System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0519
- **State**: PUBLISHED
- **Published Date**: February 23, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ArGoSoft FTP Server before 1.4.2.7 allows remote attackers to read arbitrary files by uploading a ZIP file containing a shortcut (.LNK) file, using SITE UNZIP to extract the .LNK file onto the server, then accessing the file, a different vulnerability than CVE-2005-0520.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12487](http://www.securityfocus.com/bid/12487)
2. [13614](http://www.osvdb.org/13614)
3. [argosoft-ink-file-upload(17939)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17939)
4. [](http://www.argosoft.com/ftpserver/changelist.aspx)
5. [14172](http://secunia.com/advisories/14172) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24902
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 21:43 UTC
- **Last Updated**: February 04, 2025 at 15:12 UTC
- **Reserved Date**: January 27, 2025 at 15:32 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_cargo.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**LabRedesCefetRJ - WeGIA**
Affected versions:
- < 3.2.12 (Status: affected)
### References
1. [https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pg73-w9vx-8mgp](https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pg73-w9vx-8mgp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45372
- **State**: PUBLISHED
- **Published Date**: May 29, 2023 at 00:15 UTC
- **Last Updated**: November 01, 2024 at 13:01 UTC
- **Reserved Date**: November 14, 2022 at 12:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Codeixer Product Gallery Slider for WooCommerce plugin <= 2.2.8 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Codeixer - Product Gallery Slider for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woo-product-gallery-slider/wordpress-product-gallery-slider-for-woocommerce-plugin-2-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20143
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 03:17 UTC
- **Last Updated**: January 06, 2025 at 14:19 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**MediaTek, Inc. - MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676**
Affected versions:
- Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/January-2025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2129
- **State**: PUBLISHED
- **Published Date**: June 01, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: June 01, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the JE Ajax Event Calendar (com_jeajaxeventcalendar) component 1.0.1 and 1.0.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39836](http://secunia.com/advisories/39836)
2. [12598](http://www.exploit-db.com/exploits/12598)
3. [](http://www.xenuser.org/2010/05/14/joomla-component-je-ajax-event-calendar-local-file-inclusion-vulnerability/)
4. [40179](http://www.securityfocus.com/bid/40179)
5. [jeajax-index-file-include(58602)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58602)
6. [](http://packetstormsecurity.org/1005-exploits/joomlaajaxec-lfi.txt)
7. [64704](http://www.osvdb.org/64704) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2524
- **State**: PUBLISHED
- **Published Date**: October 25, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: August 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safari after 2.0 in Apple Mac OS X 10.3.9 allows remote attackers to bypass domain restrictions via crafted web archives that cause Safari to render them as if they came from a different site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [P-312](http://www.ciac.org/ciac/bulletins/p-312.shtml)
2. [ESB-2005.0732](http://www.auscert.org.au/5509)
3. [APPLE-SA-2005-09-22](http://lists.apple.com/archives/security-announce/2005/Sep/msg00002.html)
4. [16920](http://secunia.com/advisories/16920/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14930
- **State**: PUBLISHED
- **Published Date**: September 29, 2017 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 19:42 UTC
- **Reserved Date**: September 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9042
- **State**: PUBLISHED
- **Published Date**: February 23, 2019 at 18:00 UTC
- **Last Updated**: November 15, 2024 at 15:17 UTC
- **Reserved Date**: February 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Sitemagic CMS v4.4. In the index.php?SMExt=SMFiles URI, the user can upload a .php file to execute arbitrary code, as demonstrated by 404.php. This can only occur if the administrator neglects to set FileExtensionFilter and there are untrusted user accounts. NOTE: The maintainer states that this is not a vulnerability but a feature used in conjunction with External Modules
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/116/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25973
- **State**: PUBLISHED
- **Published Date**: August 10, 2022 at 05:00 UTC
- **Last Updated**: September 16, 2024 at 22:45 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the kill function, due to missing sanitization of the port argument.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - mc-kill-port**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070)
2. [](https://www.npmjs.com/package/mc-kill-port)
### Credits
- Feng Xiao |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1368
- **State**: PUBLISHED
- **Published Date**: September 06, 2022 at 22:19 UTC
- **Last Updated**: April 16, 2025 at 16:10 UTC
- **Reserved Date**: April 14, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The Cognex 3D-A1000 Dimensioning System in firmware version 1.0.3 (3354) and prior is vulnerable to CWE-306: Missing Authentication for Critical Function, which allows unauthorized users to change the operator account password via webserver commands by monitoring web socket communications from an unauthenticated session. This could allow an attacker to escalate privileges to match those of the compromised account.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Cognex - 3D-A1000 Dimensioning System**
Affected versions:
- all (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03)
### Credits
- Tri Quach, Shanil Prasad, Brandon Park, and Nishith Sinha reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15622
- **State**: PUBLISHED
- **Published Date**: January 11, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_client.lua file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt)
2. [20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)](http://www.securityfocus.com/archive/1/541655/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4208
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 13:53 UTC
- **Last Updated**: February 13, 2025 at 17:09 UTC
- **Reserved Date**: August 07, 2023 at 13:02 UTC
- **Assigned By**: Google
### Vulnerability Description
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.
When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Linux - Kernel**
Affected versions:
- 3.18 (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81)
2. [](https://kernel.dance/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81)
3. [](https://www.debian.org/security/2023/dsa-5492)
4. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html)
### Credits
- valis
- Muhammad Alifa Ramdhan of STAR Labs |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21199
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 19:10 UTC
- **Last Updated**: April 15, 2025 at 19:21 UTC
- **Reserved Date**: January 12, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An information disclosure vulnerability exists due to the hardcoded TLS key of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1448) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0727
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: September 27, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CA-2001-36](http://www.cert.org/advisories/CA-2001-36.html)
2. [20011214 MSIE may download and run progams automatically](http://marc.info/?l=bugtraq&m=100835204509262&w=2)
3. [oval:org.mitre.oval:def:921](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A921)
4. [ie-file-download-execution(7703)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7703)
5. [3033](http://www.osvdb.org/3033)
6. [M-027](http://www.ciac.org/ciac/bulletins/m-027.shtml)
7. [VU#443699](http://www.kb.cert.org/vuls/id/443699)
8. [3578](http://www.securityfocus.com/bid/3578)
9. [20011216 Re: MSIE may download and run progams automatically - NOT SO FAST](http://marc.info/?l=bugtraq&m=100861273114437&w=2)
10. [MS01-058](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-058) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40421
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 18:31 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 14, 2023 at 20:26 UTC
- **Assigned By**: apple
### Vulnerability Description
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to access sensitive user data.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213984)
2. [](https://support.apple.com/en-us/HT213985)
3. [](https://support.apple.com/en-us/HT213983)
4. [](https://support.apple.com/kb/HT213984)
5. [](https://support.apple.com/kb/HT213985)
6. [](https://support.apple.com/kb/HT213983)
7. [](http://seclists.org/fulldisclosure/2023/Oct/21)
8. [](http://seclists.org/fulldisclosure/2023/Oct/24)
9. [](http://seclists.org/fulldisclosure/2023/Oct/26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24661
- **State**: PUBLISHED
- **Published Date**: March 08, 2022 at 11:31 UTC
- **Last Updated**: August 03, 2024 at 04:20 UTC
- **Reserved Date**: February 07, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < V2022.1). The starview+.exe contains a memory corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Siemens - Simcenter STAR-CCM+ Viewer**
Affected versions:
- All versions < V2022.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-166747.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26994
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 05:28 UTC
- **Last Updated**: May 04, 2025 at 09:01 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
speakup: Avoid crash on very long word
In case a console is set up really large and contains a really long word
(> 256 characters), we have to stop before the length of the word buffer.
### Affected Products
**Linux - Linux**
Affected versions:
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
- c6e3fd22cd538365bfeb82997d5b89562e077d42 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.37 (Status: affected)
- 0 (Status: unaffected)
- 4.19.313 (Status: unaffected)
- 5.4.275 (Status: unaffected)
- 5.10.216 (Status: unaffected)
- 5.15.157 (Status: unaffected)
- 6.1.88 (Status: unaffected)
- 6.6.29 (Status: unaffected)
- 6.8.8 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f)
2. [](https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c)
3. [](https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222)
4. [](https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8)
5. [](https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595)
6. [](https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f)
7. [](https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76)
8. [](https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39698
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:50 UTC
- **Last Updated**: August 02, 2024 at 04:26 UTC
- **Reserved Date**: June 27, 2024 at 18:44 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
electron-updater allows for automatic updates for Electron apps. The file `packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts` implements the signature validation routine for Electron applications on Windows. Because of the surrounding shell, a first pass by `cmd.exe` expands any environment variable found in command-line above. This creates a situation where `verifySignature()` can be tricked into validating the certificate of a different file than the one that was just downloaded. If the step is successful, the malicious update will be executed even if its signature is invalid. This attack assumes a compromised update manifest (server compromise, Man-in-the-Middle attack if fetched over HTTP, Cross-Site Scripting to point the application to a malicious updater server, etc.). The patch is available starting from 6.3.0-alpha.6.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-154: Security Weakness
### Affected Products
**electron-userland - electron-builder**
Affected versions:
- < 6.3.0-alpha.6 (Status: affected)
### References
1. [https://github.com/electron-userland/electron-builder/security/advisories/GHSA-9jxc-qjr9-vjxq](https://github.com/electron-userland/electron-builder/security/advisories/GHSA-9jxc-qjr9-vjxq)
2. [https://github.com/electron-userland/electron-builder/pull/8295](https://github.com/electron-userland/electron-builder/pull/8295)
3. [https://github.com/electron-userland/electron-builder/commit/ac2e6a25aa491c1ef5167a552c19fc2085cd427f](https://github.com/electron-userland/electron-builder/commit/ac2e6a25aa491c1ef5167a552c19fc2085cd427f)
4. [https://github.com/electron-userland/electron-builder/blob/140e2f0eb0df79c2a46e35024e96d0563355fc89/packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts#L35-L41](https://github.com/electron-userland/electron-builder/blob/140e2f0eb0df79c2a46e35024e96d0563355fc89/packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts#L35-L41) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7277
- **State**: PUBLISHED
- **Published Date**: December 31, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 18, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [78818](http://www.securityfocus.com/bid/78818)
2. [VU#763576](https://www.kb.cert.org/vuls/id/763576) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3355
- **State**: PUBLISHED
- **Published Date**: September 29, 2022 at 09:25 UTC
- **Last Updated**: May 20, 2025 at 19:36 UTC
- **Reserved Date**: September 29, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.8.3.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**inventree - inventree/inventree**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/4b7fb92c-f06b-4bbf-82dc-9f013b30b6a6)
2. [](https://github.com/inventree/inventree/commit/5a08ef908dd5344b4433436a4679d122f7f99e41) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2317
- **State**: PUBLISHED
- **Published Date**: March 07, 2014 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 00:06 UTC
- **Reserved Date**: March 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ajax_udf.php in OpenDocMan before 1.2.7.2 allows remote attackers to execute arbitrary SQL commands via the table parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [65775](http://www.securityfocus.com/bid/65775)
2. [56189](http://secunia.com/advisories/56189)
3. [](http://www.opendocman.com/opendocman-v1-2-7-2-released) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6235
- **State**: PUBLISHED
- **Published Date**: November 21, 2023 at 12:24 UTC
- **Last Updated**: August 02, 2024 at 08:21 UTC
- **Reserved Date**: November 21, 2023 at 08:42 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
An uncontrolled search path element vulnerability has been found in the Duet Display product, affecting version 2.5.9.1. An attacker could place an arbitrary libusk.dll file in the C:\Users\user\AppData\Local\Microsoft\WindowsApps\ directory, which could lead to the execution and persistence of arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Duet Display - Duet Display for Windows 10+**
Affected versions:
- 2.5.9.1 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/arbitrary-code-execution-duet-display)
### Credits
- Alexander Huamán Jaimes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25610
- **State**: PUBLISHED
- **Published Date**: February 28, 2025 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 15:43 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_gw.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39950
- **State**: PUBLISHED
- **Published Date**: November 02, 2022 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 13:17 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper neutralization of input during web page generation vulnerability [CWE-79] exists in FortiManager and FortiAnalyzer 6.0.0 all versions, 6.2.0 all versions, 6.4.0 through 6.4.8, and 7.0.0 through 7.0.4. Report templates may allow a low privilege level attacker to perform an XSS attack via posting a crafted CKeditor "protected" comment as described in CVE-2020-9281.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C`
### Affected Products
**Fortinet - Fortinet FortiAnalyzer, FortiManager**
Affected versions:
- FortiAnalyzer 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0, 6.4.8, 6.4.7, 6.4.6, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.9, 6.2.8, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0; FortiManager 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0, 6.4.8, 6.4.7, 6.4.6, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.9, 6.2.8, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0 (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-21-228) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45623
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 22:56 UTC
- **Last Updated**: August 30, 2024 at 17:07 UTC
- **Reserved Date**: October 09, 2023 at 16:22 UTC
- **Assigned By**: hpe
### Vulnerability Description
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; **
Affected versions:
- ArubaOS 10.5.x.x: 10.5.0.0 and below (Status: affected)
- ArubaOS 10.4.x.x: 10.4.0.2 and below (Status: affected)
- InstantOS 8.11.x.x: 8.11.1.2 and below (Status: affected)
- InstantOS 8.10.x.x: 8.10.0.8 and below (Status: affected)
- InstantOS 8.6.x.x: 8.6.0.22 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt)
### Credits
- XiaoC from Moonlight Bug Hunter |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5128
- **State**: PUBLISHED
- **Published Date**: August 29, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:34 UTC
- **Reserved Date**: July 30, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Innovative Interfaces Encore Discovery Solution 4.3 places a session token in the URI, which might allow remote attackers to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html)
2. [20140827 Encore Discovery Solution Multiple Vulnerability Disclosure](http://www.securityfocus.com/archive/1/533233/100/0/threaded)
3. [encore-discovery-cve20145128-info-disc(95570)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95570)
4. [69431](http://www.securityfocus.com/bid/69431) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10420
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:41 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: Leisure). Supported versions that are affected are 8.10.1 and 8.10.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Suite8. While the vulnerability is in Oracle Hospitality Suite8, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Suite8. CVSS 3.0 Base Score 6.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L).
### Affected Products
**Oracle Corporation - Hospitality Suite8**
Affected versions:
- 8.10.1 (Status: affected)
- 8.10.2 (Status: affected)
### References
1. [101323](http://www.securityfocus.com/bid/101323)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0048
- **State**: PUBLISHED
- **Published Date**: February 11, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0028.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [72417](http://www.securityfocus.com/bid/72417)
2. [1031723](http://www.securitytracker.com/id/1031723)
3. [MS15-009](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38313
- **State**: PUBLISHED
- **Published Date**: November 17, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 17:39 UTC
- **Reserved Date**: July 14, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed infixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on28. August 2023 by updating OpenNDS to version 10.1.3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/openNDS/openNDS/releases/tag/v10.1.2)
2. [](https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80)
3. [](https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0445
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: June 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1355](http://www.osvdb.org/1355)
2. [CA-2000-09](http://www.cert.org/advisories/CA-2000-09.html)
3. [20000523 Key Generation Security Flaw in PGP 5.0](http://archives.neohapsis.com/archives/bugtraq/2000-05/0273.html)
4. [1251](http://www.securityfocus.com/bid/1251) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1692
- **State**: PUBLISHED
- **Published Date**: June 06, 2022 at 08:51 UTC
- **Last Updated**: August 03, 2024 at 00:10 UTC
- **Reserved Date**: May 12, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The CP Image Store with Slideshow WordPress plugin before 1.0.68 does not sanitise and escape the ordering_by query parameter before using it in a SQL statement in pages where the [codepeople-image-store] is embed, allowing unauthenticated users to perform an SQL injection attack
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - CP Image Store with Slideshow**
Affected versions:
- 1.0.68 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571)
2. [](https://bulletin.iese.de/post/cp-image-store_1-0-67)
### Credits
- Daniel Krohmer (Fraunhofer IESE)
- Shi Chen (University of Kaiserslautern) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8943
- **State**: PUBLISHED
- **Published Date**: October 08, 2024 at 08:33 UTC
- **Last Updated**: October 08, 2024 at 14:18 UTC
- **Reserved Date**: September 17, 2024 at 11:53 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. This is due to insufficient verification on the user being supplied during the booking customer step. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. Note that logging in as a WordPress user is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. The vulnerability is partially patched in version 5.0.12 and fully patched in version 5.0.13.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**latepoint - LatePoint Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bac8c35b-2afa-4347-b86e-2f16db19a4d3?source=cve)
2. [](https://wpdocs.latepoint.com/changelog/)
### Credits
- István Márton |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21463
- **State**: PUBLISHED
- **Published Date**: April 19, 2022 at 20:37 UTC
- **Last Updated**: September 24, 2024 at 20:09 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - Solaris Operating System**
Affected versions:
- 11 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33304
- **State**: PUBLISHED
- **Published Date**: February 15, 2023 at 00:00 UTC
- **Last Updated**: March 20, 2025 at 14:05 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Double Free vulnerability in virtualsquare picoTCP v1.7.0 and picoTCP-NG v2.1 in modules/pico_fragments.c in function pico_fragments_reassemble, allows attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/virtualsquare/picotcp/issues/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39362
- **State**: REJECTED
- **Published Date**: June 25, 2024 at 14:22 UTC
- **Last Updated**: July 02, 2024 at 19:14 UTC
- **Reserved Date**: June 24, 2024 at 13:54 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31339
- **State**: PUBLISHED
- **Published Date**: May 12, 2021 at 13:18 UTC
- **Last Updated**: August 03, 2024 at 22:55 UTC
- **Reserved Date**: April 15, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Mendix Excel Importer Module (All versions < V9.0.3). Uploading a manipulated XML File results in an exception that could expose information about the Application-Server and the used XML-Framework.
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**Siemens - Mendix Excel Importer Module**
Affected versions:
- All versions < V9.0.3 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-854248.pdf)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-131-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12032
- **State**: PUBLISHED
- **Published Date**: December 25, 2024 at 03:21 UTC
- **Last Updated**: December 26, 2024 at 19:57 UTC
- **Reserved Date**: December 02, 2024 at 15:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Tourfic – Ultimate Hotel Booking, Travel Booking & Apartment Booking WordPress Plugin | WooCommerce Booking plugin for WordPress is vulnerable to SQL Injection via the 'enquiry_id' parameter of the 'tf_enquiry_reply_email_callback' function in all versions up to, and including, 2.15.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**themefic - Tourfic – Ultimate Hotel Booking, Travel Booking & Apartment Booking WordPress Plugin | WooCommerce Booking**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/35eebcc8-a6bf-4cbb-9cc6-f49bd1625d6b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/tourfic/tags/2.14.1/inc/Core/Enquiry.php#L990)
3. [](https://plugins.trac.wordpress.org/changeset/3207686/tourfic/trunk/inc/Core/Enquiry.php)
### Credits
- Thái An |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1969
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The avatar upload capability in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to execute arbitrary script by uploading files that include scripting code such as Javascript.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10218](http://www.securityfocus.com/bid/10218)
2. [20040425 Multiple Vulnerabilities In OpenBB](http://marc.info/?l=bugtraq&m=108301983206107&w=2)
3. [openbb-file-upload(15971)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15971)
4. [11481](http://secunia.com/advisories/11481)
5. [1009935](http://securitytracker.com/id?1009935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28449
- **State**: PUBLISHED
- **Published Date**: February 04, 2021 at 14:40 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects all versions of package decal. The vulnerability is in the set function.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H`
### Affected Products
**n/a - decal**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.npmjs.com/package/decal)
2. [](https://snyk.io/vuln/SNYK-JS-DECAL-1051007)
3. [](https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73)
### Credits
- Nikita Stupin |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4809
- **State**: PUBLISHED
- **Published Date**: August 30, 2006 at 01:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: August 29, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox 1.0.1 and possibly other versions, including Mozilla and Thunderbird, allows remote attackers to spoof the URL in the Status Bar via an A HREF tag that contains a TABLE tag that contains another A tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mozilla-save-link-as-dialog-spoofing(19540)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19540)
2. [14568](http://secunia.com/advisories/14568)
3. [12798](http://www.securityfocus.com/bid/12798)
4. [1013423](http://securitytracker.com/id?1013423)
5. [14885](http://www.osvdb.org/14885)
6. [20050313 Firefox 1.01 : spoofing status bar without using JavaScript](http://marc.info/?l=full-disclosure&m=111073068631287&w=2)
7. [ADV-2005-0260](http://www.vupen.com/english/advisories/2005/0260) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7115
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Letters to God - soc. network (aka com.wPismakBoguLetterstoGod) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#794929](http://www.kb.cert.org/vuls/id/794929)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3037
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 11:10 UTC
- **Last Updated**: September 19, 2024 at 19:20 UTC
- **Reserved Date**: June 01, 2023 at 14:15 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**HelpDezk - HelpDezk Community**
Affected versions:
- 1.1.10 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community)
### Credits
- David Utón Amaya (m3n0sd0n4ld) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2075
- **State**: PUBLISHED
- **Published Date**: February 27, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:02 UTC
- **Reserved Date**: February 24, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SAP BusinessObjects Edge 4.0 allows remote attackers to delete audit events from the auditee queue via a clearData CORBA operation, aka SAP Note 2011396.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150225 [Onapsis Security Advisory 2015-004] SAP Business Objects Unauthorized Audit Information Delete via CORBA](http://www.securityfocus.com/archive/1/534751/100/0/threaded)
2. [20150225 [Onapsis Security Advisory 2015-004] SAP Business Objects Unauthorized Audit Information Delete via CORBA](http://seclists.org/fulldisclosure/2015/Feb/95)
3. [72778](http://www.securityfocus.com/bid/72778)
4. [](http://packetstormsecurity.com/files/130522/SAP-Business-Objects-Unauthorized-Audit-Information-Delete.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24330
- **State**: PUBLISHED
- **Published Date**: February 21, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 10:56 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Command Injection vulnerability in D-Link Dir 882 with firmware version DIR882A1_FW130B06 allows attackers to run arbitrary commands via crafted POST request to /HNAP1/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36457
- **State**: PUBLISHED
- **Published Date**: August 08, 2021 at 05:14 UTC
- **Last Updated**: August 04, 2024 at 17:30 UTC
- **Reserved Date**: August 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the lever crate before 0.1.1 for Rust. AtomicBox<T> implements the Send and Sync traits for all types T.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0137.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lever/RUSTSEC-2020-0137.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45688
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 03:10 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dromara/hutool/issues/2748)
2. [](https://github.com/stleary/JSON-java/issues/708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40170
- **State**: REJECTED
- **Last Updated**: January 26, 2023 at 00:00 UTC
- **Reserved Date**: September 07, 2022 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5316
- **State**: PUBLISHED
- **Published Date**: January 03, 2015 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 18:44 UTC
- **Reserved Date**: January 02, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in as/index.php in SweetRice CMS before 0.6.7.1 allows remote attackers to inject arbitrary web script or HTML via a top_height cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.htbridge.com/advisory/HTB22667) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0276
- **State**: PUBLISHED
- **Published Date**: February 02, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP OpenView Performance Insight Server 5.2, 5.3, 5.31, 5.4, and 5.41 contains a "hidden account" in the com.trinagy.security.XMLUserManager Java class, which allows remote attackers to execute arbitrary code via the doPost method in the com.trinagy.servlet.HelpManagerServlet class.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70754](http://osvdb.org/70754)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-11-034)
3. [SSRT090246](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02695453)
4. [20110131 ZDI-11-034: HP OpenView Performance Insight Server Backdoor Account Code Execution Vulnerability](http://www.securityfocus.com/archive/1/516093/100/0/threaded)
5. [HPSBMA02627](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02695453)
6. [8136](http://securityreason.com/securityalert/8136)
7. [16984](http://www.exploit-db.com/exploits/16984)
8. [1025014](http://www.securitytracker.com/id?1025014)
9. [openview-dopost-code-execution(65038)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65038)
10. [43145](http://secunia.com/advisories/43145)
11. [ADV-2011-0258](http://www.vupen.com/english/advisories/2011/0258)
12. [46079](http://www.securityfocus.com/bid/46079) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20096
- **State**: PUBLISHED
- **Published Date**: June 24, 2022 at 06:45 UTC
- **Last Updated**: April 15, 2025 at 14:13 UTC
- **Reserved Date**: June 23, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in WP-SpamFree Anti-Spam Plugin 2.1.1.4. This affects an unknown part. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**unspecified - WP-SpamFree Anti-Spam Plugin**
Affected versions:
- 2.1.1.4 (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Feb/79)
2. [](https://vuldb.com/?id.97371) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2646
- **State**: PUBLISHED
- **Published Date**: December 04, 2005 at 22:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: December 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The addUser function in UserManager.java in Free Web Chat 2.0 allows remote attackers to cause a denial of service (uncaught NullPointerException) via unknown attack vectors that cause the usrName variable to be null.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040804 Multiple Vulnerabilities in Free Web Chat](http://marc.info/?l=bugtraq&m=109164397601049&w=2)
2. [10863](http://www.securityfocus.com/bid/10863)
3. [1010851](http://securitytracker.com/alerts/2004/Aug/1010851.html)
4. [20040804 Multiple Vulnerabilities in Free Web Chat](http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0102.html)
5. [8369](http://www.osvdb.org/8369)
6. [freewebchat-usermanager-dos(16893)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16893) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9651
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 06:00 UTC
- **Last Updated**: December 09, 2024 at 17:53 UTC
- **Reserved Date**: October 08, 2024 at 19:02 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Fluent Forms WordPress plugin before 5.2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Fluent Forms**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a2c56e42-3b3a-4e23-933f-40cf63e222c0/)
### Credits
- Krugov Artyom
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0980
- **State**: PUBLISHED
- **Published Date**: July 21, 2022 at 21:06 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in New Tab Page in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interactions.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_15.html)
2. [](https://crbug.com/1302157)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9320
- **State**: PUBLISHED
- **Published Date**: May 31, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Head Unit HU_NBT (aka Infotainment) component on BMW i Series, BMW X Series, BMW 3 Series, BMW 5 Series, and BMW 7 Series vehicles produced in 2012 through 2018 allows a local attack when a USB device is plugged in.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://keenlab.tencent.com/en/Experimental_Security_Assessment_of_BMW_Cars_by_KeenLab.pdf)
2. [](https://www.theregister.co.uk/2018/05/23/bmw_security_bugs/)
3. [104258](http://www.securityfocus.com/bid/104258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50241
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 10:14 UTC
- **Last Updated**: May 04, 2025 at 12:59 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Initialize struct nfsd4_copy earlier
Ensure the refcount and async_copies fields are initialized early.
cleanup_async_copy() will reference these fields if an error occurs
in nfsd4_copy(). If they are not correctly initialized, at the very
least, a refcount underflow occurs.
### Affected Products
**Linux - Linux**
Affected versions:
- 9e52ff544e0bfa09ee339fd7b0937ee3c080c24e (Status: affected)
- 43e46ee5efc03990b223f7aa8b77aa9c3d3acfdf (Status: affected)
- 7ea9260874b779637aff6d24c344b8ef4ac862a0 (Status: affected)
- ae267989b7b7933dfedcd26468d0a88fc3a9da9e (Status: affected)
- 6a488ad7745b8f64625c6d3a24ce7e448e83f11b (Status: affected)
- aadc3bbea163b6caaaebfdd2b6c4667fbc726752 (Status: affected)
- b4e21431a0db4854b5023cd5af001be557e6c3db (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11.3 (Status: affected)
### References
1. [](https://git.kernel.org/stable/c/059434d23c4578d9d02efb92d848ea21bc640112)
2. [](https://git.kernel.org/stable/c/7267625baf365a969f1b25ded6f07b64bc90ec5b)
3. [](https://git.kernel.org/stable/c/c3074003fa6837c2b89a34d8d12d9463b59d22d6)
4. [](https://git.kernel.org/stable/c/421f1a2a1afb47d88de09457ef7687e1df7bc997)
5. [](https://git.kernel.org/stable/c/e30a9a2f69c34a00a3cb4fd45c5d231929e66fb1)
6. [](https://git.kernel.org/stable/c/63fab04cbd0f96191b6e5beedc3b643b01c15889) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1188
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 18:13 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
The attacker could present to the user a removable drive, or remote share, that contains a malicious .LNK file and an associated malicious binary. When the user opens this drive(or remote share) in Windows Explorer, or any other application that parses the .LNK file, the malicious binary will execute code of the attacker’s choice, on the target system.
The security update addresses the vulnerability by correcting the processing of shortcut LNK references.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1188) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4599
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 10:48 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: May 07, 2024 at 07:49 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Remote denial of service vulnerability in LAN Messenger affecting version 3.4.0. This vulnerability allows an attacker to crash the LAN Messenger service by sending a long string directly and continuously over the UDP protocol.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**LAN Messenger - LAN Messenger**
Affected versions:
- 3.4.0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/denial-service-vulnerability-lan-messenger)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2894
- **State**: PUBLISHED
- **Published Date**: June 27, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: June 27, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the FTP client in NCH Software Classic FTP 1.02 for Windows allows remote FTP servers to create or overwrite arbitrary files via a .. (dot dot) in a response to a LIST command, a related issue to CVE-2002-1345.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://vuln.sg/classicftp102-en.html)
2. [30708](http://secunia.com/advisories/30708)
3. [ADV-2008-1899](http://www.vupen.com/english/advisories/2008/1899/references)
4. [29846](http://www.securityfocus.com/bid/29846)
5. [classicftp-list-directory-traversal(43230)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43230) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20141
- **State**: PUBLISHED
- **Published Date**: March 17, 2019 at 20:04 UTC
- **Last Updated**: August 05, 2024 at 11:51 UTC
- **Reserved Date**: December 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AbanteCart 1.2.12 has reflected cross-site scripting (XSS) via the sort parameter, as demonstrated by a /apparel--accessories?sort= substring.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/151305/Abantecart-1.2.12-Cross-Site-Scripting.html)
2. [](http://seclists.org/fulldisclosure/2019/Jan/59)
3. [](https://github.com/abantecart) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28089
- **State**: PUBLISHED
- **Published Date**: March 09, 2024 at 00:00 UTC
- **Last Updated**: August 19, 2024 at 19:53 UTC
- **Reserved Date**: March 04, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity (who has access to the router admin panel) to conduct a DOM-based stored XSS attack that can fetch remote resources. The payload is executed at index.html#advanced_location (aka the Device Location page). This can cause a denial of service or lead to information disclosure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089)
2. [](https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC.gif)
3. [](https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC_DOS_ALT.gif) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17299
- **State**: PUBLISHED
- **Published Date**: October 07, 2019 at 15:05 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the Administration module by an Admin user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-026/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0223
- **State**: PUBLISHED
- **Published Date**: February 22, 2012 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 00:40 UTC
- **Reserved Date**: December 21, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Untrusted search path vulnerability in 7-Technologies (7T) TERMIS 2.10 and earlier allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2012-0224.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-025-02A.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1710
- **State**: PUBLISHED
- **Published Date**: September 21, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 20:27 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 tool db2licm is affected by buffer overflow vulnerability that can potentially result in arbitrary code execution. IBM X-Force ID: 146364.
### Affected Products
**IBM - DB2 for Linux, UNIX and Windows**
Affected versions:
- 10.5 (Status: affected)
- 10.1 (Status: affected)
- 11.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10729981)
2. [ibm-db2-cve20181710-bo(146364)](https://exchange.xforce.ibmcloud.com/vulnerabilities/146364)
3. [105391](http://www.securityfocus.com/bid/105391)
4. [USN-3906-2](https://usn.ubuntu.com/3906-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4301
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 00:31 UTC
- **Last Updated**: May 06, 2025 at 13:35 UTC
- **Reserved Date**: May 05, 2025 at 12:23 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in itsourcecode Content Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /search-notice.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**itsourcecode - Content Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-307405 | itsourcecode Content Management System search-notice.php sql injection](https://vuldb.com/?id.307405)
2. [VDB-307405 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.307405)
3. [Submit #563625 | itsourcecode Content Management System v1.0 SQL Injection](https://vuldb.com/?submit.563625)
4. [](https://github.com/6BXK6/cve/issues/2)
5. [](https://itsourcecode.com/)
### Credits
- wangzhizheng (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5343
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 20, 2013 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4670
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 15:20 UTC
- **Last Updated**: September 16, 2024 at 19:15 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper data representation. IBM X-Force ID: 171319.
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/1289152)
2. [ibm-websphere-cve20194670-info-disc (171319)](https://exchange.xforce.ibmcloud.com/vulnerabilities/171319) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1261
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 22:00 UTC
- **Last Updated**: May 08, 2025 at 18:52 UTC
- **Reserved Date**: February 06, 2024 at 08:28 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Juanpao JPShop up to 1.5.02. This vulnerability affects the function actionIndex of the file /api/controllers/merchant/app/ComboController.php of the component API. The manipulation of the argument pic_url leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253000.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Juanpao - JPShop**
Affected versions:
- 1.5.02 (Status: affected)
### References
1. [](https://vuldb.com/?id.253000)
2. [](https://vuldb.com/?ctiid.253000)
3. [](https://note.zhaoj.in/share/v2JpHJngvw7E)
### Credits
- glzjin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15337
- **State**: PUBLISHED
- **Published Date**: June 26, 2020 at 15:00 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: June 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /registerCpe requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2020-03-09-zyxel-secumanager-0day-vulnerabilities.html)
2. [](https://www.zyxel.com/support/vulnerabilities-of-CloudCNM-SecuManager.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30788
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tuxera/ntfs-3g/releases)
2. [](https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x)
3. [DSA-5160](https://www.debian.org/security/2022/dsa-5160)
4. [FEDORA-2022-8f775872c9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JPX6OUCQKZX4PN5DQPVDUFZCOOZUX7Z/)
5. [FEDORA-2022-13bc8c91b0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECDCISL24TYH4CTDFCUVF24WAKRSYF7F/)
6. [[debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update](https://lists.debian.org/debian-lts-announce/2022/06/msg00017.html)
7. [FEDORA-2022-8fa7e5aeaf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAXFYIJWT5SHHRNPOJETM77EIMJ6ZP6I/)
8. [FEDORA-2022-1176b501f0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEXHDCUSLJD2HSPMAAVZ5AWMPUOG6UI7/)
9. [GLSA-202301-01](https://security.gentoo.org/glsa/202301-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2613
- **State**: PUBLISHED
- **Published Date**: May 11, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WikkaWiki (Wikka Wiki) before 1.1.6.3 allows attackers in a shared virtual host server environment to upload and execute an arbitrary configuration file by modifying the WAKKA_CONFIG environment variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35825](http://osvdb.org/35825)
2. [ADV-2007-1725](http://www.vupen.com/english/advisories/2007/1725)
3. [](http://wikkawiki.org/WikkaReleaseNotes)
4. [](http://wush.net/trac/wikka/ticket/98) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30840
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 00:00 UTC
- **Last Updated**: August 15, 2024 at 18:34 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Stack Overflow vulnerability in Tenda AC15 v15.03.05.18 allows attackers to cause a denial of service via the LISTEN parameter in the fromDhcpListClient function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2486
- **State**: PUBLISHED
- **Published Date**: March 07, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 15:36 UTC
- **Reserved Date**: March 06, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2013:0494](http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html)
2. [53425](http://secunia.com/advisories/53425)
3. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8364)
4. [openSUSE-SU-2013:0911](http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html)
5. [](http://www.wireshark.org/security/wnpa-sec-2013-21.html)
6. [oval:org.mitre.oval:def:16109](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16109)
7. [52471](http://secunia.com/advisories/52471)
8. [](http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html)
9. [openSUSE-SU-2013:0506](http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html)
10. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-reload.c?r1=47805&r2=47804&pathrev=47805)
11. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=47805)
12. [openSUSE-SU-2013:0947](http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35070
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 21:24 UTC
- **Last Updated**: August 03, 2024 at 09:29 UTC
- **Reserved Date**: July 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x65fc97.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drive.google.com/file/d/13_Iq4Uj3B4iz07N8qWYhx_bZd618F6YN/view?usp=sharing)
2. [](https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35070.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1997
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6861
- **State**: PUBLISHED
- **Published Date**: January 04, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 20:42 UTC
- **Reserved Date**: January 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Outfront Spooky Login 2.7 allow remote attackers to execute arbitrary SQL commands via (1) the UserUpdate parameter to login/register.asp or (2) unspecified parameters to includes/a_register.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21822](http://www.securityfocus.com/bid/21822)
2. [20061229 Spooky Login Multiple HTML Injection Vulnerability](http://www.securityfocus.com/archive/1/455603/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3901
- **State**: PUBLISHED
- **Published Date**: December 12, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 19, 2007 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20071211 Multiple Microsoft DirectShow Remote Code Execution Vulnerabilities](http://www.iss.net/threats/280.html)
2. [VU#804089](http://www.kb.cert.org/vuls/id/804089)
3. [MS07-064](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-064)
4. [26789](http://www.securityfocus.com/bid/26789)
5. [oval:org.mitre.oval:def:4520](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4520)
6. [ms-directshow-sami-code-execution(38721)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38721)
7. [SSRT071506](http://www.securityfocus.com/archive/1/485268/100/0/threaded)
8. [1019073](http://www.securitytracker.com/id?1019073)
9. [20071211 Microsoft DirectX 7 and 8 DirectShow Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=632)
10. [28010](http://secunia.com/advisories/28010)
11. [HPSBST02299](http://www.securityfocus.com/archive/1/485268/100/0/threaded)
12. [4866](https://www.exploit-db.com/exploits/4866)
13. [TA07-345A](http://www.us-cert.gov/cas/techalerts/TA07-345A.html)
14. [ADV-2007-4180](http://www.vupen.com/english/advisories/2007/4180) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0410
- **State**: PUBLISHED
- **Published Date**: June 11, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 10, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in AnalogX Proxy 4.13 allows remote attackers to execute arbitrary code via a long URL to port 6588.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030526 NII Advisory - Buffer Overflow in Analogx Proxy](http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0082.html)
2. [analogx-proxy-url-bo(12068)](http://www.iss.net/security_center/static/12068.php)
3. [7681](http://www.securityfocus.com/bid/7681)
4. [](http://www.analogx.com/contents/download/network/proxy.htm)
5. [20030526 NII Advisory - Buffer Overflow in Analogx Proxy](http://marc.info/?l=bugtraq&m=105406759403978&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1123
- **State**: PUBLISHED
- **Published Date**: June 10, 2009 at 18:00 UTC
- **Last Updated**: February 04, 2025 at 18:29 UTC
- **Reserved Date**: March 25, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35372](http://secunia.com/advisories/35372)
2. [54940](http://osvdb.org/54940)
3. [ADV-2009-1544](http://www.vupen.com/english/advisories/2009/1544)
4. [MS09-025](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-025)
5. [1022359](http://www.securitytracker.com/id?1022359)
6. [oval:org.mitre.oval:def:6206](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6206)
7. [TA09-160A](http://www.us-cert.gov/cas/techalerts/TA09-160A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25781
- **State**: PUBLISHED
- **Published Date**: September 30, 2020 at 20:31 UTC
- **Last Updated**: August 04, 2024 at 15:40 UTC
- **Reserved Date**: September 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mantisbt.org/bugs/view.php?id=27039)
2. [](http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93)
3. [](http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39709
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:04 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In sendSipAccountsRemovedNotification of SipAccountRegistry.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208817618
### Affected Products
**n/a - Android**
Affected versions:
- Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4043
- **State**: PUBLISHED
- **Published Date**: September 11, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 11, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in AJ Square AJ HYIP Acme allow remote attackers to execute arbitrary SQL commands via the artid parameter to (1) acme/article/comment.php and (2) prime/article/comment.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4240](http://securityreason.com/securityalert/4240)
2. [30974](http://www.securityfocus.com/bid/30974)
3. [ajhyipacme-comment-sql-injection(44803)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44803)
4. [6350](https://www.exploit-db.com/exploits/6350) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0685
- **State**: PUBLISHED
- **Published Date**: July 06, 2017 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:00 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34203195.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-07-01)
2. [99478](http://www.securityfocus.com/bid/99478) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17232
- **State**: PUBLISHED
- **Published Date**: September 20, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 10:47 UTC
- **Reserved Date**: September 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in archivebot.py in docmarionum1 Slack ArchiveBot (aka slack-archive-bot) before 2018-09-19 allows remote attackers to execute arbitrary SQL commands via the text parameter to cursor.execute().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/docmarionum1/slack-archive-bot/issues/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0288
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Phusion web server 1.0 allows remote attackers to read arbitrary files via a ... (triple dot dot) in the HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4117](http://www.securityfocus.com/bid/4117)
2. [20020217 Phusion-Webserver-v1.0-Bugs&Exploits-Remotes](http://marc.info/?l=bugtraq&m=101408906001958&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26805
- **State**: PUBLISHED
- **Published Date**: April 14, 2021 at 13:51 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a malicious WAV file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/justdan96/tsMuxer/issues/395) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28022
- **State**: PUBLISHED
- **Published Date**: April 23, 2025 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:52 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://locrian-lightning-dc7.notion.site/BufferOverflow3-1948e5e2b1a280ec8061ed308b33b5bc?pvs=73)
2. [](https://locrian-lightning-dc7.notion.site/CVE-2025-28022-BufferOverflow3-1948e5e2b1a280ec8061ed308b33b5bc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3786
- **State**: PUBLISHED
- **Published Date**: August 26, 2008 at 14:06 UTC
- **Last Updated**: August 07, 2024 at 09:52 UTC
- **Reserved Date**: August 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in PICTURESPRO Photo Cart 3.9 allows remote attackers to inject arbitrary web script or HTML via the qtitle parameter (aka "Gallery or event name" field) in a search action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30798](http://www.securityfocus.com/bid/30798)
2. [photocart-gallery-xss(44614)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44614)
3. [20080822 Photo Cart 3.9 index.php "search" XSS](http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064046.html)
4. [31589](http://secunia.com/advisories/31589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22044
- **State**: PUBLISHED
- **Published Date**: June 01, 2021 at 20:02 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://trac.ffmpeg.org/ticket/8295)
2. [[debian-lts-announce] 20211114 [SECURITY] [DLA 2818-1] ffmpeg security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8478
- **State**: PUBLISHED
- **Published Date**: December 06, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 05, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html)
2. [USN-2825-1](http://www.ubuntu.com/usn/USN-2825-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30723
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 03:12 UTC
- **Last Updated**: September 26, 2024 at 15:24 UTC
- **Reserved Date**: April 14, 2023 at 01:59 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper input validation vulnerability in Samsung Health prior to version 6.24.2.011 allows attackers to write arbitrary file with Samsung Health privilege.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Health**
Affected versions:
- 6.24.2.011 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18010
- **State**: PUBLISHED
- **Published Date**: January 01, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 21:06 UTC
- **Reserved Date**: January 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The E-goi Smart Marketing SMS and Newsletters Forms plugin before 2.0.0 for WordPress has XSS via the admin/partials/custom/egoi-for-wp-form_egoi.php url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/smart-marketing-for-wp/#developers)
2. [](https://wpvulndb.com/vulnerabilities/8974)
3. [](https://packetstormsecurity.com/files/145217/WordPress-Smart-Marketing-SMS-And-Newsletters-Forms-1.1.1-XSS.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24838
- **State**: PUBLISHED
- **Published Date**: January 17, 2022 at 13:00 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The AnyComment WordPress plugin before 0.3.5 has an API endpoint which passes user input via the redirect parameter to the wp_redirect() function without being validated first, leading to an Open Redirect issue, which according to the vendor, is a feature.
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Unknown - AnyComment**
Affected versions:
- 0.3.5 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82)
### Credits
- Brandon Roldan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5962
- **State**: PUBLISHED
- **Published Date**: July 05, 2019 at 13:20 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Zoho SalesIQ 1.0.8 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**Zoho SalesIQ Team - Zoho SalesIQ**
Affected versions:
- 1.0.8 and earlier (Status: affected)
### References
1. [](https://wordpress.org/plugins/zoho-salesiq/)
2. [](https://jvn.jp/en/jp/JVN88962935/index.html)
3. [](https://wpvulndb.com/vulnerabilities/9433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29053
- **State**: PUBLISHED
- **Published Date**: September 06, 2022 at 15:10 UTC
- **Last Updated**: October 22, 2024 at 20:54 UTC
- **Reserved Date**: April 11, 2022 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A missing cryptographic steps vulnerability [CWE-325] in the functions that encrypt the keytab files in FortiOS version 7.2.0, 7.0.0 through 7.0.5 and below 7.0.0 may allow an attacker in possession of the encrypted file to decipher it.
### CVSS Metrics
- **CVSS Base Score**: 2.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C`
### Affected Products
**Fortinet - Fortinet FortiOS**
Affected versions:
- FortiOS 7.2.0, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0, 6.4.9, 6.4.8, 6.4.7, 6.4.6, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.10, 6.2.9, 6.2.8, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.14, 6.0.13, 6.0.12, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0 (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-22-158) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46204
- **State**: PUBLISHED
- **Published Date**: January 19, 2022 at 17:44 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter. SQL injection vulnerability via taocms\include\Model\Article.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/taogogo/taocms/issues/14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0802
- **State**: PUBLISHED
- **Published Date**: January 10, 2018 at 01:00 UTC
- **Last Updated**: February 07, 2025 at 16:38 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.
### Affected Products
**Microsoft Corporation - Equation Editor**
Affected versions:
- Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0802)
2. [](https://github.com/rxwx/CVE-2018-0802)
3. [1040153](http://www.securitytracker.com/id/1040153)
4. [](https://0patch.blogspot.com/2018/01/the-bug-that-killed-equation-editor-how.html)
5. [102347](http://www.securityfocus.com/bid/102347)
6. [](https://github.com/zldww2011/CVE-2018-0802_POC)
7. [](https://research.checkpoint.com/another-office-equation-rce-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2020
- **State**: PUBLISHED
- **Published Date**: June 08, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:17 UTC
- **Reserved Date**: January 22, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HPE Systems Insight Manager (SIM) before 7.5.1 allows remote authenticated users to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2016-2017, CVE-2016-2019, CVE-2016-2021, CVE-2016-2022, and CVE-2016-2030.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05131085)
2. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888)
3. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7140
- **State**: PUBLISHED
- **Published Date**: October 23, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 15:49 UTC
- **Reserved Date**: March 17, 2017 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 11 is affected. The issue involves the "Keyboard Suggestions" component. It allows attackers to obtain sensitive information by reading keyboard autocorrect suggestions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101000](http://www.securityfocus.com/bid/101000)
2. [](https://support.apple.com/HT208112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0784
- **State**: PUBLISHED
- **Published Date**: February 06, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in login.asp for tPassword in the Raymond BERTHOU script collection (aka RBL - ASP) allows remote attackers to execute arbitrary SQL commands via the (1) User and (2) Password parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070127 RBL - ASP (scripts with db) SQL injection](http://www.securityfocus.com/archive/1/458495/100/0/threaded)
2. [](http://forums.avenir-geopolitique.net/viewtopic.php?t=2607)
3. [20070131 Partial source code verify - "RBL - ASP" scripts SQL injection](http://www.attrition.org/pipermail/vim/2007-January/001259.html)
4. [2225](http://securityreason.com/securityalert/2225)
5. [20070129 RBL - ASP (scripts with db) SQL injection](http://www.securityfocus.com/archive/1/458560/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0389
- **State**: PUBLISHED
- **Published Date**: January 24, 2012 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in ForgottenPassword.aspx in MailEnable Professional, Enterprise, and Premium 4.26 and earlier, 5.x before 5.53, and 6.x before 6.03 allows remote attackers to inject arbitrary web script or HTML via the Username parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47518](http://secunia.com/advisories/47518)
2. [1026519](http://www.securitytracker.com/id?1026519)
3. [51401](http://www.securityfocus.com/bid/51401)
4. [20120112 ME020567: MailEnable webmail cross-site scripting vulnerability CVE-2012-0389](http://archives.neohapsis.com/archives/bugtraq/2012-01/0090.html)
5. [78242](http://osvdb.org/78242)
6. [](http://www.nerv.fi/CVE-2012-0389.txt)
7. [](http://www.mailenable.com/kb/Content/Article.asp?ID=me020567)
8. [mailenable-forgottenpassword-xss(72380)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72380)
9. [47562](http://secunia.com/advisories/47562)
10. [18447](http://www.exploit-db.com/exploits/18447) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.