redhat.com/security/cve/CVE-2023-5675)
4. [RHBZ#2245197](https://bugzilla.redhat.com/show_bug.cgi?id=2245197)
### Credits
- This issue was discovered by Michal Vavřík (Red Hat). |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1757
- **State**: PUBLISHED
- **Published Date**: April 08, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2007 SP3 and 2010 SP1 and SP2, and Office Compatibility Pack SP3, allocates memory incorrectly for file conversions from a binary (aka .doc) format to a newer format, which allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office File Format Converter Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-017](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017)
2. [VU#882841](http://www.kb.cert.org/vuls/id/882841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0715
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 19:30 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-287: Improper Authentication vulnerability exists that could cause an attacker to arbitrarily change the behavior of the UPS when a key is leaked and used to upload malicious firmware. Affected Product: APC Smart-UPS Family: SMT Series (SMT Series ID=18: UPS 09.8 and prior / SMT Series ID=1040: UPS 01.2 and prior / SMT Series ID=1031: UPS 03.1 and prior), SMC Series (SMC Series ID=1005: UPS 14.1 and prior / SMC Series ID=1007: UPS 11.0 and prior / SMC Series ID=1041: UPS 01.1 and prior), SCL Series (SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior), SMX Series (SMX Series ID=20: UPS 10.2 and prior / SMX Series ID=23: UPS 07.0 and prior), SRT Series (SRT Series ID=1010/1019/1025: UPS 08.3 and prior / SRT Series ID=1024: UPS 01.0 and prior / SRT Series ID=1020: UPS 10.4 and prior / SRT Series ID=1021: UPS 12.2 and prior / SRT Series ID=1001/1013: UPS 05.1 and prior / SRT Series ID=1002/1014: UPSa05.2 and prior), APC SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Schneider Electric - APC Smart-UPS**
Affected versions:
- SMT Series (Status: affected)
- SMC Series (Status: affected)
- SCL Series (Status: affected)
- SMX Series (Status: affected)
- SRT Series (Status: affected)
**Schneider Electric - SmartConnect **
Affected versions:
- SMT Series (Status: affected)
- SMC Series (Status: affected)
- SMTL Series (Status: affected)
- SCL Series (Status: affected)
- SMX Series (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2022-067-02/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4637
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 16, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The REST API in F5 BIG-IQ Cloud, Device, and Security 4.4.0 and 4.5.0 before HF2 and ADC 4.5.0 before HF2, when configured for LDAP remote authentication and the LDAP server allows anonymous BIND operations, allows remote attackers to obtain an authentication token for arbitrary users by guessing an LDAP user account name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.f5.com/kb/en-us/solutions/public/16000/800/sol16861.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11188
- **State**: PUBLISHED
- **Published Date**: November 23, 2024 at 05:40 UTC
- **Last Updated**: November 23, 2024 at 13:18 UTC
- **Reserved Date**: November 13, 2024 at 17:41 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder plugin for WordPress is vulnerable to POST-Based Reflected Cross-Site Scripting via the Custom HTML Form parameters in all versions up to, and including, 6.16.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**strategy11team - Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/da84aa80-7ef6-4846-870d-07bf88652329?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/formidable/tags/6.16/classes/helpers/FrmFieldsHelper.php#L158)
### Credits
- Michael Mazzolini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19040
- **State**: PUBLISHED
- **Published Date**: January 31, 2019 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Media File Manager plugin 1.4.2 for WordPress allows directory listing via a ../ directory traversal in the dir parameter of an mrelocator_getdir action to the wp-admin/admin-ajax.php URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45809](https://www.exploit-db.com/exploits/45809/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32283
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 15:26 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function gravity_string_to_value() located in gravity_value.c. It allows an attacker to cause Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/marcobambini/gravity/issues/314) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42010
- **State**: PUBLISHED
- **Published Date**: August 05, 2024 at 00:00 UTC
- **Last Updated**: August 12, 2024 at 13:42 UTC
- **Reserved Date**: July 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/roundcube/roundcubemail/releases)
2. [](https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/)
3. [](https://github.com/roundcube/roundcubemail/releases/tag/1.5.8)
4. [](https://github.com/roundcube/roundcubemail/releases/tag/1.6.8)
5. [](https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39294
- **State**: PUBLISHED
- **Published Date**: January 05, 2024 at 16:19 UTC
- **Last Updated**: September 04, 2024 at 19:53 UTC
- **Reserved Date**: July 27, 2023 at 06:46 UTC
- **Assigned By**: qnap
### Vulnerability Description
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QuTS hero h5.1.3.2578 build 20231110 and later
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**QNAP Systems Inc. - QTS**
Affected versions:
- 5.1.x (Status: affected)
**QNAP Systems Inc. - QuTS hero**
Affected versions:
- h5.1.x (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-23-54)
### Credits
- rekter0 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35546
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:49 UTC
- **Last Updated**: September 25, 2024 at 19:37 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.26 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
2. [](https://security.netapp.com/advisory/ntap-20211022-0003/)
3. [FEDORA-2021-70dd0b9f5d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/)
4. [FEDORA-2021-46dc82116b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/)
5. [FEDORA-2021-f74148c6d4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9332
- **State**: PUBLISHED
- **Published Date**: June 06, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: May 31, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The smarty_self function in modules/module_smarty.php in PivotX 2.3.11 mishandles the URI, allowing XSS via vectors involving quotes in the self Smarty tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/pivot-weblog/code/4487/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46799
- **State**: REJECTED
- **Published Date**: November 07, 2023 at 21:17 UTC
- **Last Updated**: January 02, 2024 at 21:34 UTC
- **Reserved Date**: October 26, 2023 at 13:15 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21595
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 19:50 UTC
- **Last Updated**: April 10, 2025 at 13:13 UTC
- **Reserved Date**: December 26, 2024 at 14:47 UTC
- **Assigned By**: juniper
### Vulnerability Description
A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to Denial of Service (DoS).
On all Junos OS and Junos OS Evolved platforms, in an EVPN-VXLAN scenario, when specific ARP packets are received on an IPv4 network, or specific NDP packets are received on an IPv6 network, kernel heap memory leaks, which eventually leads to an FPC crash and restart.
This issue does not affect MX Series platforms.
Heap size growth on FPC can be seen using below command.
user@host> show chassis fpc
Temp CPU Utilization (%) CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt 1min 5min 15min DRAM (MB) Heap Buffer
0 Online 45 3 0 2 2 2 32768 19 0 <<<<<<< Heap increase in all fPCs
This issue affects Junos OS:
* All versions before 21.2R3-S7,
* 21.4 versions before 21.4R3-S4,
* 22.2 versions before 22.2R3-S1,
* 22.3 versions before 22.3R3-S1,
* 22.4 versions before 22.4R2-S2, 22.4R3.
and Junos OS Evolved:
* All versions before 21.2R3-S7-EVO,
* 21.4-EVO versions before 21.4R3-S4-EVO,
* 22.2-EVO versions before 22.2R3-S1-EVO,
* 22.3-EVO versions before 22.3R3-S1-EVO,
* 22.4-EVO versions before 22.4R3-EVO.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 21.4 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 0 (Status: affected)
- 21.4-EVO (Status: affected)
- 22.2-EVO (Status: affected)
- 22.3-EVO (Status: affected)
- 22.4-EVO (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA96450) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27221
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 09:21 UTC
- **Last Updated**: April 21, 2025 at 13:53 UTC
- **Reserved Date**: March 15, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An attacker in machine-in-the-middle could obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
### Affected Products
**Siemens - SINEMA Remote Connect Server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf)
2. [](https://cert-portal.siemens.com/productcert/html/ssa-484086.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6092
- **State**: PUBLISHED
- **Published Date**: April 27, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause a denial of service (web-service outage) by making many login attempts with a valid caseworker account name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21697742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16262
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 21:39 UTC
- **Last Updated**: April 08, 2025 at 19:45 UTC
- **Reserved Date**: October 31, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd g_b, at 0x9d015864, the value for the `id` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Insteon - Hub**
Affected versions:
- Not specified (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2728
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 10:20 UTC
- **Last Updated**: April 15, 2025 at 13:54 UTC
- **Reserved Date**: August 09, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Gym Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /mygym/admin/index.php. The manipulation of the argument edit_tran leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205856.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Gym Management System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Blythe-LU/Record2/blob/main/Gym%20Management%20System%20Project%20-%20SQL%20injection.md)
2. [](https://vuldb.com/?id.205856) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4662
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "AppleGraphicsControl" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1037086](http://www.securitytracker.com/id/1037086)
2. [93852](http://www.securityfocus.com/bid/93852)
3. [](https://support.apple.com/HT207275) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5620
- **State**: PUBLISHED
- **Published Date**: August 25, 2020 at 02:20 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Exment prior to v3.6.0 allows remote authenticated attackers to inject arbitrary script or HTML via a specially crafted file.
### Affected Products
**Kajitori Co.,Ltd - Exment**
Affected versions:
- prior to v3.6.0 (Status: affected)
### References
1. [](https://exment.net/docs/#/weakness/20200819)
2. [](https://jvn.jp/en/jp/JVN88315581/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36161
- **State**: PUBLISHED
- **Published Date**: September 11, 2023 at 00:00 UTC
- **Last Updated**: September 26, 2024 at 14:56 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Qubo Smart Plug 10A version HSP02_01_01_14_SYSTEM-10A, allows attackers to cause a denial of service (DoS) via Wi-Fi deauthentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yashodhanvivek/Qubo_smart_switch_security_assessment/blob/main/Qubo_Smart_Plug_10A_Security_Assessment.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2886
- **State**: PUBLISHED
- **Published Date**: May 30, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Nortel CS 1000 M media card in Enterprise VoIP-Core-CS 1000E, 1000M, and 1000S 04.50W before 20070523 in Meridian/CS 1000 allows remote attackers to cause a denial of service (card hang) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=58493)
2. [ADV-2007-1927](http://www.vupen.com/english/advisories/2007/1927)
3. [1018128](http://www.securitytracker.com/id?1018128)
4. [36525](http://osvdb.org/36525)
5. [25409](http://secunia.com/advisories/25409)
6. [24131](http://www.securityfocus.com/bid/24131)
7. [](http://www116.nortelnetworks.com/pub/repository/CLARIFY/DOCUMENT/2007/21/022325-01.pdf)
8. [nortel-meridiancs-unspecified-dos(34480)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34480) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24606
- **State**: PUBLISHED
- **Published Date**: August 24, 2020 at 17:06 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg)
2. [](http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch)
3. [DSA-4751](https://www.debian.org/security/2020/dsa-4751)
4. [USN-4477-1](https://usn.ubuntu.com/4477-1/)
5. [FEDORA-2020-73af8655eb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/)
6. [FEDORA-2020-63f3bd656e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/)
7. [openSUSE-SU-2020:1346](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html)
8. [openSUSE-SU-2020:1369](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html)
9. [FEDORA-2020-6c58bff862](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/)
10. [USN-4551-1](https://usn.ubuntu.com/4551-1/)
11. [[debian-lts-announce] 20201002 [SECURITY] [DLA 2394-1] squid3 security update](https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html)
12. [](https://security.netapp.com/advisory/ntap-20210219-0007/)
13. [](https://security.netapp.com/advisory/ntap-20210226-0007/)
14. [](https://security.netapp.com/advisory/ntap-20210226-0006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1985
- **State**: PUBLISHED
- **Published Date**: August 24, 2020 at 15:30 UTC
- **Last Updated**: September 16, 2024 at 16:32 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Trusteer Rapport/Apex 3.6.1908.22 contains an unused legacy driver which could allow a user with administrator privileges to cause a buffer overflow that would result in a kernel panic. IBM X-Force ID: 154207.
### Affected Products
**IBM - Security Trusteer Rapport**
Affected versions:
- 3.6.1908.22 (Status: affected)
**IBM - Security Rapport for MacOS**
Affected versions:
- 3.6.1908.22 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10869212)
2. [ibm-trusteer-cve20181985-dos (154207)](https://exchange.xforce.ibmcloud.com/vulnerabilities/154207) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47383
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:03 UTC
- **Last Updated**: May 04, 2025 at 07:09 UTC
- **Reserved Date**: May 21, 2024 at 14:58 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tty: Fix out-of-bound vmalloc access in imageblit
This issue happens when a userspace program does an ioctl
FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct
containing only the fields xres, yres, and bits_per_pixel
with values.
If this struct is the same as the previous ioctl, the
vc_resize() detects it and doesn't call the resize_screen(),
leaving the fb_var_screeninfo incomplete. And this leads to
the updatescrollmode() calculates a wrong value to
fbcon_display->vrows, which makes the real_y() return a
wrong value of y, and that value, eventually, causes
the imageblit to access an out-of-bound address value.
To solve this issue I made the resize_screen() be called
even if the screen does not need any resizing, so it will
"fix and fill" the fb_var_screeninfo independently.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.4.286 (Status: unaffected)
- 4.9.285 (Status: unaffected)
- 4.14.249 (Status: unaffected)
- 4.19.209 (Status: unaffected)
- 5.4.151 (Status: unaffected)
- 5.10.71 (Status: unaffected)
- 5.14.10 (Status: unaffected)
- 5.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f)
2. [](https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b)
3. [](https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9)
4. [](https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325)
5. [](https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a)
6. [](https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560)
7. [](https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b)
8. [](https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9367
- **State**: PUBLISHED
- **Published Date**: December 31, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 11, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incomplete blacklist vulnerability in the urlEncode function in lib/TWiki.pm in TWiki 6.0.0 and 6.0.1 allows remote attackers to conduct cross-site scripting (XSS) attacks via a "'" (single quote) in the scope parameter to do/view/TWiki/WebSearch.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/129655/TWiki-6.0.0-6.0.1-WebSearch-Cross-Site-Scripting.html)
2. [20141219 TWiki Security Alert CVE-2014-9367: XSS Vulnerability with Scope and Other URL Parameters of WebSearch](http://seclists.org/fulldisclosure/2014/Dec/82)
3. [](http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-9367)
4. [1031400](http://www.securitytracker.com/id/1031400) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11470
- **State**: PUBLISHED
- **Published Date**: May 25, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 00:21 UTC
- **Reserved Date**: May 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iScripts eSwap v2.4 has SQL injection via the "search.php" 'Told' parameter in the User Panel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hi-KK/CVE-Hunter/blob/master/3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32920
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 01:36 UTC
- **Last Updated**: September 30, 2024 at 14:57 UTC
- **Reserved Date**: June 09, 2022 at 18:33 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved checks. This issue is fixed in Xcode 14.0. Parsing a file may lead to disclosure of user information.
### Affected Products
**Apple - Xcode**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213883) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2099
- **State**: PUBLISHED
- **Published Date**: June 17, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the iJoomla RSS Feeder (com_ijoomla_rss) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in an xml action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35379](http://www.securityfocus.com/bid/35379)
2. [8959](https://www.exploit-db.com/exploits/8959)
3. [55113](http://osvdb.org/55113)
4. [35454](http://secunia.com/advisories/35454) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2601
- **State**: PUBLISHED
- **Published Date**: July 15, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Oracle iStore component in Oracle E-Business Suite 12.0.4 has unknown impact and remote authenticated attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html)
2. [ADV-2008-2115](http://www.vupen.com/english/advisories/2008/2115)
3. [1020495](http://www.securitytracker.com/id?1020495)
4. [SSRT061201](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143)
5. [HPSBMA02133](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143)
6. [ADV-2008-2109](http://www.vupen.com/english/advisories/2008/2109/references)
7. [31087](http://secunia.com/advisories/31087)
8. [31113](http://secunia.com/advisories/31113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14388, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14388
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:25 UTC
- **Reserved Date**: July 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
joyplus-cms 1.6.0 has XSS via the manager/admin_ajax.php can_search_device array parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/joyplus/joyplus-cms/issues/429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37110
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 17:58 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 03, 2024 at 11:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Membership Software - WishList Member X**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-unauthenticated-settings-users-data-dump-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27929
- **State**: PUBLISHED
- **Published Date**: December 08, 2020 at 20:13 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.4.9. A user may send video in Group FaceTime calls without knowing that they have done so.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT211940) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33632
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 22:37 UTC
- **Last Updated**: January 02, 2025 at 19:25 UTC
- **Reserved Date**: June 14, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [Microsoft Office Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33632) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21155
- **State**: PUBLISHED
- **Published Date**: February 22, 2021 at 21:20 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in Tab Strip in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html)
2. [](https://crbug.com/1175500)
3. [FEDORA-2021-aa764a8531](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI6ZIJQYP5DFMYVX4J5OGOU2NQLEZ3SB/)
4. [FEDORA-2021-c88a96bd4b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/)
5. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5286
- **State**: PUBLISHED
- **Published Date**: May 29, 2025 at 08:22 UTC
- **Last Updated**: May 29, 2025 at 14:04 UTC
- **Reserved Date**: May 27, 2025 at 19:08 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘additional_settings’ parameter in all versions up to, and including, 5.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**boldthemes - Bold Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae076e4-ad15-4069-be10-f0f4aced4132?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L7)
3. [](https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L156)
4. [](https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L176)
5. [](https://wordpress.org/plugins/bold-page-builder/#developers)
6. [](https://plugins.trac.wordpress.org/changeset/3302452)
7. [](https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.7/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L156)
### Credits
- muhammad yudha |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0697
- **State**: PUBLISHED
- **Published Date**: November 15, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 03:35 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Metabase version 0.29.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**Metabase, Inc. - Metabase**
Affected versions:
- version 0.29.3 and earlier (Status: affected)
### References
1. [JVN#14323043](http://jvn.jp/en/jp/JVN14323043/index.html)
2. [](https://metabase.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4051
- **State**: PUBLISHED
- **Published Date**: July 30, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the FindFiles function in UltraDefrag 1.0.3 allows local users to gain privileges via a file with a long pathname. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ultradefrag-findfiles-bo(35654)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35654)
2. [25102](http://www.securityfocus.com/bid/25102)
3. [](http://sourceforge.net/project/shownotes.php?group_id=199532&release_id=527964)
4. [38624](http://osvdb.org/38624)
5. [](http://sourceforge.net/project/showfiles.php?group_id=199532&package_id=236738&release_id=527964)
6. [26233](http://secunia.com/advisories/26233) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1131, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1131 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1131
- **State**: PUBLISHED
- **Published Date**: March 10, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 10, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in read.php in bitweaver CMS 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the comment_title parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16973](http://www.securityfocus.com/bid/16973)
2. [bitweaver-titlefield-xss(25053)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25053)
3. [](http://kiki91.altervista.org/exploit/bitweaver_1.2.1_XSS.txt)
4. [ADV-2006-0837](http://www.vupen.com/english/advisories/2006/0837)
5. [19101](http://secunia.com/advisories/19101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3913
- **State**: PUBLISHED
- **Published Date**: September 09, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a denial of service (memory consumption) via unspecified vectors related to "error handling logic".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32030](http://secunia.com/advisories/32030)
2. [31051](http://www.securityfocus.com/bid/31051)
3. [31982](http://secunia.com/advisories/31982)
4. [31681](http://www.securityfocus.com/bid/31681)
5. [](https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1141)
6. [clamav-manager-dos(45057)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45057)
7. [[oss-security] 20080904 Re: request for CVE: clamav 0.94 release](http://www.openwall.com/lists/oss-security/2008/09/04/13)
8. [SUSE-SR:2008:018](http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html)
9. [](http://sourceforge.net/project/shownotes.php?group_id=86638&release_id=623661)
10. [MDVSA-2008:189](http://www.mandriva.com/security/advisories?name=MDVSA-2008:189)
11. [[oss-security] 20080903 request for CVE: clamav 0.94 release](http://www.openwall.com/lists/oss-security/2008/09/03/2)
12. [FEDORA-2008-9651](https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html)
13. [32222](http://secunia.com/advisories/32222)
14. [GLSA-200809-18](http://security.gentoo.org/glsa/glsa-200809-18.xml)
15. [](http://kolab.org/security/kolab-vendor-notice-22.txt)
16. [1020828](http://www.securitytracker.com/id?1020828)
17. [DSA-1660](http://www.debian.org/security/2008/dsa-1660)
18. [32424](http://secunia.com/advisories/32424)
19. [ADV-2008-2780](http://www.vupen.com/english/advisories/2008/2780)
20. [ADV-2008-2564](http://www.vupen.com/english/advisories/2008/2564)
21. [32699](http://secunia.com/advisories/32699)
22. [APPLE-SA-2008-10-09](http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html)
23. [](http://support.apple.com/kb/HT3216)
24. [31906](http://secunia.com/advisories/31906)
25. [FEDORA-2008-9644](https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html)
26. [](http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13575
- **State**: PUBLISHED
- **Published Date**: February 10, 2021 at 20:01 UTC
- **Last Updated**: February 13, 2025 at 16:27 UTC
- **Reserved Date**: May 26, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A denial-of-service vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Genivia - gSOAP**
Affected versions:
- 2.8.107 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186)
2. [](https://lists.debian.org/debian-lts-announce/2024/02/msg00015.html)
### Credits
- Discovered by a member of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2543
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 08:23 UTC
- **Last Updated**: April 24, 2025 at 13:57 UTC
- **Reserved Date**: March 20, 2025 at 00:03 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Advanced Accordion Gutenberg Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**spiderdevs - Advanced Accordion Gutenberg Block**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/79752ac3-cb5f-4d86-be58-c4b892e4edd6?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/advanced-accordion-block/tags/4.8.2/advanced-accordion-block.php#L363)
3. [](https://plugins.trac.wordpress.org/browser/advanced-accordion-block/tags/4.8.2/advanced-accordion-block.php#L364)
4. [](https://plugins.trac.wordpress.org/browser/advanced-accordion-block/tags/4.8.2/advanced-accordion-block.php#L369)
5. [](https://wordpress.org/plugins/advanced-accordion-block/#developers)
### Credits
- Avraham Shemesh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6461
- **State**: PUBLISHED
- **Published Date**: January 02, 2013 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 18:49 UTC
- **Reserved Date**: January 02, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The X.509 certificate-validation functionality in the https implementation in Opera before 12.10 allows remote attackers to trigger a false indication of successful revocation-status checking by causing a failure of a single checking service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.opera.com/docs/changelogs/unified/1210/)
2. [](http://www.opera.com/support/kb/view/1029/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7152
- **State**: REJECTED
- **Published Date**: August 17, 2020 at 14:10 UTC
- **Last Updated**: August 17, 2020 at 14:10 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7423
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 15:10 UTC
- **Last Updated**: September 13, 2024 at 20:03 UTC
- **Reserved Date**: August 02, 2024 at 14:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Stream plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.1. This is due to missing or incorrect nonce validation on the network_options_action() function. This makes it possible for unauthenticated attackers to update arbitrary options that can lead to DoS or privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**xwp - Stream**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9d15e418-36bb-4f53-ac67-8f6122591dd2?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/stream/tags/4.0.1/classes/class-network.php#L353)
3. [](https://plugins.trac.wordpress.org/changeset/3139815/stream/trunk/classes/class-network.php)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3501
- **State**: PUBLISHED
- **Published Date**: May 08, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: May 08, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in GroundWork Monitor Enterprise 6.7.0 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the foundation-webapp/admin/ directory, (2) the NeDi component, or (3) the Noma component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls)
2. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-1_GroundWork_Monitoring_Multiple_high_risk_vulnerabilities_part2_wo_poc_v10.txt)
3. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt)
4. [VU#345260](http://www.kb.cert.org/vuls/id/345260) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2032
- **State**: PUBLISHED
- **Published Date**: April 19, 2019 at 19:45 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In SetScanResponseData of ble_advertiser_hci_interface.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-121145627.
### Affected Products
**Android - Android**
Affected versions:
- Android-8.0 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-04-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26690
- **State**: PUBLISHED
- **Published Date**: June 10, 2021 at 07:10 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 04, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
### Affected Products
**Apache Software Foundation - Apache HTTP Server**
Affected versions:
- 2.4.46 (Status: affected)
- 2.4.43 (Status: affected)
- 2.4.41 (Status: affected)
- 2.4.39 (Status: affected)
- 2.4.38 (Status: affected)
- 2.4.37 (Status: affected)
- 2.4.35 (Status: affected)
- 2.4.34 (Status: affected)
- 2.4.33 (Status: affected)
- 2.4.29 (Status: affected)
- 2.4.28 (Status: affected)
- 2.4.27 (Status: affected)
- 2.4.26 (Status: affected)
- 2.4.25 (Status: affected)
- 2.4.23 (Status: affected)
- 2.4.20 (Status: affected)
- 2.4.18 (Status: affected)
- 2.4.17 (Status: affected)
- 2.4.16 (Status: affected)
- 2.4.12 (Status: affected)
- 2.4.10 (Status: affected)
- 2.4.9 (Status: affected)
- 2.4.7 (Status: affected)
- 2.4.6 (Status: affected)
- 2.4.4 (Status: affected)
- 2.4.3 (Status: affected)
- 2.4.2 (Status: affected)
- 2.4.1 (Status: affected)
- 2.4.0 (Status: affected)
### References
1. [](http://httpd.apache.org/security/vulnerabilities_24.html)
2. [](https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E)
3. [[httpd-announce] 20210609 CVE-2021-26690: mod_session NULL pointer dereference](https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E)
4. [[httpd-dev] 20210610 Re: svn commit: r1890598 - in /httpd/site/trunk/content/security/json: CVE-2019-17567.json CVE-2020-13938.json CVE-2020-13950.json CVE-2020-35452.json CVE-2021-26690.json CVE-2021-26691.json CVE-2021-30641.json CVE-2021-31618.json](https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E)
5. [[oss-security] 20210609 CVE-2021-26690: Apache httpd: mod_session NULL pointer dereference](http://www.openwall.com/lists/oss-security/2021/06/10/6)
6. [[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html)
7. [DSA-4937](https://www.debian.org/security/2021/dsa-4937)
8. [GLSA-202107-38](https://security.gentoo.org/glsa/202107-38)
9. [FEDORA-2021-dce7e7738e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/)
10. [FEDORA-2021-e3f6dd670d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/)
11. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
12. [](https://security.netapp.com/advisory/ntap-20210702-0001/)
### Credits
- This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0810
- **State**: PUBLISHED
- **Published Date**: October 03, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 03:34 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38207066.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-10-01)
2. [](https://android.googlesource.com/platform/external/libmpeg2/+/7737780815fe523ad7b0e49456eb75d27a30818a)
3. [101088](http://www.securityfocus.com/bid/101088) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32643
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 15:45 UTC
- **Last Updated**: May 16, 2025 at 16:19 UTC
- **Reserved Date**: April 09, 2025 at 11:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM allows Blind SQL Injection. This issue affects WPGYM: from n/a through 65.0.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**mojoomla - WPGYM**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/gym-management/vulnerability/wordpress-wpgym-plugin-65-0-sql-injection-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11548
- **State**: PUBLISHED
- **Published Date**: April 04, 2020 at 23:48 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/48197)
2. [](https://wordpress.org/plugins/search-meter/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4932
- **State**: PUBLISHED
- **Published Date**: May 05, 2021 at 15:45 UTC
- **Last Updated**: September 16, 2024 at 17:23 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar SIEM 7.3 and 7.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 191748.
### Affected Products
**IBM - QRadar SIEM**
Affected versions:
- 7.3 (Status: affected)
- 7.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6449682)
2. [ibm-qradar-cve20204932-info-disc (191748)](https://exchange.xforce.ibmcloud.com/vulnerabilities/191748) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5970
- **State**: PUBLISHED
- **Published Date**: September 26, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Directory traversal vulnerability in IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93080](http://www.securityfocus.com/bid/93080)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21989205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1852, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1852
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:45 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.5 and iPadOS 14.5. A local user may be able to read kernel memory.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23168
- **State**: PUBLISHED
- **Published Date**: August 18, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:54 UTC
- **Reserved Date**: December 09, 2021 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html)
2. [[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)](https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3794
- **State**: PUBLISHED
- **Published Date**: July 15, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 15, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Hitachi Cosminexus V4 through V7, Processing Kit for XML before 20070511, Developer's Kit for Java before 20070312, and third-party products that use this software, allows attackers to have an unknown impact via certain GIF images, related to use of GIF image processing APIs by a Java application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-2534](http://www.vupen.com/english/advisories/2007/2534)
2. [](http://www.hitachi-support.com/security_e/vuls_e/HS07-018_e/index-e.html)
3. [26025](http://secunia.com/advisories/26025)
4. [37851](http://osvdb.org/37851)
5. [24905](http://www.securityfocus.com/bid/24905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3399
- **State**: PUBLISHED
- **Published Date**: July 12, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 20:05 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Config/diff.php in Basilic 1.5.14 allows remote attackers to execute arbitrary commands via shell metacharacters in the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [basilic-diff-command-execution(76667)](https://exchange.xforce.ibmcloud.com/vulnerabilities/76667)
2. [20120706 Re: Basilic RCE bug](http://archives.neohapsis.com/archives/bugtraq/2012-07/0043.html)
3. [[oss-security] 20120710 CVE-request: Basilic 1.5.14 diff.php remote code execution vulnerability](http://www.openwall.com/lists/oss-security/2012/07/09/4)
4. [19631](http://www.exploit-db.com/exploits/19631)
5. [54234](http://www.securityfocus.com/bid/54234)
6. [20120630 Basilic RCE bug](http://archives.neohapsis.com/archives/bugtraq/2012-07/0002.html)
7. [[oss-security] 20120709 Re: CVE-request: Basilic 1.5.14 diff.php remote code execution vulnerability](http://www.openwall.com/lists/oss-security/2012/07/10/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14323
- **State**: PUBLISHED
- **Published Date**: July 28, 2019 at 12:43 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 28, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/troglobit/ssdp-responder/issues/1)
2. [](https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9627
- **State**: PUBLISHED
- **Published Date**: July 07, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 14, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Uncontrolled Resource Consumption issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The uncontrolled resource consumption vulnerability could allow an attacker to exhaust the memory resources of the machine, causing a denial of service.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**n/a - Schneider Electric Wonderware ArchestrA Logger**
Affected versions:
- Schneider Electric Wonderware ArchestrA Logger (Status: affected)
### References
1. [99488](http://www.securityfocus.com/bid/99488)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-187-04)
3. [](http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000116/)
4. [1038836](http://www.securitytracker.com/id/1038836) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35053
- **State**: PUBLISHED
- **Published Date**: November 03, 2021 at 19:11 UTC
- **Last Updated**: August 04, 2024 at 00:33 UTC
- **Reserved Date**: June 18, 2021 at 00:00 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable.
### Affected Products
**n/a - Kaspersky Endpoint Security for Windows**
Affected versions:
- KES versions from 11.1 to 11.6 (inclusively) (Status: affected)
### References
1. [](https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1280/)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-431/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6587
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2015:0503](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html)
2. [DSA-3144](http://www.debian.org/security/2015/dsa-3144)
3. [RHSA-2015:0079](http://rhn.redhat.com/errata/RHSA-2015-0079.html)
4. [](http://www.vmware.com/security/advisories/VMSA-2015-0003.html)
5. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
6. [RHSA-2015:0264](http://rhn.redhat.com/errata/RHSA-2015-0264.html)
7. [USN-2487-1](http://www.ubuntu.com/usn/USN-2487-1)
8. [RHSA-2015:0085](http://rhn.redhat.com/errata/RHSA-2015-0085.html)
9. [RHSA-2015:0086](http://rhn.redhat.com/errata/RHSA-2015-0086.html)
10. [GLSA-201603-14](https://security.gentoo.org/glsa/201603-14)
11. [SUSE-SU-2015:0336](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html)
12. [RHSA-2015:0080](http://rhn.redhat.com/errata/RHSA-2015-0080.html)
13. [](https://www-304.ibm.com/support/docview.wss?uid=swg21695474)
14. [RHSA-2015:0068](http://rhn.redhat.com/errata/RHSA-2015-0068.html)
15. [USN-2486-1](http://www.ubuntu.com/usn/USN-2486-1)
16. [GLSA-201507-14](https://security.gentoo.org/glsa/201507-14)
17. [SSRT101951](http://marc.info/?l=bugtraq&m=142496355704097&w=2)
18. [HPSBUX03281](http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581)
19. [72168](http://www.securityfocus.com/bid/72168)
20. [SSRT101968](http://marc.info/?l=bugtraq&m=142607790919348&w=2)
21. [openSUSE-SU-2015:0190](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html)
22. [HPSBUX03273](http://marc.info/?l=bugtraq&m=142496355704097&w=2)
23. [1031580](http://www.securitytracker.com/id/1031580)
24. [DSA-3147](http://www.debian.org/security/2015/dsa-3147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24778
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:54 UTC
- **Last Updated**: June 06, 2025 at 16:23 UTC
- **Reserved Date**: January 23, 2025 at 14:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in De paragon No Spam At All allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects No Spam At All: from n/a through 1.3.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**De paragon - No Spam At All**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/no-spam-at-all/vulnerability/wordpress-no-spam-at-all-1-3-broken-access-control-vulnerability?_s_id=cve)
### Credits
- ch4r0n (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16777
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
If HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.3 is installed but VMware Fusion is not, a local attacker can create a fake application directory and exploit the suid sudo helper in order to escalate to root.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html)
2. [43219](https://www.exploit-db.com/exploits/43219/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43574
- **State**: PUBLISHED
- **Published Date**: November 08, 2023 at 22:35 UTC
- **Last Updated**: September 03, 2024 at 20:34 UTC
- **Reserved Date**: September 19, 2023 at 19:57 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A buffer over-read was reported in the LEMALLDriversConnectedEventHook module in some Lenovo Desktop products that may allow a local attacker with elevated privileges
to disclose sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Lenovo - Desktop BIOS**
Affected versions:
- various (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-141775)
### Credits
- Lenovo thanks Zichuan Li (@Ri7erLi) from Indiana University Bloomington for reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5360
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 13:54 UTC
- **Last Updated**: February 13, 2025 at 17:20 UTC
- **Reserved Date**: October 03, 2023 at 13:30 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
### Weakness Classification (CWE)
- CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness
### Affected Products
**Unknown - Royal Elementor Addons and Templates**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/281518ff-7816-4007-b712-63aed7828b34)
2. [](http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html)
### Credits
- Fioravante Souza
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26745
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 11:59 UTC
- **Last Updated**: April 15, 2025 at 13:20 UTC
- **Reserved Date**: February 14, 2025 at 06:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSTheme RS Elements Elementor Addon allows Stored XSS. This issue affects RS Elements Elementor Addon: from n/a through 1.1.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**RSTheme - RS Elements Elementor Addon**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/rselements-lite/vulnerability/wordpress-rs-elements-elementor-addon-plugin-1-1-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Gab (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0165
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NFS cache poisoning.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cve.org/CVERecord?id=CVE-1999-0165) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1242
- **State**: PUBLISHED
- **Published Date**: January 23, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple iTunes before 11.1.4 uses HTTP for the iTunes Tutorials window, which allows man-in-the-middle attackers to spoof content by gaining control over the client-server data stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [65088](http://www.securityfocus.com/bid/65088)
2. [1029671](http://www.securitytracker.com/id/1029671)
3. [102410](http://osvdb.org/102410)
4. [](http://support.apple.com/kb/HT6001)
5. [apple-itunes-cve20141242-mitm(90653)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90653) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0200
- **State**: PUBLISHED
- **Published Date**: February 14, 2022 at 09:21 UTC
- **Last Updated**: August 02, 2024 at 23:18 UTC
- **Reserved Date**: January 12, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
Themify Portfolio Post WordPress plugin before 1.1.7 does not sanitise and escape the num_of_pages parameter before outputting it back the response of the themify_create_popup_page_pagination AJAX action (available to any authenticated user), leading to a Reflected Cross-Site Scripting
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Themify Portfolio Post**
Affected versions:
- 1.1.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/bbc0b812-7b30-4ab4-bac8-27c706b3f146)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4322
- **State**: PUBLISHED
- **Published Date**: August 19, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Content Security Management Appliance (SMA) 8.3.6-039, 9.1.0-31, and 9.1.0-103 improperly restricts the privileges available after LDAP authentication, which allows remote authenticated users to read or write to an arbitrary user's Spam Quarantine folder by visiting a spam-notification URL, aka Bug ID CSCuv65894.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [76365](http://www.securityfocus.com/bid/76365)
2. [20150814 Cisco Security Mail Appliance Email Spam Quarantine Privilege Escalation Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40450)
3. [1033322](http://www.securitytracker.com/id/1033322) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19555
- **State**: PUBLISHED
- **Published Date**: November 26, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
tp4a TELEPORT 3.1.0 has CSRF via user/do-reset-password to change any password, such as the administrator password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Spicy1chicken/test/blob/master/Loophole_details.doc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32796
- **State**: PUBLISHED
- **Published Date**: July 27, 2021 at 21:45 UTC
- **Last Updated**: August 03, 2024 at 23:33 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-116: Security Weakness
### Affected Products
**xmldom - xmldom**
Affected versions:
- < 0.7.0 (Status: affected)
### References
1. [](https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/)
2. [](https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q)
3. [](https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42505
- **State**: PUBLISHED
- **Published Date**: September 24, 2024 at 18:09 UTC
- **Last Updated**: September 26, 2024 at 03:55 UTC
- **Reserved Date**: August 02, 2024 at 17:04 UTC
- **Assigned By**: hpe
### Vulnerability Description
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba OS**
Affected versions:
- Version 10.5.0.0: 10.6.0.2 and below (Status: affected)
- Version 10.0.0.0: 10.4.1.13 and below (Status: affected)
- Version 6.4.0.0: 8.10.0.13 and below (Status: affected)
- Version 8.11.0.0: 8.12.0.1 and below (Status: affected)
### References
1. [](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04712en_us&docLocale=en_US)
### Credits
- erikdejong |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0498
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 15:37 UTC
- **Last Updated**: February 19, 2025 at 20:22 UTC
- **Reserved Date**: January 25, 2023 at 10:07 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Education WordPress plugin before 1.2.7 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WP Education**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/8fa051ad-5b35-46d8-be95-0ac4e73d5eff)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25709
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 04:43 UTC
- **Last Updated**: March 05, 2025 at 16:44 UTC
- **Reserved Date**: February 22, 2022 at 11:38 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in modem due to use of out of range pointer offset while processing qmi msg
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-823: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCN6024 (Status: affected)
- QCN9024 (Status: affected)
- QCX315 (Status: affected)
- SA515M (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD480 (Status: affected)
- SD675 (Status: affected)
- SD678 (Status: affected)
- SD690 5G (Status: affected)
- SD695 (Status: affected)
- SD720G (Status: affected)
- SD730 (Status: affected)
- SD750G (Status: affected)
- SD765 (Status: affected)
- SD765G (Status: affected)
- SD768G (Status: affected)
- SD7c (Status: affected)
- SD820 (Status: affected)
- SD821 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDX65 (Status: affected)
- SDX70M (Status: affected)
- SDXR2 5G (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- Snapdragon 4 Gen 1 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3991 (Status: affected)
- WCN3998 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WCN7850 (Status: affected)
- WCN7851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33884
- **State**: PUBLISHED
- **Published Date**: August 25, 2021 at 11:20 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Unrestricted Upload of File with Dangerous Type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API. This can result in critical files being overwritten.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.bbraunusa.com/en.htm)
2. [](https://www.mcafee.com/blogs/enterprise/mcafee-enterprise-atr/mcafee-enterprise-atr-uncovers-vulnerabilities-in-globally-used-b-braun-infusion-pump/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3041
- **State**: PUBLISHED
- **Published Date**: February 02, 2011 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 17, 2010 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted (1) .wrf or (2) .arf file, related to atas32.dll, a different vulnerability than CVE-2010-3042, CVE-2010-3043, and CVE-2010-3044.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20110201 Multiple Cisco WebEx Player Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6913f.shtml)
2. [webex-arf-bo(65072)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65072)
3. [](http://www.fortiguard.com/advisory/FGA-2011-03.html)
4. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=22016)
5. [46075](http://www.securityfocus.com/bid/46075)
6. [1025016](http://securitytracker.com/id?1025016) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46227
- **State**: REJECTED
- **Last Updated**: January 27, 2023 at 00:00 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29070
- **State**: PUBLISHED
- **Published Date**: March 23, 2021 at 07:00 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000063019/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Routers-PSV-2020-0530) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22067
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 21:02 UTC
- **Last Updated**: August 02, 2024 at 09:59 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: CORBA). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf; Oracle GraalVM Enterprise Edition: 20.3.11 and 21.3.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via CORBA to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u381 (Status: affected)
- Oracle Java SE:8u381-perf (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.11 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.7 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html)
2. [](https://security.netapp.com/advisory/ntap-20231027-0006/)
3. [](https://www.debian.org/security/2023/dsa-5537) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26826
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 19:05 UTC
- **Last Updated**: January 02, 2025 at 18:52 UTC
- **Reserved Date**: March 09, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows DNS Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows DNS Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26826) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.