System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0260
- **State**: PUBLISHED
- **Published Date**: February 10, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:05 UTC
- **Reserved Date**: February 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14183](http://secunia.com/advisories/14183)
2. [20050209 Computer Associates BrightStor ARCserve Backup v11 Discovery Service Remote Buffer Overflow Vulnerability](http://www.idefense.com/application/poi/display?id=194&type=vulnerabilities)
3. [](http://supportconnectw.ca.com/public/enews/BrightStor/brigcurrent.asp#news1)
4. [brightstor-discovery-bo(19251)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19251)
5. [1013138](http://securitytracker.com/id?1013138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0866
- **State**: PUBLISHED
- **Published Date**: June 02, 2000 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in UnixWare xauto program allows local users to gain root privilege.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19991220 SCO OpenServer Security Status](http://marc.info/?l=bugtraq&m=94581379905584&w=2)
2. [19991215 Recent postings about SCO UnixWare 7](http://marc.info/?l=bugtraq&m=94530783815434&w=2)
3. [848](http://www.securityfocus.com/bid/848)
4. [SB-99.24a](ftp://ftp.sco.com/SSE/security_bulletins/SB-99.24a)
5. [19991223 FYI, SCO Security patches available.](http://marc.info/?l=bugtraq&m=94606167110764&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28661
- **State**: PUBLISHED
- **Published Date**: October 07, 2021 at 14:06 UTC
- **Last Updated**: August 03, 2024 at 21:47 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/silverstripe/silverstripe-graphql/releases)
2. [](https://www.silverstripe.org/download/security-releases/CVE-2021-28661) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47436
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 10:17 UTC
- **Last Updated**: August 03, 2024 at 14:55 UTC
- **Reserved Date**: December 15, 2022 at 00:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MantraBrain Yatra allows Stored XSS.This issue affects Yatra: from n/a through 2.1.14.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**MantraBrain - Yatra**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/yatra/wordpress-best-travel-booking-wordpress-plugin-tour-booking-system-trip-booking-wordpress-plugin-yatra-plugin-2-1-13-cross-site-scripting-xss?_s_id=cve)
### Credits
- TEAM WEBoB of BoB 11th (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2650
- **State**: PUBLISHED
- **Published Date**: July 06, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 02:39 UTC
- **Reserved Date**: July 06, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Google Chrome before 5.0.375.99 has unknown impact and attack vectors, related to an "annoyance with print dialogs."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html)
2. [](http://code.google.com/p/chromium/issues/detail?id=46575)
3. [oval:org.mitre.oval:def:11438](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11438) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23676
- **State**: PUBLISHED
- **Published Date**: May 16, 2023 at 08:35 UTC
- **Last Updated**: January 09, 2025 at 15:15 UTC
- **Reserved Date**: January 17, 2023 at 05:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Bruno "Aesqe" Babic File Gallery plugin <= 1.8.5.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Bruno "Aesqe" Babic - File Gallery**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/file-gallery/wordpress-file-gallery-plugin-1-8-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Lana Codes (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1000362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1000362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1000362
- **State**: REJECTED
- **Published Date**: May 07, 2017 at 07:31 UTC
- **Last Updated**: September 16, 2024 at 17:39 UTC
- **Reserved Date**: May 06, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1593
- **State**: PUBLISHED
- **Published Date**: October 02, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:34 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Multi-Cloud Data Encryption (MDE) 2.1 could allow an unauthorized user to manipulate data due to missing file checksums. IBM X-Force ID: 143568.
### Affected Products
**IBM - Multi-Cloud Data Encryption**
Affected versions:
- 2.1 (Status: affected)
### References
1. [ibm-mde-cve20181593-data-manipulation(143568)](https://exchange.xforce.ibmcloud.com/vulnerabilities/143568)
2. [](https://www-01.ibm.com/support/docview.wss?uid=swg22016681) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4182
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 23:00 UTC
- **Last Updated**: May 02, 2025 at 14:05 UTC
- **Reserved Date**: May 01, 2025 at 12:44 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component BELL Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**PCMan - FTP Server**
Affected versions:
- 2.0.7 (Status: affected)
### References
1. [VDB-306800 | PCMan FTP Server BELL Command buffer overflow](https://vuldb.com/?id.306800)
2. [VDB-306800 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.306800)
3. [Submit #561141 | PCMan FTP Server 2.0.7 Buffer Overflow](https://vuldb.com/?submit.561141)
4. [](https://fitoxs.com/exploit/exploit-e99a18c428cb38d5f260853678922e03.txt)
### Credits
- Fernando Mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20251
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 15:49 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
### Weakness Classification (CWE)
- CWE-362: Security Weakness
### Affected Products
**n/a - samba**
Affected versions:
- Samba 4.1 and newer (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1929800)
2. [](https://bugzilla.samba.org/show_bug.cgi?id=14611)
3. [](https://security.netapp.com/advisory/ntap-20230331-0005/)
4. [GLSA-202309-06](https://security.gentoo.org/glsa/202309-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11866
- **State**: PUBLISHED
- **Published Date**: October 29, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 07, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Integer overflow may happen in WLAN when calculating an internal structure size due to lack of validation of the input length in Snapdragon Mobile, Snapdragon Wear in version IPQ8074, MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- IPQ8074, MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32536
- **State**: PUBLISHED
- **Published Date**: June 22, 2022 at 13:55 UTC
- **Last Updated**: August 03, 2024 at 07:46 UTC
- **Reserved Date**: June 07, 2022 at 00:00 UTC
- **Assigned By**: bosch
### Vulnerability Description
The user access rights validation in the web server of the Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 was insufficient. This would allow a non-administrator user to obtain administrator user access rights.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Bosch - PRA-ES8P2S**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://psirt.bosch.com/security-advisories/BOSCH-SA-247052-BT.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0638
- **State**: PUBLISHED
- **Published Date**: February 12, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 14:33 UTC
- **Reserved Date**: December 18, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0647.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2013:0296](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html)
2. [RHSA-2013:0254](http://rhn.redhat.com/errata/RHSA-2013-0254.html)
3. [openSUSE-SU-2013:0295](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html)
4. [openSUSE-SU-2013:0298](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html)
5. [TA13-043A](http://www.us-cert.gov/cas/techalerts/TA13-043A.html)
6. [](http://www.adobe.com/support/security/bulletins/apsb13-05.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0235
- **State**: PUBLISHED
- **Published Date**: January 18, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in WhiteAlbum 2.5 allows remote attackers to execute arbitrary SQL commands via the dir parameter to pictures.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-0241](http://www.vupen.com/english/advisories/2006/0241)
2. [22520](http://www.osvdb.org/22520)
3. [16247](http://www.securityfocus.com/bid/16247)
4. [18460](http://secunia.com/advisories/18460)
5. [](http://www.biyosecurity.be/bugs/whitealbum.txt)
6. [20060116 White Album Sql İnjection biyosecurity.be](http://www.securityfocus.com/archive/1/422105/100/0/threaded)
7. [whitealbum-pictures-sql-injection(24271)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24271) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5758
- **State**: PUBLISHED
- **Published Date**: November 23, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: November 02, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The IBM WebSphere DataPower XC10 Appliance 2.0.0.0 through 2.0.0.3 and 2.1.0.0 through 2.1.0.2 does not require authentication for an unspecified interface, which allows remote attackers to cause a denial of service (process exit) via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg24033740)
2. [56617](http://www.securityfocus.com/bid/56617)
3. [1027798](http://www.securitytracker.com/id?1027798)
4. [51319](http://secunia.com/advisories/51319)
5. [websphere-datapower-admin-dos(80063)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80063)
6. [IC86908](http://www-01.ibm.com/support/docview.wss?uid=swg1IC86908)
7. [](http://www-01.ibm.com/support/docview.wss?uid=swg21615783) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5355
- **State**: PUBLISHED
- **Published Date**: December 05, 2007 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 15:24 UTC
- **Reserved Date**: October 10, 2007 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Web Proxy Auto-Discovery (WPAD) feature in Microsoft Internet Explorer 6 and 7, when a primary DNS suffix with three or more components is configured, resolves an unqualified wpad hostname in a second-level domain outside this configured DNS domain, which allows remote WPAD servers to conduct man-in-the-middle (MITM) attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-4064](http://www.vupen.com/english/advisories/2007/4064)
2. [26686](http://www.securityfocus.com/bid/26686)
3. [](http://www.microsoft.com/technet/security/advisory/945713.mspx)
4. [1019033](http://www.securitytracker.com/id?1019033)
5. [27901](http://secunia.com/advisories/27901)
6. [945713](http://support.microsoft.com/kb/945713) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27594
- **State**: PUBLISHED
- **Published Date**: March 22, 2021 at 16:58 UTC
- **Last Updated**: August 03, 2024 at 21:26 UTC
- **Reserved Date**: February 23, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
When a user opens manipulated Windows Bitmap (.BMP) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Viewer**
Affected versions:
- < 9 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107)
2. [](https://launchpad.support.sap.com/#/notes/3035472) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2208
- **State**: PUBLISHED
- **Published Date**: May 05, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:43 UTC
- **Reserved Date**: May 05, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in mynews.inc.php in MyNews 1.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) hash and (2) page parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cyber-soldiers.org/Dream/mynews.txt)
2. [25223](http://www.osvdb.org/25223)
3. [ADV-2006-1635](http://www.vupen.com/english/advisories/2006/1635)
4. [19935](http://secunia.com/advisories/19935)
5. [mynews-mynews-xss(26199)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26199)
6. [17823](http://www.securityfocus.com/bid/17823) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6727
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 17:52 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: July 12, 2024 at 22:08 UTC
- **Assigned By**: Perforce
### Vulnerability Description
A flaw in versions of Delphix Data Control Tower (DCT) prior to 19.0.0 results in broken authentication through the enable-scale-testing functionality of the application.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Delphix - Data Control Tower (DCT)**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://portal.perforce.com/s/detail/a91PA000001SUFVYA4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40850
- **State**: PUBLISHED
- **Published Date**: December 17, 2021 at 16:10 UTC
- **Last Updated**: September 16, 2024 at 16:18 UTC
- **Reserved Date**: September 10, 2021 at 00:00 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**TCMAN - GIM**
Affected versions:
- 8.0 (Status: affected)
- 11.0 (Status: affected)
### References
1. [](https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-sql-injection-vulnerability)
### Credits
- Francisco Palma, Luis Vázquez and Diego León |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3647
- **State**: PUBLISHED
- **Published Date**: April 25, 2025 at 14:43 UTC
- **Last Updated**: April 28, 2025 at 16:25 UTC
- **Reserved Date**: April 15, 2025 at 13:14 UTC
- **Assigned By**: fedora
### Vulnerability Description
A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Unknown - Unknown**
Affected versions:
- 4.5.0 (Status: affected)
- 4.4.0 (Status: affected)
- 4.3.0 (Status: affected)
- 4.1.0 (Status: affected)
### References
1. [](https://access.redhat.com/security/cve/CVE-2025-3647)
2. [RHBZ#2359762](https://bugzilla.redhat.com/show_bug.cgi?id=2359762)
3. [](https://moodle.org/mod/forum/discuss.php?d=467607)
### Credits
- Red Hat would like to thank Paul Holden for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15027
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 12:03 UTC
- **Last Updated**: August 05, 2024 at 00:34 UTC
- **Reserved Date**: August 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system("/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnerability that allows creation of the required file under /data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://dojo.bullguard.com/dojo-by-bullguard/blog/gaining-rooting-primitives-for-android-mediatek-chips/)
2. [](https://github.com/andr3jx/MTK6577/blob/238012ebf18e3751397884d1742ff7ab6417e80d/mediatek/platform/mt6577/external/meta/emmc/meta_clr_emmc.c#L302-L305) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2490
- **State**: PUBLISHED
- **Published Date**: May 03, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 03, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in LiveData Server before 5.00.62 allows remote attackers to cause a denial of service (exit) via crafted Connection-Oriented Transport Protocol (COTP) packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-1633](http://www.vupen.com/english/advisories/2007/1633)
2. [35530](http://osvdb.org/35530)
3. [23775](http://www.securityfocus.com/bid/23775)
4. [VU#711420](http://www.kb.cert.org/vuls/id/711420)
5. [](http://www.kb.cert.org/vuls/id/MIMG-6Q3NFD)
6. [livedata-cotp-dos(34029)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34029)
7. [25113](http://secunia.com/advisories/25113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57707
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 16:52 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in DataEase v1 allows an attacker to execute arbitrary code via the user account and password components.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/shigophilo/CVE/blob/main/DataEase-v1-code-execute.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2955
- **State**: PUBLISHED
- **Published Date**: March 30, 2025 at 17:31 UTC
- **Last Updated**: April 01, 2025 at 14:37 UTC
- **Reserved Date**: March 29, 2025 at 19:41 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in TOTOLINK A3000RU up to 5.9c.5185 and classified as problematic. This vulnerability affects unknown code of the file /cgi-bin/ExportIbmsConfig.sh of the component IBMS Configuration File Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-266: Security Weakness
### Affected Products
**TOTOLINK - A3000RU**
Affected versions:
- 5.9c.5185 (Status: affected)
### References
1. [VDB-302008 | TOTOLINK A3000RU IBMS Configuration File ExportIbmsConfig.sh access control](https://vuldb.com/?id.302008)
2. [VDB-302008 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.302008)
3. [Submit #521567 | TOTOLINK A3000RU A3000RU_Firmware V5.9c.5185 Improper Access Controls](https://vuldb.com/?submit.521567)
4. [](https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3000RU-ExportIbmsConfig-1b953a41781f80b89397e8c34717eb94?pvs=4)
5. [](https://www.totolink.net/)
### Credits
- yhryhryhr_miemie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7835
- **State**: PUBLISHED
- **Published Date**: September 23, 2024 at 11:31 UTC
- **Last Updated**: September 23, 2024 at 17:34 UTC
- **Reserved Date**: August 15, 2024 at 08:34 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exnet Informatics Software Ferry Reservation System allows Reflected XSS.This issue affects Ferry Reservation System: before 240805-002.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Exnet Informatics Software - Ferry Reservation System**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-1518)
### Credits
- Yağız BİLGİLİ
- Privia Security Inc. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3917
- **State**: PUBLISHED
- **Published Date**: November 13, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3915.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA13-317A](http://www.us-cert.gov/ncas/alerts/TA13-317A)
2. [oval:org.mitre.oval:def:19138](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19138)
3. [MS13-088](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-088) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0406
- **State**: PUBLISHED
- **Published Date**: February 08, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 13:03 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. This affects the libhevc library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32915871.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-6.0 (Status: affected)
- Android-6.0.1 (Status: affected)
- Android-7.0 (Status: affected)
- Android-7.1.1 (Status: affected)
### References
1. [1037798](http://www.securitytracker.com/id/1037798)
2. [96046](http://www.securityfocus.com/bid/96046)
3. [](https://source.android.com/security/bulletin/2017-02-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1538
- **State**: PUBLISHED
- **Published Date**: March 28, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in searchAction.do in ManageEngine EventLog Analyzer 5 allows remote attackers to inject arbitrary web script or HTML via the searchText parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Fixed in EventLog Analyzer 10.0 Build 10000.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [eventloganalyzer-searchaction-xss(41408)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41408)
2. [29524](http://secunia.com/advisories/29524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4524
- **State**: PUBLISHED
- **Published Date**: January 27, 2021 at 16:15 UTC
- **Last Updated**: September 16, 2024 at 19:09 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182434.
### Affected Products
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational Team Concert**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational Quality Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational DOORS Next Generation**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
**IBM - Engineering Lifecycle Optimization**
Affected versions:
- 7.0 (Status: affected)
**IBM - Rational Rhapsody Design Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Engineering Test Management**
Affected versions:
- 7.0.0 (Status: affected)
**IBM - Rational Engineering Lifecycle Manager**
Affected versions:
- 7.0 (Status: affected)
**IBM - Engineering Workflow Management**
Affected versions:
- 7.0 (Status: affected)
- 7.0.2 (Status: affected)
**IBM - Rational Rhapsody Model Manager**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 6.0.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6408694)
2. [ibm-jazz-cve20204524-xss (182434)](https://exchange.xforce.ibmcloud.com/vulnerabilities/182434) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5566
- **State**: PUBLISHED
- **Published Date**: October 25, 2016 at 14:00 UTC
- **Last Updated**: October 10, 2024 at 18:25 UTC
- **Reserved Date**: June 16, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Sun Solaris 11.3 allows remote attackers to affect confidentiality via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1037048](http://www.securitytracker.com/id/1037048)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html)
3. [93749](http://www.securityfocus.com/bid/93749) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4458
- **State**: PUBLISHED
- **Published Date**: December 30, 2009 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [61357](http://osvdb.org/61357)
2. [freepbx-zap-xss(55054)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55054)
3. [10645](http://www.exploit-db.com/exploits/10645)
4. [37972](http://secunia.com/advisories/37972)
5. [freepbx-tech-xss(55053)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55053)
6. [61358](http://osvdb.org/61358)
7. [37482](http://www.securityfocus.com/bid/37482) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1444
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 15:31 UTC
- **Last Updated**: November 18, 2024 at 15:51 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see .
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Adaptive Security Appliance (ASA) Software**
Affected versions:
- 9.4.2.6 (Status: affected)
- 9.0.1.1 (Status: affected)
- 9.0.1.2 (Status: affected)
- 9.0.1.4 (Status: affected)
- 9.0.2.12 (Status: affected)
- 9.0.2.2 (Status: affected)
- 9.0.2.6 (Status: affected)
- 9.0.3.1 (Status: affected)
- 9.0.3.10 (Status: affected)
- 9.0.3.3 (Status: affected)
- 9.1.1.2 (Status: affected)
- 9.1.1.7 (Status: affected)
- 9.1.1.8 (Status: affected)
- 9.1.2.3 (Status: affected)
- 9.1.2.5 (Status: affected)
- 9.1.2.6 (Status: affected)
- 9.1.3.4 (Status: affected)
- 9.1.4.3 (Status: affected)
- 9.1.4.6 (Status: affected)
- 9.1.5.1 (Status: affected)
- 9.1.5.2 (Status: affected)
- 9.1.5.3 (Status: affected)
- 9.1.5.6 (Status: affected)
- 9.1.5.7 (Status: affected)
- 9.4.2.11 (Status: affected)
- 9.5.3.1 (Status: affected)
- 9.1.2 (Status: affected)
- 9.3.1 (Status: affected)
### References
1. [cisco-sa-asaftd-xss-webui-gQLSFyPM](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0693
- **State**: PUBLISHED
- **Published Date**: September 17, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: August 14, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1000620](http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000620.1-1)
2. [20030915 new ssh exploit?](http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010103.html)
3. [20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh)](http://marc.info/?l=bugtraq&m=106381409220492&w=2)
4. [openssh-packet-bo(13191)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13191)
5. [DSA-383](http://www.debian.org/security/2003/dsa-383)
6. [20030916 [slackware-security] OpenSSH Security Advisory (SSA:2003-259-01)](http://marc.info/?l=bugtraq&m=106374466212309&w=2)
7. [](http://www.openssh.com/txt/buffer.adv)
8. [RHSA-2003:280](http://www.redhat.com/support/errata/RHSA-2003-280.html)
9. [CA-2003-24](http://www.cert.org/advisories/CA-2003-24.html)
10. [20030915 openssh remote exploit](http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010135.html)
11. [oval:org.mitre.oval:def:2719](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2719)
12. [2003-0033](http://marc.info/?l=bugtraq&m=106381396120332&w=2)
13. [20030916 The lowdown on SSH vulnerability](http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010146.html)
14. [DSA-382](http://www.debian.org/security/2003/dsa-382)
15. [20030916 OpenSSH Buffer Management Bug Advisory](http://marc.info/?l=bugtraq&m=106373247528528&w=2)
16. [MDKSA-2003:090](http://www.mandriva.com/security/advisories?name=MDKSA-2003:090)
17. [oval:org.mitre.oval:def:447](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A447)
18. [RHSA-2003:279](http://marc.info/?l=bugtraq&m=106373546332230&w=2)
19. [VU#333628](http://www.kb.cert.org/vuls/id/333628)
20. [[oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems](http://www.openwall.com/lists/oss-security/2024/07/01/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25502
- **State**: PUBLISHED
- **Published Date**: January 20, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 17:47 UTC
- **Reserved Date**: September 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cybereason EDR version 19.1.282 and above, 19.2.182 and above, 20.1.343 and above, and 20.2.X and above has a DLL hijacking vulnerability, which could allow a local attacker to execute code with elevated privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://endpoint.com)
2. [](http://cybereason.com)
3. [](https://www.cybereason.com/cybereason-vulnerability-disclosure) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37265
- **State**: PUBLISHED
- **Published Date**: July 17, 2023 at 20:59 UTC
- **Last Updated**: December 12, 2024 at 20:45 UTC
- **Reserved Date**: June 29, 2023 at 19:35 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**IceWhaleTech - CasaOS-Gateway**
Affected versions:
- < 0.4.4 (Status: affected)
### References
1. [https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6g](https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6g)
2. [https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7](https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7)
3. [https://www.sonarsource.com/blog/security-vulnerabilities-in-casaos](https://www.sonarsource.com/blog/security-vulnerabilities-in-casaos) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48768
- **State**: PUBLISHED
- **Published Date**: December 18, 2023 at 21:55 UTC
- **Last Updated**: August 02, 2024 at 21:37 UTC
- **Reserved Date**: November 18, 2023 at 22:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in CodeAstrology Team Quantity Plus Minus Button for WooCommerce by CodeAstrology.This issue affects Quantity Plus Minus Button for WooCommerce by CodeAstrology: from n/a through 1.1.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**CodeAstrology Team - Quantity Plus Minus Button for WooCommerce by CodeAstrology**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wc-quantity-plus-minus-button/wordpress-quantity-plus-minus-button-for-woocommerce-by-codeastrology-plugin-1-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Elliot (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10774
- **State**: PUBLISHED
- **Published Date**: May 07, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Read access violation in the isiin_keyword function in isiin.c in libbibutils.a in bibutils through 6.2 allows remote attackers to cause a denial of service (application crash), as demonstrated by isi2xml.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.google.com/document/d/1BuCxbXaGL_3DyaWF8sGnMAWolmYQneRrxHt4mNPkBE4/edit) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8063
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 08, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46087
- **State**: PUBLISHED
- **Published Date**: January 25, 2022 at 15:56 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In jfinal_cms >= 5.1 0, there is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jflyfox/jfinal_cms/issues/19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36214
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:52 UTC
- **Last Updated**: October 07, 2024 at 13:20 UTC
- **Reserved Date**: May 21, 2024 at 17:07 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0968
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 11:10 UTC
- **Last Updated**: February 19, 2025 at 14:37 UTC
- **Reserved Date**: February 01, 2025 at 21:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.0 due to a missing capability checks on the get_megamenu_content() function. This makes it possible for unauthenticated attackers to view any item created in Elementor, such as posts, pages and templates including drafts, trashed and private items.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**xpeedstudio - ElementsKit Elementor addons**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/432ac3b1-8f1d-442f-8e8d-62a1f26ba259?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/modules/megamenu/api.php#L47)
3. [](https://wordpress.org/plugins/elementskit-lite/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3237243/)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18293
- **State**: PUBLISHED
- **Published Date**: October 23, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: June 15, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
When a particular GPIO is protected by blocking access to the corresponding GPIO resource registers, the protection can be bypassed using the corresponding banked GPIO registers instead in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins)
2. [1041432](http://www.securitytracker.com/id/1041432)
3. [](https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5808, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5808 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5808
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 10, 2024 at 18:55 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Ajax Contact Form WordPress plugin through 2.2.2 does not have CSRF check in place when deleting emails from the email list, which could allow attackers to make a logged in admin perform such action via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WP Ajax Contact Form**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/)
### Credits
- Bob Matyas
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6519
- **State**: PUBLISHED
- **Published Date**: July 22, 2020 at 16:16 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1064676)
3. [openSUSE-SU-2020:1061](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html)
4. [GLSA-202007-08](https://security.gentoo.org/glsa/202007-08)
5. [FEDORA-2020-bf684961d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/)
6. [FEDORA-2020-84d87cbd50](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/)
7. [openSUSE-SU-2020:1148](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html)
8. [openSUSE-SU-2020:1172](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html)
9. [openSUSE-SU-2020:1048](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html)
10. [](http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html)
11. [DSA-4824](https://www.debian.org/security/2021/dsa-4824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13963
- **State**: PUBLISHED
- **Published Date**: March 21, 2021 at 20:57 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 09, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forum.soplanning.org/viewforum.php?f=8)
2. [](https://labs.integrity.pt/advisories/cve-2020-13963/)
3. [](https://cwe.mitre.org/data/definitions/321.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2036
- **State**: PUBLISHED
- **Published Date**: July 14, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 17:03 UTC
- **Reserved Date**: July 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sun Ray Server Software (SRSS) 1.3, when Non-Smartcard Mobility (NSCM) is enabled, allows remote attackers to login as another user by running dtlogin from a system that supports the XDMCP client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44069](http://sunsolve.sun.com/search/document.do?assetkey=1-26-44069-1)
2. [4911](http://www.securityfocus.com/bid/4911)
3. [srss-nscm-unauthorized-access(9252)](http://www.iss.net/security_center/static/9252.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3505
- **State**: PUBLISHED
- **Published Date**: August 06, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:45 UTC
- **Reserved Date**: August 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in PolyPager 1.0 rc2 and earlier allows remote attackers to inject arbitrary web script or HTML via the nr parameter to the default URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4116](http://securityreason.com/securityalert/4116)
2. [29975](http://www.securityfocus.com/bid/29975)
3. [5941](https://www.exploit-db.com/exploits/5941)
4. [polypager-nr-xss(43372)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43372) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3479
- **State**: PUBLISHED
- **Published Date**: March 31, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**n/a - OpenEXR**
Affected versions:
- OpenEXR 3.0.0-beta (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939149)
2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370)
3. [[debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html)
4. [GLSA-202107-27](https://security.gentoo.org/glsa/202107-27)
5. [[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0764
- **State**: PUBLISHED
- **Published Date**: July 14, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 16, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Race condition in Network Manager before 1.0.12 as packaged in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows local users to obtain sensitive connection information by reading temporary files during ifcfg and keyfile changes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:2581](http://rhn.redhat.com/errata/RHSA-2016-2581.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1324025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39070
- **State**: PUBLISHED
- **Published Date**: February 02, 2022 at 12:04 UTC
- **Last Updated**: September 16, 2024 at 18:54 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify Access 10.0.0.0, 10.0.1.0 and 10.0.2.0 with the advanced access control authentication service enabled could allow an attacker to authenticate as any user on the system. IBM X-Force ID: 215353.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6552318)
2. [ibm-sam-cve202139070-priv-escalation (215353)](https://exchange.xforce.ibmcloud.com/vulnerabilities/215353) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37857
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 06:42 UTC
- **Last Updated**: May 26, 2025 at 05:22 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: st: Fix array overflow in st_setup()
Change the array size to follow parms size instead of a fixed value.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4.293 (Status: unaffected)
- 5.10.237 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08)
2. [](https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43)
3. [](https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55)
4. [](https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639)
5. [](https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96)
6. [](https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423)
7. [](https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256)
8. [](https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06)
9. [](https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5604
- **State**: PUBLISHED
- **Published Date**: February 09, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 15:04 UTC
- **Reserved Date**: January 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for mcabber 1.0.0 - 1.0.4.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96184](http://www.securityfocus.com/bid/96184)
2. [](http://openwall.com/lists/oss-security/2017/02/09/29)
3. [](https://mcabber.com/hg/rev/2a9569fd7644)
4. [](https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/)
5. [](https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1726
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 19:45 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 27, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**The - podman**
Affected versions:
- from 1.6.0 onwards (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726)
2. [RHSA-2020:0680](https://access.redhat.com/errata/RHSA-2020:0680)
3. [openSUSE-SU-2020:1552](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html)
4. [openSUSE-SU-2020:1559](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23884
- **State**: PUBLISHED
- **Published Date**: April 15, 2021 at 07:30 UTC
- **Last Updated**: August 03, 2024 at 19:14 UTC
- **Reserved Date**: January 12, 2021 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Cleartext Transmission of Sensitive Information vulnerability in the ePO Extension of McAfee Content Security Reporter (CSR) prior to 2.8.0 allows an ePO administrator to view the unencrypted password of the McAfee Web Gateway (MWG) or the password of the McAfee Web Gateway Cloud Server (MWGCS) read only user used to retrieve log files for analysis in CSR.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**McAfee,LLC - McAfee Content Security Reporter (CSR)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10353) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44540
- **State**: PUBLISHED
- **Published Date**: December 23, 2021 at 19:48 UTC
- **Last Updated**: August 04, 2024 at 04:25 UTC
- **Reserved Date**: December 03, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**n/a - Privoxy**
Affected versions:
- Privoxy 3.0.33 (Status: affected)
### References
1. [](https://www.privoxy.org/3.0.33/user-manual/whatsnew.html%2C)
2. [](https://www.privoxy.org/gitweb/?p=privoxy.git%3Ba=commit%3Bh=652b4b7cb0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32067
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 22:49 UTC
- **Last Updated**: February 13, 2025 at 16:50 UTC
- **Reserved Date**: May 01, 2023 at 16:47 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**c-ares - c-ares**
Affected versions:
- < 1.19.1 (Status: affected)
### References
1. [https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc](https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc)
2. [https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1](https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/)
5. [](https://www.debian.org/security/2023/dsa-5419)
6. [](https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html)
7. [](https://security.gentoo.org/glsa/202310-09)
8. [](https://security.netapp.com/advisory/ntap-20240605-0004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20693
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 14:29 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC505 before 8.0.6.4 and WAC510 before 8.0.6.4.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061236/Security-Advisory-for-Security-Misconfiguration-on-WAC505-and-WAC510-PSV-2019-0084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20700
- **State**: PUBLISHED
- **Published Date**: July 27, 2021 at 22:19 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross site scripting (XSS) vulnerability in /app/form_add/of S-CMS PHP v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the Title Entry text box.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Peithon/recycle_XSS/blob/master/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5883
- **State**: PUBLISHED
- **Published Date**: June 14, 2019 at 17:02 UTC
- **Last Updated**: August 05, 2024 at 05:47 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer overflow in WLAN driver event handlers due to improper validation of array index in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS405, QCS605, SD 636, SD 675, SD 730, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music**
Affected versions:
- MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS405, QCS605, SD 636, SD 675, SD 730, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18769
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 14:54 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects D6220 before 1.0.0.40, D6400 before 1.0.0.74, D7000 before 1.0.1.60, D7800 before 1.0.1.34, D8500 before 1.0.3.39, DGN2200v4 before 1.0.0.94, DGN2200Bv4 before 1.0.0.94, EX6200v2 before 1.0.1.50, EX7000 before 1.0.0.56, JR6150 before 1.0.1.18, R6050 before 1.0.1.10J, R6100 before 1.0.1.16, R6150 before 1.0.1.10, R6220 before 1.1.0.50, R6250 before 1.0.4.12, R6300v2 before 1.0.4.12, R6400 before 1.0.1.24, R6400v2 before 1.0.2.32, R6700 before 1.0.1.26, R6700v2 before 1.2.0.4, R6800 before 1.0.1.10, R6900 before 1.0.1.26, R6900P before 1.0.0.58, R6900v2 before 1.2.0.4, R7000 before 1.0.9.6, R7000P before 1.0.0.58, R7100LG before 1.0.0.32, R7300 before 1.0.0.54, R7500 before 1.0.0.112, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, R7900 before 1.0.1.18, R8000 before 1.0.3.48, R8300 before 1.0.2.104, R8500 before 1.0.2.104, R9000 before 1.0.2.40, WNDR3400v3 before 1.0.1.14, WNDR3700v4 before 1.0.2.96, WNDR4300v1 before 1.0.2.98, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, and WNR3500Lv2 before 1.2.0.44.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000051474/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-Gateways-and-Extenders-PSV-2016-0122) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15576
- **State**: PUBLISHED
- **Published Date**: August 24, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in EasyLogin Pro through 1.3.0. Encryptor.php contains an unserialize call that can be exploited for remote code execution in the decrypt function, if the attacker knows the key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/149018/Easylogin-Pro-1.3.0-Remote-Code-Execution.html)
2. [45227](https://www.exploit-db.com/exploits/45227/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3183
- **State**: PUBLISHED
- **Published Date**: January 19, 2021 at 14:58 UTC
- **Last Updated**: August 03, 2024 at 16:45 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Files.com Fat Client 3.3.6 allows authentication bypass because the client continues to have access after a logout and a removal of a login profile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://seclists.org/fulldisclosure/2021/Jan/20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2759
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3667
- **State**: PUBLISHED
- **Published Date**: October 11, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 06:38 UTC
- **Reserved Date**: October 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/index.php in AdsDX 3.05 allows remote attackers to execute arbitrary SQL commands via the Username.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9696](http://www.exploit-db.com/exploits/9696) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7639
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
QNAP NAS application Proxy Server through version 1.2.0 does not authenticate requests properly. Successful exploitation can lead to change of the settings of Proxy Server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/nas-201806-01)
2. [1041025](http://www.securitytracker.com/id/1041025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48292
- **State**: PUBLISHED
- **Published Date**: November 20, 2023 at 18:02 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 14, 2023 at 17:41 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The XWiki Admin Tools Application provides tools to help the administration of XWiki. Starting in version 4.4 and prior to version 4.5.1, a cross site request forgery vulnerability in the admin tool for executing shell commands on the server allows an attacker to execute arbitrary shell commands by tricking an admin into loading the URL with the shell command. A very simple possibility for an attack are comments. When the attacker can leave a comment on any page in the wiki it is sufficient to include an image with an URL like `/xwiki/bin/view/Admin/RunShellCommand?command=touch%20/tmp/attacked` in the comment. When an admin views the comment, the file `/tmp/attacked` will be created on the server. The output of the command is also vulnerable to XWiki syntax injection which offers a simple way to execute Groovy in the context of the XWiki installation and thus an even easier way to compromise the integrity and confidentiality of the whole XWiki installation. This has been patched by adding a form token check in version 4.5.1 of the admin tools. Some workarounds are available. The patch can be applied manually to the affected wiki pages. Alternatively, the document `Admin.RunShellCommand` can also be deleted if the possibility to run shell commands isn't needed.
### CVSS Metrics
- **CVSS Base Score**: 9.7/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**xwiki-contrib - application-admintools**
Affected versions:
- >= 4.4, < 4.5.1 (Status: affected)
### References
1. [https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9](https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9)
2. [https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8](https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8)
3. [https://jira.xwiki.org/browse/ADMINTOOL-91](https://jira.xwiki.org/browse/ADMINTOOL-91) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6707
- **State**: PUBLISHED
- **Published Date**: April 10, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: April 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an "unnecessary default application," (4) unspecified scripts in the states folder, (5) an unspecified "default application" that lists server configuration, and (6) "full system help."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-1943](http://www.vupen.com/english/advisories/2008/1943/references)
2. [30751](http://secunia.com/advisories/30751)
3. [](http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm)
4. [](http://www.voipshield.com/research-details.php?id=86)
5. [avaya-ses-certificate-info-disclosure(43384)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43384)
6. [46598](http://osvdb.org/46598)
7. [avaya-ses-statesfolder-code-execution(43393)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43393)
8. [](http://www.voipshield.com/research-details.php?id=88)
9. [](http://www.voipshield.com/research-details.php?id=90)
10. [](http://www.voipshield.com/research-details.php?id=87)
11. [avaya-ses-objectsfolder-code-execution(43381)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43381)
12. [29939](http://www.securityfocus.com/bid/29939)
13. [46599](http://osvdb.org/46599)
14. [46600](http://osvdb.org/46600)
15. [](http://www.voipshield.com/research-details.php?id=91)
16. [](http://www.voipshield.com/research-details.php?id=89)
17. [avaya-ses-application-info-disclosure(43394)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43394)
18. [avaya-ses-help-information-disclosure(43395)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43395)
19. [avaya-ses-application-unauth-access(43389)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43389) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33016
- **State**: PUBLISHED
- **Published Date**: September 02, 2024 at 10:22 UTC
- **Last Updated**: September 03, 2024 at 14:02 UTC
- **Reserved Date**: April 23, 2024 at 04:42 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
memory corruption when an invalid firehose patch command is invoked.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 315 5G IoT Modem (Status: affected)
- 9205 LTE Modem (Status: affected)
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- C-V2X 9150 (Status: affected)
- CSR8811 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5300 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6005 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- MDM9205S (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA0000 (Status: affected)
- QCA4004 (Status: affected)
- QCA4024 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8072 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9377 (Status: affected)
- QCA9984 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM4325 (Status: affected)
- QCM4490 (Status: affected)
- QCM5430 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN5021 (Status: affected)
- QCN5022 (Status: affected)
- QCN5052 (Status: affected)
- QCN5121 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN7606 (Status: affected)
- QCN9000 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9013 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9160 (Status: affected)
- QCN9274 (Status: affected)
- QCS2290 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS4490 (Status: affected)
- QCS5430 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8155 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8250 (Status: affected)
- QSM8350 (Status: affected)
- QTS110 (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- QXM8083 (Status: affected)
- Robotics RB3 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8530P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8180X+SDX55 (Status: affected)
- SC8380XP (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD460 (Status: affected)
- SD662 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD730 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDM429W (Status: affected)
- SDX20M (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SDX61 (Status: affected)
- SDX65M (Status: affected)
- SG4150P (Status: affected)
- SG8275P (Status: affected)
- SM4125 (Status: affected)
- SM4635 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM6370 (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM8550P (Status: affected)
- SM8635 (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 665 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 690 5G Mobile Platform (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 710 Mobile Platform (Status: affected)
- Snapdragon 712 Mobile Platform (Status: affected)
- Snapdragon 720G Mobile Platform (Status: affected)
- Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected)
- Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected)
- Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected)
- Snapdragon 750G 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c Compute Platform (SC7180-AC) (Status: affected)
- Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro" (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon Wear 1300 Platform (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X20 LTE Modem (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X70 Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR1 Platform (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- Snapdragon XR2+ Gen 1 Platform (Status: affected)
- Snapdragon Auto 4G Modem (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR1120 (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- TalynPlus (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9306 (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9378 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3610 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3999 (Status: affected)
- WCN6740 (Status: affected)
- WCN6755 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37734
- **State**: PUBLISHED
- **Published Date**: September 12, 2022 at 13:14 UTC
- **Last Updated**: August 03, 2024 at 10:37 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
graphql-java before19.0 is vulnerable to Denial of Service. An attacker can send a malicious GraphQL query that consumes CPU resources. The fixed versions are 19.0 and later, 18.3, and 17.4, and 0.0.0-2022-07-26T05-45-04-226aabd9.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/graphql-java/graphql-java/issues/2888)
2. [](https://github.com/graphql-java/graphql-java/pull/2892)
3. [](https://github.com/graphql-java/graphql-java/discussions/2958)
4. [](https://github.com/graphql-java/graphql-java/releases) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31080
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 20:58 UTC
- **Last Updated**: April 02, 2025 at 13:42 UTC
- **Reserved Date**: March 26, 2025 at 09:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Software LLC HTML Forms allows Stored XSS. This issue affects HTML Forms: from n/a through 1.5.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Link Software LLC - HTML Forms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/html-forms/vulnerability/wordpress-html-forms-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Abhinav Porwal (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25053
- **State**: PUBLISHED
- **Published Date**: January 10, 2022 at 15:30 UTC
- **Last Updated**: August 03, 2024 at 19:49 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Coder WordPress plugin before 2.5.2 within the wow-company admin menu page allows to include() arbitrary file with PHP extension (as well as with data:// or http:// protocols), thus leading to CSRF RCE.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WP Coder – add custom html, css and js code**
Affected versions:
- 2.5.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a5448599-64de-43b0-b04d-c6492366eab1)
2. [](https://plugins.trac.wordpress.org/changeset/2641650/wp-coder)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50538
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:32 UTC
- **Last Updated**: November 20, 2024 at 14:56 UTC
- **Reserved Date**: October 24, 2024 at 07:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Irfan Ardiansah Show Visitor IP Address allows Stored XSS.This issue affects Show Visitor IP Address: from n/a through 0.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Irfan Ardiansah - Show Visitor IP Address**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/show-visitor-ip-address/wordpress-show-visitor-ip-address-plugin-0-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4791
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:43 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12218
- **State**: PUBLISHED
- **Published Date**: May 20, 2019 at 16:33 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL2_image function IMG_LoadPCX_RW at IMG_pcx.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.libsdl.org/show_bug.cgi?id=4620)
2. [[debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html)
3. [[debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html)
4. [openSUSE-SU-2019:2070](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html)
5. [openSUSE-SU-2019:2108](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html)
6. [FEDORA-2019-a6bc0fb143](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ2VRD57UOBT72JUC2DIFHEFCH4N64SW/)
7. [USN-4238-1](https://usn.ubuntu.com/4238-1/)
8. [FEDORA-2020-ff2fe47ba4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1380
- **State**: PUBLISHED
- **Published Date**: February 17, 2025 at 07:00 UTC
- **Last Updated**: February 18, 2025 at 19:32 UTC
- **Reserved Date**: February 16, 2025 at 20:11 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /dashboard/admin/del_plan.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Codezips - Gym Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-295988 | Codezips Gym Management System del_plan.php sql injection](https://vuldb.com/?id.295988)
2. [VDB-295988 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295988)
3. [Submit #501980 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection](https://vuldb.com/?submit.501980)
4. [](https://www.yuque.com/polaris-pisym/aevk1q/fdkeqw2a2ug9zohn)
### Credits
- xuanluansec (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1069
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 03:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Red Hat OpenShift Enterprise version 3.7 is vulnerable to access control override for container network filesystems. An attacker could override the UserId and GroupId for GlusterFS and NFS to read and write any data on the network filesystem.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Red Hat, Inc. - OpenShift Enterprise**
Affected versions:
- 3.7 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1552987)
2. [103364](http://www.securityfocus.com/bid/103364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0157
- **State**: PUBLISHED
- **Published Date**: January 09, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Array index error in the uri_lookup function in the URI parser for neon 0.26.0 to 0.26.2, possibly only on 64-bit platforms, allows remote malicious servers to cause a denial of service (crash) via a URI with non-ASCII characters, which triggers a buffer under-read due to a type conversion error that generates a negative index.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23984](http://secunia.com/advisories/23984)
2. [[neon] 20070107 invalid chars cause sigserv in neon](http://mailman.webdav.org/pipermail/neon/2007-January/002362.html)
3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi/neon26_0.26.2-3_to_mdx1.diff?bug=404723%3Bmsg=5%3Batt=2)
4. [](http://www.webdav.org/cadaver/)
5. [[cadaver] 20070123 release 0.22.5](http://mailman.webdav.org/pipermail/cadaver/2007-January/001015.html)
6. [MDKSA-2007:013](http://www.mandriva.com/security/advisories?name=MDKSA-2007:013)
7. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=404723)
8. [SUSE-SR:2007:002](http://www.novell.com/linux/security/advisories/2007_02_sr.html)
9. [22035](http://www.securityfocus.com/bid/22035)
10. [ADV-2007-0172](http://www.vupen.com/english/advisories/2007/0172)
11. [23763](http://secunia.com/advisories/23763)
12. [ADV-2007-0362](http://www.vupen.com/english/advisories/2007/0362)
13. [23751](http://secunia.com/advisories/23751)
14. [39247](http://osvdb.org/39247) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-49248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-49248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49248
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:53 UTC
- **Last Updated**: June 06, 2025 at 16:06 UTC
- **Reserved Date**: June 04, 2025 at 09:41 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in cmoreira Team Showcase allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team Showcase: from n/a through n/a.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**cmoreira - Team Showcase**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/team-showcase-cm/vulnerability/wordpress-team-showcase-25-05-13-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Tran Nguyen Bao Khanh (VCI - VNPT Cyber Immunity) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4478
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 14:22 UTC
- **Last Updated**: June 03, 2025 at 12:49 UTC
- **Reserved Date**: May 09, 2025 at 06:11 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Red Hat - Red Hat Enterprise Linux 10**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [](https://access.redhat.com/security/cve/CVE-2025-4478)
2. [RHBZ#2365232](https://bugzilla.redhat.com/show_bug.cgi?id=2365232) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4109
- **State**: PUBLISHED
- **Published Date**: September 30, 2019 at 15:20 UTC
- **Last Updated**: September 16, 2024 at 18:08 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere eXtreme Scale 8.6 Admin Console could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 158102.
### Affected Products
**IBM - WebSphere eXtreme Scale**
Affected versions:
- 8.6 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/1073864)
2. [ibm-websphere-cve20194109-clickjacking (158102)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158102) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28838
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 21:07 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-16.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5037
- **State**: PUBLISHED
- **Published Date**: September 27, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MySource Matrix after 3.8 allows remote attackers to use the application as an HTTP proxy server via a MIME encoded URL in the sq_content_src parameter to access arbitrary sites with the server's IP address and conduct cross-site scripting (XSS) attacks. NOTE: the researcher reports that "The vendor does not consider this a vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.aushack.com/advisories/200607-mysourcematrix.txt)
2. [20060922 Squiz MySource Matrix Unauthorised Proxy and Cross Site Scripting](http://www.securityfocus.com/archive/1/446722/100/0/threaded)
3. [1635](http://securityreason.com/securityalert/1635)
4. [22060](http://secunia.com/advisories/22060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17473
- **State**: PUBLISHED
- **Published Date**: August 14, 2020 at 19:12 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8131/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-long-lasting-token-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2809
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 30, 2024 at 15:01 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle E-Business Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle E-Business Intelligence accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - E-Business Intelligence**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2975
- **State**: PUBLISHED
- **Published Date**: August 27, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox 3.5.2 on Windows XP, in some situations possibly involving an incompletely configured protocol handler, does not properly implement setting the document.location property to a value specifying a protocol associated with an external application, which allows remote attackers to cause a denial of service (memory consumption) via vectors involving a series of function calls that set this property, as demonstrated by (1) the chromehtml: protocol and (2) the aim: protocol.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [firefox-doclocation-dos(52923)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52923)
2. [20090825 RE: DoS vulnerability in Google Chrome](http://archives.neohapsis.com/archives/bugtraq/2009-08/0234.html)
3. [20090825 Re: DoS vulnerability in Google Chrome](http://archives.neohapsis.com/archives/bugtraq/2009-08/0236.html)
4. [20090825 Re: DoS vulnerability in Google Chrome](http://archives.neohapsis.com/archives/bugtraq/2009-08/0246.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20638
- **State**: PUBLISHED
- **Published Date**: March 20, 2019 at 18:49 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1 has directory traversal via a direct request for a listing of an image directory such as an assets/ directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gkaim.com/cve-2018-20638-vikas-chaudhary/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2567
- **State**: PUBLISHED
- **Published Date**: May 22, 2012 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: May 09, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Xelex MobileTrack application 2.3.7 and earlier for Android uses hardcoded credentials, which allows remote attackers to obtain sensitive information via an unencrypted (1) FTP or (2) HTTP session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#464683](http://www.kb.cert.org/vuls/id/464683)
2. [49268](http://secunia.com/advisories/49268)
3. [53634](http://www.securityfocus.com/bid/53634)
4. [](http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/)
5. [mobiletrack-ftp-info-disclosure(75783)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75783) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3054
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: October 02, 2024 at 19:54 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.22 and prior (Status: affected)
- 8.0.11 and prior (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
2. [USN-3725-1](https://usn.ubuntu.com/3725-1/)
3. [1041294](http://www.securitytracker.com/id/1041294)
4. [RHSA-2018:3655](https://access.redhat.com/errata/RHSA-2018:3655)
5. [](https://security.netapp.com/advisory/ntap-20180726-0002/)
6. [104769](http://www.securityfocus.com/bid/104769) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22796
- **State**: PUBLISHED
- **Published Date**: February 11, 2022 at 17:40 UTC
- **Last Updated**: August 03, 2024 at 18:51 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-287: Improper Authentication vulnerability exists that could allow remote code execution when a malicious file is uploaded. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**n/a - C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)**
Affected versions:
- C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior) (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-103-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51549
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:14 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 20, 2023 at 20:38 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21867.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 12.1.3.15356 (Status: affected)
### References
1. [ZDI-23-1863](https://www.zerodayinitiative.com/advisories/ZDI-23-1863/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7407
- **State**: PUBLISHED
- **Published Date**: October 22, 2014 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 01:31 UTC
- **Reserved Date**: October 22, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2044173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3525
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 00:00 UTC
- **Last Updated**: August 22, 2024 at 19:17 UTC
- **Reserved Date**: April 09, 2024 at 16:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Campcodes Online Event Management System 1.0. Affected is an unknown function of the file /views/index.php. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259896.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Campcodes - Online Event Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-259896 | Campcodes Online Event Management System index.php cross site scripting](https://vuldb.com/?id.259896)
2. [VDB-259896 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259896)
3. [Submit #312507 | campcodes Online Event Management System ≤1.0 XSS injection](https://vuldb.com/?submit.312507)
4. [](https://github.com/E1CHO/cve_hub/blob/main/Online%20Event%20Management%20System/Online%20Event%20Management%20System%20-%20vuln%204.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5828
- **State**: PUBLISHED
- **Published Date**: January 02, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: January 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Windows Live Messenger Client 8.5.1 and earlier, when MSN Protocol Version 15 (MSNP15) is used over a NAT session, allows remote attackers to discover intranet IP addresses and port numbers by reading the (1) IPv4InternalAddrsAndPorts, (2) IPv4Internal-Addrs, and (3) IPv4Internal-Port header fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4862](http://securityreason.com/securityalert/4862)
2. [20081229 MSN messenger sends IP addresses Public and Private](http://www.securityfocus.com/archive/1/499624/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0834
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 15:48 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4916
- **State**: PUBLISHED
- **Published Date**: May 22, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:47 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Workstation Pro/Player contains a NULL pointer dereference vulnerability that exists in the vstor2 driver. Successful exploitation of this issue may allow host users with normal user privileges to trigger a denial-of-service in a Windows host machine.
### Affected Products
**VMware - Workstation Pro/Player**
Affected versions:
- All 12.x versions prior to version 12.5.6 (Status: affected)
### References
1. [1038526](http://www.securitytracker.com/id/1038526)
2. [](https://www.vmware.com/security/advisories/VMSA-2017-0009.html)
3. [98560](http://www.securityfocus.com/bid/98560)
4. [42140](https://www.exploit-db.com/exploits/42140/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0948
- **State**: PUBLISHED
- **Published Date**: June 02, 2021 at 15:58 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the (1) cdf_read_sat, (2) cdf_read_long_sector_chain, and (3) cdf_read_ssat function in file before 5.02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=498682) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1876
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The backend service process in Lenovo Solution Center (aka LSC) before 3.3.0002 allows local users to gain SYSTEM privileges via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/len_4326) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35709
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 15:47 UTC
- **Last Updated**: April 23, 2025 at 16:57 UTC
- **Reserved Date**: July 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Bridge**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb22-49.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52505
- **State**: PUBLISHED
- **Published Date**: November 14, 2024 at 15:29 UTC
- **Last Updated**: November 14, 2024 at 15:55 UTC
- **Reserved Date**: November 11, 2024 at 18:49 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. The provisioning API of the matrix-appservice-irc bridge up to version 3.0.2 contains a vulnerability which can lead to arbitrary IRC command execution as the bridge IRC bot. The vulnerability has been patched in matrix-appservice-irc version 3.0.3.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-147: Security Weakness
### Affected Products
**matrix-org - matrix-appservice-irc**
Affected versions:
- < 3.0.3 (Status: affected)
### References
1. [https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c3hj-hg7p-rrq5](https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c3hj-hg7p-rrq5)
2. [https://github.com/matrix-org/matrix-appservice-irc/commit/4a024eae1a992b1ea67e71a998e0b833b54221e2](https://github.com/matrix-org/matrix-appservice-irc/commit/4a024eae1a992b1ea67e71a998e0b833b54221e2) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.