System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4417
- **State**: REJECTED
- **Published Date**: December 02, 2013 at 22:00 UTC
- **Last Updated**: December 02, 2013 at 21:57 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5124
- **State**: PUBLISHED
- **Published Date**: January 25, 2020 at 17:53 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.50005. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.
### Affected Products
**n/a - AMD**
Affected versions:
- AMD ATIDXX64.DLL (26.20.13001.50005) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.1.0 build-13591040) with Windows 10 x64 as guestVM (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0913) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29815
- **State**: PUBLISHED
- **Published Date**: April 28, 2022 at 09:55 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 27, 2022 at 00:00 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains IntelliJ IDEA before 2022.1 local code execution via workspace settings was possible
### CVSS Metrics
- **CVSS Base Score**: 6.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**JetBrains - IntelliJ IDEA**
Affected versions:
- 2022.1 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0535
- **State**: PUBLISHED
- **Published Date**: January 15, 2024 at 03:00 UTC
- **Last Updated**: November 14, 2024 at 14:22 UTC
- **Reserved Date**: January 14, 2024 at 17:14 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Tenda PA6 1.0.1.21. Affected by this vulnerability is the function cgiPortMapAdd of the file /portmap of the component httpd. The manipulation of the argument groupName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250705 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - PA6**
Affected versions:
- 1.0.1.21 (Status: affected)
### References
1. [](https://vuldb.com/?id.250705)
2. [](https://vuldb.com/?ctiid.250705)
3. [](https://github.com/jylsec/vuldb/blob/main/Tenda/PA6/2/README.md)
### Credits
- jylsec (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1577
- **State**: PUBLISHED
- **Published Date**: December 10, 2019 at 18:45 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
### Affected Products
**dietlibc - dietlibc**
Affected versions:
- before 0.33 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2012-1577)
2. [](http://www.openwall.com/lists/oss-security/2012/03/23/14)
3. [](http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libc/stdlib/random.c#rev1.16)
4. [](https://github.com/ensc/dietlibc/blob/master/CHANGES) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0044
- **State**: PUBLISHED
- **Published Date**: October 10, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 22:31 UTC
- **Reserved Date**: November 16, 2017 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPasswords option set to "yes". Affected releases are Juniper Networks Junos OS: 18.1 versions prior to 18.1R4 on NFX Series.
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 18.1 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA10878)
2. [105565](http://www.securityfocus.com/bid/105565) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5455
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 08:46 UTC
- **Last Updated**: June 02, 2025 at 12:42 UTC
- **Reserved Date**: June 02, 2025 at 08:31 UTC
- **Assigned By**: TQtC
### Vulnerability Description
An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.
If the function was called with malformed data, for example, an URL that
contained a "charset" parameter that lacked a value (such as
"data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service
(abort).
This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**The Qt Company - Qt**
Affected versions:
- 0 (Status: affected)
- 6.0.0 (Status: affected)
- 6.5.9 (Status: unaffected)
- 6.6.0 (Status: affected)
- 6.8.4 (Status: unaffected)
- 6.9.0 (Status: affected)
- 6.9.1 (Status: unaffected)
### References
1. [](https://codereview.qt-project.org/c/qt/qtbase/+/642006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48265
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 14:45 UTC
- **Last Updated**: May 19, 2025 at 15:17 UTC
- **Reserved Date**: May 19, 2025 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Pektsekye Year Make Model Search for WooCommerce allows Cross Site Request Forgery. This issue affects Year Make Model Search for WooCommerce: from n/a through 1.0.11.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Pektsekye - Year Make Model Search for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ymm-search/vulnerability/wordpress-year-make-model-search-for-woocommerce-plugin-1-0-11-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1965
- **State**: PUBLISHED
- **Published Date**: October 22, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 08, 2009 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Net Foundation Layer component in Oracle Database 9.2.0.8 and 10.1.0.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36760](http://www.securityfocus.com/bid/36760)
2. [37027](http://secunia.com/advisories/37027)
3. [1023057](http://www.securitytracker.com/id?1023057)
4. [TA09-294A](http://www.us-cert.gov/cas/techalerts/TA09-294A.html)
5. [](http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1819
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 10:05 UTC
- **Last Updated**: December 27, 2024 at 14:56 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There are multiple out of bounds (OOB) read vulnerabilities in the implementation of the Common Open Policy Service (COPS) protocol of some Huawei products. The specific decoding function may occur out-of-bounds read when processes an incoming data packet. Successful exploit of these vulnerabilities may disrupt service on the affected device. (Vulnerability ID: HWPSIRT-2018-12275,HWPSIRT-2018-12276,HWPSIRT-2018-12277,HWPSIRT-2018-12278,HWPSIRT-2018-12279,HWPSIRT-2018-12280 and HWPSIRT-2018-12289)
The seven vulnerabilities have been assigned seven Common Vulnerabilities and Exposures (CVE) IDs: CVE-2020-1818, CVE-2020-1819, CVE-2020-1820, CVE-2020-1821, CVE-2020-1822, CVE-2020-1823 and CVE-2020-1824.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Huawei - IPS Module**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NGFW Module**
Affected versions:
- V500R002C00 (Status: affected)
- V500R002C20 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NIP6300**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NIP6600**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NIP6800**
Affected versions:
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6300**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6500**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6600**
Affected versions:
- V500R001C30 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - USG6000V**
Affected versions:
- V500R003C00 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20191218-01-cops-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4805
- **State**: PUBLISHED
- **Published Date**: October 31, 2008 at 17:18 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in IBM Lotus Connections 2.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via (1) the community title, (2) API input, and vectors related to the (3) Homepage, (4) Blogs, (5) Profiles, (6) Dogear, (7) Activities, and (8) Global Search components. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lotus-connections-api-xss(46215)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46215)
2. [32466](http://secunia.com/advisories/32466)
3. [31989](http://www.securityfocus.com/bid/31989)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg27014008)
5. [lotus-connections-community-title-xss(46211)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46211)
6. [lotus-connections-unspecified-xss(46210)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37768
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 13:07 UTC
- **Last Updated**: May 26, 2025 at 05:20 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
- c52dcf49195d06319189c7f1dd8b62bfca545197 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.20 (Status: affected)
- 0 (Status: unaffected)
- 5.10.237 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.25 (Status: unaffected)
- 6.14.4 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3cdd02cb70682d7d205ca6dc02a4d1eb76758d24)
2. [](https://git.kernel.org/stable/c/be0fffc4152aac4f0291ed2d793f3cfee788449d)
3. [](https://git.kernel.org/stable/c/5fc4fb54f6f064c25bfbbfd443aa861d3422dd4c)
4. [](https://git.kernel.org/stable/c/b0742a709be7979c7a480772046a1f36d09dab00)
5. [](https://git.kernel.org/stable/c/8e9c4f8d197d5709c75effa5d58e80b4fa01981a)
6. [](https://git.kernel.org/stable/c/9e4f1e21fe7b93a8ef57db433071266c2590e260)
7. [](https://git.kernel.org/stable/c/7c246a05df51c52fe0852ce56ba10c41e6ed1f39) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50564
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 00:00 UTC
- **Last Updated**: October 08, 2024 at 14:22 UTC
- **Reserved Date**: December 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SecBridge/Cms_Vuls_test/blob/main/Pluckcms/Pluck_v4.7.18_Any_File_Upload_Getshell.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7119
- **State**: PUBLISHED
- **Published Date**: May 23, 2019 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-17.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6027
- **State**: PUBLISHED
- **Published Date**: November 21, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the LoadFile method in an AcroPDF ActiveX control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://research.eeye.com/html/alerts/zeroday/20061128.html)
2. [ADV-2006-4751](http://www.vupen.com/english/advisories/2006/4751)
3. [23138](http://secunia.com/advisories/23138)
4. [VU#198908](http://www.kb.cert.org/vuls/id/198908)
5. [](http://downloads.securityfocus.com/vulnerabilities/exploits/21155-AcroPDF_DoS.html)
6. [](http://www.adobe.com/support/security/advisories/apsa06-02.html)
7. [adobe-acrobat-acropdf-code-execution(30574)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30574)
8. [1017297](http://securitytracker.com/id?1017297)
9. [20061205 eEye's Zero-Day Tracker Launch](http://www.securityfocus.com/archive/1/453579/100/0/threaded)
10. [21155](http://www.securityfocus.com/bid/21155) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2508
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 08:30 UTC
- **Last Updated**: July 31, 2024 at 13:33 UTC
- **Reserved Date**: March 15, 2024 at 15:02 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Mobile Menu plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_menu_item_icon function in all versions up to, and including, 2.8.4.4. This makes it possible for unauthenticated attackers to add the '_mobmenu_icon' post meta to arbitrary posts with an arbitrary (but sanitized) value. NOTE: Version 2.8.4.4 contains a partial fix for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**takanakui - WP Mobile Menu – The Mobile-Friendly Responsive Menu**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd9569f-3cda-4482-8ccd-c3f362b4e651?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?old_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&old=3125561&new_path=%2Fmobile-menu%2Ftrunk%2Fincludes%2Fclass-wp-mobile-menu-core.php&new=3125561&sfp_email=&sfph_mail=)
### Credits
- 1337_Wannabe |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2079
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3147
- **State**: PUBLISHED
- **Published Date**: June 11, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Yahoo! Webcam Upload ActiveX control in ywcupl.dll 2.0.1.4 for Yahoo! Messenger 8.1.0.249 allows remote attackers to execute arbitrary code via a long server property value to the send method. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070606 Yahoo 0day ActiveX Webcam Exploit](http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063817.html)
2. [4042](https://www.exploit-db.com/exploits/4042)
3. [24354](http://www.securityfocus.com/bid/24354)
4. [](http://research.eeye.com/html/advisories/upcoming/20070605.html)
5. [VU#949817](http://www.kb.cert.org/vuls/id/949817)
6. [](http://messenger.yahoo.com/security_update.php?id=060707)
7. [ADV-2007-2094](http://www.vupen.com/english/advisories/2007/2094)
8. [25547](http://secunia.com/advisories/25547)
9. [20070608 EEYE: Yahoo Webcam ActiveX Controls Multiple Buffer Overflows](http://www.securityfocus.com/archive/1/470861/100/0/threaded)
10. [1018204](http://securitytracker.com/id?1018204)
11. [yahoo-webcam-upload-bo(34758)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34758)
12. [24341](http://www.securityfocus.com/bid/24341)
13. [1018203](http://www.securitytracker.com/id?1018203)
14. [2809](http://securityreason.com/securityalert/2809)
15. [](http://research.eeye.com/html/advisories/published/AD20070608.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7781
- **State**: PUBLISHED
- **Published Date**: July 03, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, by sending a specially crafted request an authenticated user can view password in clear text and results in privilege escalation.
### Affected Products
**Schneider Electric SE - Pelco Sarix Professional V1**
Affected versions:
- Pelco Sarix Pro 1 st generation with firmware versions prior to 3.29.69 (Status: affected)
### References
1. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-114-01/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11208
- **State**: PUBLISHED
- **Published Date**: August 08, 2019 at 15:36 UTC
- **Last Updated**: September 17, 2024 at 02:53 UTC
- **Reserved Date**: April 12, 2019 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The authorization component of TIBCO Software Inc.'s TIBCO API Exchange Gateway, and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically processes OAuth authorization incorrectly, leading to potential escalation of privileges for the specific customer endpoint, when the implementation uses multiple scopes. This issue affects: TIBCO Software Inc.'s TIBCO API Exchange Gateway version 2.3.1 and prior versions, and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric version 2.3.1 and prior versions.
### Affected Products
**TIBCO Software Inc. - TIBCO API Exchange Gateway**
Affected versions:
- 2.3.1 and prior (Status: affected)
**TIBCO Software Inc. - TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric**
Affected versions:
- 2.3.1 and prior (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2019/08/tibco-security-advisory-august-7-2019-tibco-api-exchange) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49214
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 08:32 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: Don't use DSISR for SLB faults
Since commit 46ddcb3950a2 ("powerpc/mm: Show if a bad page fault on data
is read or write.") we use page_fault_is_write(regs->dsisr) in
__bad_page_fault() to determine if the fault is for a read or write, and
change the message printed accordingly.
But SLB faults, aka Data Segment Interrupts, don't set DSISR (Data
Storage Interrupt Status Register) to a useful value. All ISA versions
from v2.03 through v3.1 specify that the Data Segment Interrupt sets
DSISR "to an undefined value". As far as I can see there's no mention of
SLB faults setting DSISR in any BookIV content either.
This manifests as accesses that should be a read being incorrectly
reported as writes, for example, using the xmon "dump" command:
0:mon> d 0x5deadbeef0000000
5deadbeef0000000
[359526.415354][ C6] BUG: Unable to handle kernel data access on write at 0x5deadbeef0000000
[359526.415611][ C6] Faulting instruction address: 0xc00000000010a300
cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf400]
pc: c00000000010a300: mread+0x90/0x190
If we disassemble the PC, we see a load instruction:
0:mon> di c00000000010a300
c00000000010a300 89490000 lbz r10,0(r9)
We can also see in exceptions-64s.S that the data_access_slb block
doesn't set IDSISR=1, which means it doesn't load DSISR into pt_regs. So
the value we're using to determine if the fault is a read/write is some
stale value in pt_regs from a previous page fault.
Rework the printing logic to separate the SLB fault case out, and only
print read/write in the cases where we can determine it.
The result looks like eg:
0:mon> d 0x5deadbeef0000000
5deadbeef0000000
[ 721.779525][ C6] BUG: Unable to handle kernel data access at 0x5deadbeef0000000
[ 721.779697][ C6] Faulting instruction address: 0xc00000000014cbe0
cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390]
0:mon> d 0
0000000000000000
[ 742.793242][ C6] BUG: Kernel NULL pointer dereference at 0x00000000
[ 742.793316][ C6] Faulting instruction address: 0xc00000000014cbe0
cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390]
### Affected Products
**Linux - Linux**
Affected versions:
- 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d (Status: affected)
- 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d (Status: affected)
- 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d (Status: affected)
- 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d (Status: affected)
**Linux - Linux**
Affected versions:
- 5.5 (Status: affected)
- 0 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4a852ff9b7bea9c640540e2c1bc70bd3ba455d61)
2. [](https://git.kernel.org/stable/c/a3dae36d632b2cf6eb20314273e512a96cb43c9a)
3. [](https://git.kernel.org/stable/c/093449bb182db885dae816d62874cccab7a4c42a)
4. [](https://git.kernel.org/stable/c/d4679ac8ea2e5078704aa1c026db36580cc1bf9a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2390
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 19:00 UTC
- **Last Updated**: March 18, 2025 at 14:54 UTC
- **Reserved Date**: March 16, 2025 at 17:23 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. This affects an unknown part of the file /user_dashboard/add_donor.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Blood Bank Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-299889 | code-projects Blood Bank Management System add_donor.php sql injection](https://vuldb.com/?id.299889)
2. [VDB-299889 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299889)
3. [Submit #516908 | code-projects Blood Bank Management System 1 SQL Injection](https://vuldb.com/?submit.516908)
4. [](https://github.com/intercpt/XSS1/blob/main/SQL8.md)
5. [](https://code-projects.org/)
### Credits
- intrcpt (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26043
- **State**: REJECTED
- **Published Date**: January 19, 2022 at 03:26 UTC
- **Last Updated**: January 19, 2022 at 03:26 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: Joomla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28864
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 21:00 UTC
- **Last Updated**: March 12, 2025 at 15:06 UTC
- **Reserved Date**: March 11, 2025 at 08:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Planet Studio Builder for Contact Form 7 by Webconstruct allows Cross Site Request Forgery. This issue affects Builder for Contact Form 7 by Webconstruct: from n/a through 1.2.2.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Planet Studio - Builder for Contact Form 7 by Webconstruct**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cf7-builder/vulnerability/wordpress-builder-for-contact-form-7-by-webconstruct-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34724
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:41 UTC
- **Last Updated**: March 11, 2025 at 16:10 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows DNS Server Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows DNS Server Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34724) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30006
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 16:57 UTC
- **Last Updated**: May 03, 2025 at 00:06 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4629
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5717
- **State**: PUBLISHED
- **Published Date**: December 26, 2008 at 17:08 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Hitachi JP1/Integrated Management - Service Support 08-10 through 08-10-05, 08-11 through 08-11-03, and 08-50 through 08-50-03 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS08-023/index.html)
2. [33193](http://secunia.com/advisories/33193)
3. [32834](http://www.securityfocus.com/bid/32834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1749
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
IOUSBFamily in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html)
2. [](https://support.apple.com/HT206167)
3. [39607](https://www.exploit-db.com/exploits/39607/)
4. [1035363](http://www.securitytracker.com/id/1035363)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-16-206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1344
- **State**: PUBLISHED
- **Published Date**: October 14, 2007 at 19:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Trend Micro Virus Control System (TVCS) Log Collector allows remote attackers to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7881](http://secunia.com/advisories/7881)
2. [trend-vcs-weak-encryption(11063)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11063)
3. [6618](http://www.securityfocus.com/bid/6618)
4. [20030114 RE: [VulnWatch] Assorted Trend Vulns Rev 2.0](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0677
- **State**: PUBLISHED
- **Published Date**: February 22, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33787](http://www.securityfocus.com/bid/33787)
2. [33928](http://secunia.com/advisories/33928)
3. [52007](http://www.osvdb.org/52007)
4. [](http://ravenphpscripts.com/postt17156.html&sid=12d1201371612260a42fa846ebce7bad)
5. [20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0](http://www.securityfocus.com/archive/1/500988/100/0/threaded)
6. [8068](https://www.exploit-db.com/exploits/8068)
7. [](http://www.waraxe.us/advisory-72.html)
8. [ravennuke-avatarlist-code-execution(48789)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48789) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0193
- **State**: PUBLISHED
- **Published Date**: May 12, 2022 at 16:35 UTC
- **Last Updated**: May 05, 2025 at 16:55 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper authentication in the Intel(R) In-Band Manageability software before version 2.13.0 may allow a privileged user to potentially enable escalation of privilege via network access.
### Affected Products
**n/a - Intel(R) In-Band Manageability software**
Affected versions:
- before version 2.13.0 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00549.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35836
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:41 UTC
- **Last Updated**: March 11, 2025 at 16:10 UTC
- **Reserved Date**: July 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35836) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16566
- **State**: REJECTED
- **Published Date**: April 17, 2019 at 13:34 UTC
- **Last Updated**: April 17, 2019 at 13:34 UTC
- **Reserved Date**: September 06, 2018 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29776
- **State**: PUBLISHED
- **Published Date**: March 14, 2025 at 13:13 UTC
- **Last Updated**: March 15, 2025 at 20:49 UTC
- **Reserved Date**: March 11, 2025 at 14:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Azle is a WebAssembly runtime for TypeScript and JavaScript on ICP. Calling `setTimer` in Azle versions `0.27.0`, `0.28.0`, and `0.29.0` causes an immediate infinite loop of timers to be executed on the canister, each timer attempting to clean up the global state of the previous timer. The infinite loop will occur with any valid invocation of `setTimer`. The problem has been fixed as of Azle version `0.30.0`. As a workaround, if a canister is caught in this infinite loop after calling `setTimer`, the canister can be upgraded and the timers will all be cleared, thus ending the loop.
### Weakness Classification (CWE)
- CWE-835: Security Weakness
### Affected Products
**demergent-labs - azle**
Affected versions:
- >= 0.27.0, < 0.30.0 (Status: affected)
### References
1. [https://github.com/demergent-labs/azle/security/advisories/GHSA-xc76-5pf9-mx8m](https://github.com/demergent-labs/azle/security/advisories/GHSA-xc76-5pf9-mx8m)
2. [https://github.com/demergent-labs/azle/releases/tag/0.30.0](https://github.com/demergent-labs/azle/releases/tag/0.30.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6893
- **State**: PUBLISHED
- **Published Date**: February 12, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 06:17 UTC
- **Reserved Date**: February 11, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
controllers/member/Api.php in dayrui FineCms 5.2.0 has SQL Injection: a request with s=member,c=api,m=checktitle, and the parameter 'module' with a SQL statement, lacks effective filtering.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://xianzhi.aliyun.com/forum/topic/2050) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23710
- **State**: PUBLISHED
- **Published Date**: June 28, 2021 at 15:02 UTC
- **Last Updated**: August 04, 2024 at 15:05 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulneraiblity in LimeSurvey 4.2.5 on textbox via the Notifications & data feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LimeSurvey/LimeSurvey/pull/1441#partial-pull-merging) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5990
- **State**: PUBLISHED
- **Published Date**: November 15, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 15, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in ExoPHPdesk allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in a user profile, possibly the (1) name and (2) website parameters to register.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27638](http://secunia.com/advisories/27638)
2. [20071113 ExoPHPdesk user profile XSS / profile SQL injection](http://www.securityfocus.com/archive/1/483673/100/0/threaded)
3. [38672](http://osvdb.org/38672)
4. [exophpdesk-index-xss(38447)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38447)
5. [3368](http://securityreason.com/securityalert/3368)
6. [26453](http://www.securityfocus.com/bid/26453)
7. [26431](http://www.securityfocus.com/bid/26431) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31077
- **State**: PUBLISHED
- **Published Date**: November 10, 2023 at 13:36 UTC
- **Last Updated**: September 03, 2024 at 17:51 UTC
- **Reserved Date**: April 24, 2023 at 05:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp Export WP Page to Static HTML/CSS plugin <= 2.1.9 versions.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ReCorp - Export WP Page to Static HTML/CSS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/export-wp-page-to-static-html/wordpress-export-wp-page-to-static-html-css-plugin-2-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- konagash (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47550
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 15:09 UTC
- **Last Updated**: May 21, 2025 at 08:31 UTC
- **Reserved Date**: May 24, 2024 at 15:02 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/amdgpu: fix potential memleak
In function amdgpu_get_xgmi_hive, when kobject_init_and_add failed
There is a potential memleak if not call kobject_put.
### Affected Products
**Linux - Linux**
Affected versions:
- d95e8e97e2d522b7ebb1d5a64c01d8de307621dc (Status: affected)
- d95e8e97e2d522b7ebb1d5a64c01d8de307621dc (Status: affected)
- d95e8e97e2d522b7ebb1d5a64c01d8de307621dc (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 5.10.84 (Status: unaffected)
- 5.15.7 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c746945fb6bcbe3863c9ea6369c7ef376e38e5eb)
2. [](https://git.kernel.org/stable/c/75752ada77e0726327adf68018b9f50ae091baeb)
3. [](https://git.kernel.org/stable/c/27dfaedc0d321b4ea4e10c53e4679d6911ab17aa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28707
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 16:37 UTC
- **Last Updated**: September 17, 2024 at 03:03 UTC
- **Reserved Date**: April 19, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, and 14.1.x versions prior to 14.1.4.6, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility (also referred to as the BIG-IP TMUI) that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 13.1.x (Status: unaffected)
- 12.1.x (Status: unaffected)
- 11.6.x (Status: unaffected)
- 17.0.0 (Status: unaffected)
- 16.1.x (Status: affected)
- 15.1.x (Status: affected)
- 14.1.x (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K70300233)
### Credits
- F5 acknowledges Long Tran Hoang of VSEC for bringing this issue to our attention and following the highest standards of coordinated disclosure. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6614
- **State**: PUBLISHED
- **Published Date**: April 20, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the file-download feature of the web user interface for Cisco FindIT Network Probe Software 1.0.0 could allow an authenticated, remote attacker to download and view any system file by using the affected software. The vulnerability is due to the absence of role-based access control (RBAC) for file-download requests that are sent to the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to download and view any system file by using the affected software. Cisco Bug IDs: CSCvd11628.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Cisco FindIT**
Affected versions:
- Cisco FindIT (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-findit)
2. [97926](http://www.securityfocus.com/bid/97926) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3774
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The MediaTek drivers in Android before 2016-07-05 on Android One devices allow attackers to gain privileges via a crafted application, aka Android internal bug 29008609 and MediaTek internal bug ALPS02703102.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-07-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20907
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 14:28 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 71.9980.37 does not enforce the Mime::list_hotlinks API feature restriction (SEC-432).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/72+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48734
- **State**: PUBLISHED
- **Published Date**: October 30, 2024 at 00:00 UTC
- **Last Updated**: November 04, 2024 at 18:41 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload in /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} in SAS Studio 9.4 allows remote attacker to upload malicious files. NOTE: this is disputed by the vendor because file upload is allowed for authorized users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sas.com)
2. [](https://github.com/ACN-CVEs/CVE-2024-48734/blob/d59cca7b03bce3a516035d1a0f488d67c3d10ae6/Unrestricted%20file%20upload.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5509
- **State**: PUBLISHED
- **Published Date**: January 14, 2020 at 18:10 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executable file in an upload of a new profile image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/155925/Car-Rental-Project-1.0-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10973
- **State**: PUBLISHED
- **Published Date**: May 07, 2020 at 17:50 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973)
2. [](https://github.com/sudo-jtcsec/Nyra)
3. [](https://github.com/Roni-Carta/nyra)
4. [](https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973-affected_devices) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1026
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Macromedia Sitespring 1.2.0 (277.1) using Sybase runtime engine 7.0.2.1480 allows remote attackers to cause a denial of service (crash) via a long malformed request to TCP port 2500, possibly triggering a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sitespring-sybase-dos(9458)](http://www.iss.net/security_center/static/9458.php)
2. [20020701 [VulnWatch] KPMG-2002028: Sitespring Server Denial of Service](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0140.html)
3. [5132](http://www.securityfocus.com/bid/5132)
4. [20020701 KPMG-2002028: Sitespring Server Denial of Service](http://online.securityfocus.com/archive/1/280079) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0515
- **State**: PUBLISHED
- **Published Date**: January 31, 2008 at 19:30 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the musepoes (com_musepoes) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an answer action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0358](http://www.vupen.com/english/advisories/2008/0358)
2. [5011](https://www.exploit-db.com/exploits/5011)
3. [27507](http://www.securityfocus.com/bid/27507) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6818
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 21:13 UTC
- **Last Updated**: November 25, 2024 at 16:05 UTC
- **Reserved Date**: July 16, 2024 at 21:39 UTC
- **Assigned By**: zdi
### Vulnerability Description
IrfanView PSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23217.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**IrfanView - IrfanView**
Affected versions:
- 4.66 64bit (Status: affected)
### References
1. [ZDI-24-970](https://www.zerodayinitiative.com/advisories/ZDI-24-970/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000146
- **State**: PUBLISHED
- **Published Date**: April 05, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 19:31 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary code execution vulnerability exists in Liquibase Runner Plugin version 1.3.0 and older that allows an attacker with permission to configure jobs to load and execute arbitrary code on the Jenkins master JVM.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-03-26/#SECURITY-519) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35204
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 19:07 UTC
- **Reserved Date**: May 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Veritas System Recovery before 23.3_Hotfix has incorrect permissions for the Veritas System Recovery folder, and thus low-privileged users can conduct attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.veritas.com/support/en_US/security/VTS24-005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3978
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 17:00 UTC
- **Last Updated**: April 28, 2025 at 13:47 UTC
- **Reserved Date**: April 26, 2025 at 07:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in dazhouda lecms 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/view/default/user_set.htm. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
- CWE-284: Security Weakness
### Affected Products
**dazhouda - lecms**
Affected versions:
- 3.0.3 (Status: affected)
### References
1. [VDB-306314 | dazhouda lecms user_set.htm information disclosure](https://vuldb.com/?id.306314)
2. [VDB-306314 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306314)
3. [Submit #557748 | https://gitee.com/dazhouda/lecms3.0.3 lecms 3.0.3 Exposure of Sensitive System Information to an Unauthorized Cont](https://vuldb.com/?submit.557748)
4. [](https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_2.md)
### Credits
- dtwin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45097
- **State**: PUBLISHED
- **Published Date**: December 16, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content.
### CVSS Metrics
- **CVSS Base Score**: 2.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:L/A:N/C:L/I:N/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dawid-czarnecki/public-vulnerabilities/tree/master/KNIME/CVE-weak-file-permission)
2. [](https://zigrin.com/advisories/knime-server-weak-file-permissions/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57838
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 14:08 UTC
- **Last Updated**: May 04, 2025 at 10:05 UTC
- **Reserved Date**: January 11, 2025 at 12:32 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
s390/entry: Mark IRQ entries to fix stack depot warnings
The stack depot filters out everything outside of the top interrupt
context as an uninteresting or irrelevant part of the stack traces. This
helps with stack trace de-duplication, avoiding an explosion of saved
stack traces that share the same IRQ context code path but originate
from different randomly interrupted points, eventually exhausting the
stack depot.
Filtering uses in_irqentry_text() to identify functions within the
.irqentry.text and .softirqentry.text sections, which then become the
last stack trace entries being saved.
While __do_softirq() is placed into the .softirqentry.text section by
common code, populating .irqentry.text is architecture-specific.
Currently, the .irqentry.text section on s390 is empty, which prevents
stack depot filtering and de-duplication and could result in warnings
like:
Stack depot reached limit capacity
WARNING: CPU: 0 PID: 286113 at lib/stackdepot.c:252 depot_alloc_stack+0x39a/0x3c8
with PREEMPT and KASAN enabled.
Fix this by moving the IO/EXT interrupt handlers from .kprobes.text into
the .irqentry.text section and updating the kprobes blacklist to include
the .irqentry.text section.
This is done only for asynchronous interrupts and explicitly not for
program checks, which are synchronous and where the context beyond the
program check is important to preserve. Despite machine checks being
somewhat in between, they are extremely rare, and preserving context
when possible is also of value.
SVCs and Restart Interrupts are not relevant, one being always at the
boundary to user space and the other being a one-time thing.
IRQ entries filtering is also optionally used in ftrace function graph,
where the same logic applies.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.174 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.12.4 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ca687fdce5b95f84d91d6e36ac77047771eb3dfc)
2. [](https://git.kernel.org/stable/c/5bb7a2c3afcf8732dc65ea49c09147b07da1d993)
3. [](https://git.kernel.org/stable/c/1af22528fee8072b7adc007b8ca49cc4ea62689e)
4. [](https://git.kernel.org/stable/c/473ffae3030188f1c6b80e1b3631a26b4adf7b32)
5. [](https://git.kernel.org/stable/c/45c9f2b856a075a34873d00788d2e8a250c1effd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13764
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for BiquToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/BiquToken) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34275
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:57 UTC
- **Last Updated**: August 02, 2024 at 16:10 UTC
- **Reserved Date**: May 31, 2023 at 19:51 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20553.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**D-Link - DIR-2150**
Affected versions:
- 1.05B01 (Status: affected)
### References
1. [ZDI-23-631](https://www.zerodayinitiative.com/advisories/ZDI-23-631/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49745
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 14:34 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Stored XSS.This issue affects Spiffy Calendar: from n/a through 4.9.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Spiffy Plugins - Spiffy Calendar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- resecured.io (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11759
- **State**: PUBLISHED
- **Published Date**: October 31, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.
### Affected Products
**Apache Software Foundation - Apache Tomcat Connectors**
Affected versions:
- Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 (Status: affected)
### References
1. [DSA-4357](https://www.debian.org/security/2018/dsa-4357)
2. [RHSA-2019:0367](https://access.redhat.com/errata/RHSA-2019:0367)
3. [105888](http://www.securityfocus.com/bid/105888)
4. [](https://lists.apache.org/thread.html/6d564bb0ab73d6b3efdd1d6b1c075d1a2c84ecd84a4159d6122529ad%40%3Cannounce.tomcat.apache.org%3E)
5. [[debian-lts-announce] 20181217 [SECURITY] [DLA 1609-1] libapache-mod-jk security update](https://lists.debian.org/debian-lts-announce/2018/12/msg00007.html)
6. [RHSA-2019:0366](https://access.redhat.com/errata/RHSA-2019:0366)
7. [[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E)
8. [[tomcat-dev] 20190325 svn commit: r1856174 [25/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E)
9. [[tomcat-dev] 20190413 svn commit: r1857494 [18/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E)
10. [[tomcat-dev] 20190415 svn commit: r1857582 [20/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E)
11. [](https://www.oracle.com/security-alerts/cpujan2020.html)
12. [[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E)
13. [[tomcat-dev] 20200213 svn commit: r1873980 [30/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2454
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:45 UTC
- **Last Updated**: September 25, 2024 at 19:41 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
2. [GLSA-202208-36](https://security.gentoo.org/glsa/202208-36) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3416
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:16 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Universal Work Queue component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Universal Work Queue, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data as well as unauthorized update, insert or delete access to some of Oracle Universal Work Queue accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - Universal Work Queue**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95561](http://www.securityfocus.com/bid/95561)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2528
- **State**: PUBLISHED
- **Published Date**: June 03, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Citrix Access Gateway Standard Edition 4.5.7 and earlier and Advanced Edition 4.5 HF2 and earlier allows attackers to bypass authentication and gain "access to network resources" via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29174](http://www.securityfocus.com/bid/29174)
2. [](http://support.citrix.com/article/CTX116930)
3. [ADV-2008-1474](http://www.vupen.com/english/advisories/2008/1474/references)
4. [30175](http://secunia.com/advisories/30175)
5. [1020025](http://www.securitytracker.com/id?1020025)
6. [citrix-access-unspecified-auth-bypass(42356)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7534
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:29 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists on the web server used, that could cause a leak of sensitive data or unauthorized actions on the web server during the time the user is logged in. Affected Products: Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103) (All Versions)
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**n/a - Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103)**
Affected versions:
- Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103) (All Versions) (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4825
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 11:23 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 13, 2024 at 08:15 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A vulnerability has been discovered in Agentejo Cockpit CMS v0.5.5 that consists in an arbitrary file upload in ‘/media/api’ parameter via post request. An attacker could upload files to the server, compromising the entire infrastructure.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Agentejo - Cockpit CMS**
Affected versions:
- 0.5.5 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/unrestricted-upload-file-dangerous-type-vulnerability-cockpit-cms)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0907
- **State**: PUBLISHED
- **Published Date**: March 04, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Race condition in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media threads.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:16633](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16633)
2. [](http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html)
3. [](https://code.google.com/p/chromium/issues/detail?id=174150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1945
- **State**: PUBLISHED
- **Published Date**: March 10, 2025 at 11:43 UTC
- **Last Updated**: March 10, 2025 at 12:05 UTC
- **Reserved Date**: March 04, 2025 at 12:59 UTC
- **Assigned By**: Sonatype
### Vulnerability Description
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model.
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**mmaitre314 - picklescan**
Affected versions:
- 0.0.1 (Status: affected)
### References
1. [](https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945)
2. [](https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792)
3. [](https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781)
### Credits
- Trevor Madge (@madgetr) of Sonatype |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37239
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 09:14 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 04, 2024 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMU DEV Branda allows Stored XSS.This issue affects Branda: from n/a through 3.4.17.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPMU DEV - Branda**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/branda-white-labeling/wordpress-branda-plugin-3-4-17-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Fulan Engineering (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42752
- **State**: PUBLISHED
- **Published Date**: December 08, 2021 at 11:53 UTC
- **Last Updated**: October 25, 2024 at 13:41 UTC
- **Reserved Date**: October 20, 2021 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to execute malicious javascript code on victim's host via crafted HTTP requests
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:X/RC:C`
### Affected Products
**Fortinet - Fortinet FortiWLM**
Affected versions:
- FortiWLM 8.6.1, 8.6.0, 8.5.2, 8.5.1, 8.5.0, 8.4.2, 8.4.1, 8.4.0, 8.3.2, 8.3.1, 8.3.0, 8.2.2 (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-21-111) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5867
- **State**: PUBLISHED
- **Published Date**: January 23, 2020 at 14:07 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: November 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HT Editor 2.0.20 has a Remote Stack Buffer Overflow Vulnerability
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securityfocus.com/bid/47095)
2. [](http://www.openwall.com/lists/oss-security/2012/11/14/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29227
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 06:08 UTC
- **Last Updated**: August 27, 2024 at 20:29 UTC
- **Reserved Date**: March 19, 2024 at 06:14 UTC
- **Assigned By**: synology
### Vulnerability Description
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Layout.LayoutSave webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to inject SQL commands via unspecified vectors.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Synology - Surveillance Station**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Synology-SA-24:04 Surveillance Station](https://www.synology.com/en-global/security/advisory/Synology_SA_24_04)
### Credits
- TEAM.ENVY (https://team-envy.gitbook.io/team.envy/about-us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1480
- **State**: PUBLISHED
- **Published Date**: March 16, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Creative Guestbook 1.0 allows remote attackers to add an administrative account via a direct request to createadmin.php with Name, Email, and PASSWORD parameters set.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24536](http://secunia.com/advisories/24536)
2. [34234](http://osvdb.org/34234)
3. [creative-createadmin-authentication-bypass(33014)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33014)
4. [3489](https://www.exploit-db.com/exploits/3489) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4775
- **State**: PUBLISHED
- **Published Date**: November 14, 2012 at 00:00 UTC
- **Last Updated**: January 16, 2025 at 20:53 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56422](http://www.securityfocus.com/bid/56422)
2. [oval:org.mitre.oval:def:15932](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15932)
3. [1027749](http://www.securitytracker.com/id?1027749)
4. [MS12-071](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-071)
5. [51202](http://secunia.com/advisories/51202)
6. [TA12-318A](http://www.us-cert.gov/cas/techalerts/TA12-318A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5246
- **State**: PUBLISHED
- **Published Date**: January 05, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:33 UTC
- **Reserved Date**: January 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [102469](http://www.securityfocus.com/bid/102469)
2. [USN-3681-1](https://usn.ubuntu.com/3681-1/)
3. [](https://github.com/ImageMagick/ImageMagick/issues/929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4378
- **State**: PUBLISHED
- **Published Date**: August 16, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple format string vulnerabilities in Babo Violent 2 2.08.00 and earlier allow remote attackers to execute arbitrary code via format string specifiers in (1) a message or (2) certain data associated with an admin login.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26453](http://secunia.com/advisories/26453)
2. [baboviolent-messages-format-string(36015)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36015)
3. [3024](http://securityreason.com/securityalert/3024)
4. [20070814 Multiple vulnerabilities in Babo Violent 2 2.08.00](http://www.securityfocus.com/archive/1/476520/100/0/threaded)
5. [](http://aluigi.altervista.org/adv/bv2x-adv.txt)
6. [25329](http://www.securityfocus.com/bid/25329) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43840
- **State**: PUBLISHED
- **Published Date**: December 17, 2021 at 18:15 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**discourse - message_bus**
Affected versions:
- < 3.3.7 (Status: affected)
### References
1. [](https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm)
2. [](https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1615
- **State**: PUBLISHED
- **Published Date**: July 08, 2013 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 00:25 UTC
- **Reserved Date**: February 04, 2013 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
The management console (aka Java console) on the Symantec Security Information Manager (SSIM) appliance 4.7.x and 4.8.x before 4.8.1 allows remote attackers to obtain sensitive information via unspecified web-GUI API calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130701_00)
2. [60798](http://www.securityfocus.com/bid/60798) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0326
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 19:07 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP BusinessObjects Business Intelligence Platform (BI Workspace) (Enterprise), versions 4.1, 4.2, 4.3, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
### Affected Products
**SAP SE - SAP BusinessObjects Business Intelligence Platform - BI Workspace (Enterprise)**
Affected versions:
- < 4.1 (Status: affected)
- < 4.2 (Status: affected)
- < 4.3 (Status: affected)
### References
1. [109072](http://www.securityfocus.com/bid/109072)
2. [](https://launchpad.support.sap.com/#/notes/2764733)
3. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24584
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 10:06 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when updating a timeslot, allowing any user with the edit_posts capability (contributor+) to update arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be perform via CSRF against a logged in with such capability. In versions before 2.3.19, the lack of sanitisation and escaping in some of the fields, like the descritption could also lead to Stored XSS issues
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Timetable and Event Schedule by MotoPress**
Affected versions:
- 2.4.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/60eadf75-8298-49de-877e-ce103fc34d58)
### Credits
- dc11 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1218
- **State**: PUBLISHED
- **Published Date**: March 14, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the HTTP proxy in Novell BorderManager 3.8 and earlier allows remote attackers to cause a denial of service (CPU consumption and ABEND) via unknown attack vectors related to "media streaming over HTTP 1.1".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-0879](http://www.vupen.com/english/advisories/2006/0879)
2. [17031](http://www.securityfocus.com/bid/17031)
3. [19163](http://secunia.com/advisories/19163)
4. [23752](http://www.osvdb.org/23752)
5. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972993.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5737
- **State**: PUBLISHED
- **Published Date**: June 28, 2024 at 11:29 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: June 07, 2024 at 06:09 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
Script afGdStream.php in AdmirorFrames Joomla! extension doesn’t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML. This issue affects AdmirorFrames: before 5.0.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nikola Vasilijevski - AdmirorFrames**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.pl/en/posts/2024/06/CVE-2024-5735/)
2. [](https://cert.pl/posts/2024/06/CVE-2024-5735/)
3. [](https://github.com/vasiljevski/admirorframes/issues/3)
4. [](https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737)
5. [](https://github.com/afine-com/CVE-2024-5737)
### Credits
- Marcin Wyczechowski [AFINE Team]
- Michał Majchrowicz [AFINE Team] |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30557
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 13:46 UTC
- **Last Updated**: March 24, 2025 at 15:04 UTC
- **Reserved Date**: March 24, 2025 at 12:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in odihost Easy 301 Redirects allows Cross Site Request Forgery. This issue affects Easy 301 Redirects: from n/a through 1.33.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**odihost - Easy 301 Redirects**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/odihost-easy-redirect-301/vulnerability/wordpress-easy-301-redirects-plugin-1-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6345
- **State**: PUBLISHED
- **Published Date**: December 13, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in aurora framework before 20071208 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the value parameter to the pack_var function in module/db.lib/db_mysql.lib. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [auroraframework-dbmysql-sql-injection(38999)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38999)
2. [](http://sourceforge.net/project/shownotes.php?release_id=560073)
3. [26829](http://www.securityfocus.com/bid/26829)
4. [28014](http://secunia.com/advisories/28014)
5. [39145](http://osvdb.org/39145) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3628
- **State**: PUBLISHED
- **Published Date**: February 07, 2020 at 14:19 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 21, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability
### Affected Products
**Zabbix - Zabbix**
Affected versions:
- 2.0.9 (Status: affected)
### References
1. [](https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats)
2. [](https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one)
3. [](http://www.securityfocus.com/bid/63453)
4. [](http://www.exploit-db.com/exploits/29321) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3225
- **State**: PUBLISHED
- **Published Date**: June 26, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Sun ONE Application Server 7 before Update 9, Java System Application Server 7 2004Q2 before Update 5, and Java System Application Server Enterprise Edition 8.1 2005 Q1 allows remote attackers to inject arbitrary HTML or web script via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20835](http://secunia.com/advisories/20835)
2. [18635](http://www.securityfocus.com/bid/18635)
3. [102479](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102479-1)
4. [ADV-2006-2508](http://www.vupen.com/english/advisories/2006/2508)
5. [1016378](http://securitytracker.com/id?1016378)
6. [sun-java-parameters-xss(27392)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11661
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 19:08 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 09, 2020 at 00:00 UTC
- **Assigned By**: ca
### Vulnerability Description
CA API Developer Portal 4.3.1 and earlier contains an access control flaw that allows privileged users to view and edit user data.
### Affected Products
**n/a - CA API Developer Portal**
Affected versions:
- 4.3.1 and earlier (Status: affected)
### References
1. [](https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2020/CA20200414-01-Securit-Notice-for-CA-API-Developer-Portal.html)
2. [](http://packetstormsecurity.com/files/157244/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html)
3. [20200417 CA20200414-01: Security Notice for CA API Developer Portal](http://seclists.org/fulldisclosure/2020/Apr/24)
4. [](http://packetstormsecurity.com/files/157276/CA-API-Developer-Portal-4.2.x-4.3.1-Access-Bypass-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28256
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:05 UTC
- **Reserved Date**: March 13, 2023 at 22:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows DNS Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-591: Security Weakness
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows DNS Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28256) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12876
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected)
### References
1. [1041809](http://www.securitytracker.com/id/1041809)
2. [105443](http://www.securityfocus.com/bid/105443)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14199
- **State**: PUBLISHED
- **Published Date**: June 16, 2020 at 17:07 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit transaction, which allows attackers to trick a user into making two signatures in certain cases, potentially leading to a huge transaction fee. NOTE: this affects all hardware wallets. It was fixed in 1.9.1 for the Trezor One and 2.3.1 for the Trezor Model T.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.trezor.io/details-of-firmware-updates-for-trezor-one-version-1-9-1-and-trezor-model-t-version-2-3-1-1eba8f60f2dd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31526
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 00:55 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ThundeRatz/ThunderDocs repository through 2020-05-01 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23241
- **State**: PUBLISHED
- **Published Date**: January 07, 2021 at 20:19 UTC
- **Last Updated**: August 03, 2024 at 19:05 UTC
- **Reserved Date**: January 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mercusys.com/en/)
2. [](https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md)
3. [](https://www.mercurycom.com.cn/product-521-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2583
- **State**: PUBLISHED
- **Published Date**: January 18, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:44 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.6.38 and prior (Status: affected)
- 5.7.20 and prior (Status: affected)
### References
1. [RHSA-2018:0587](https://access.redhat.com/errata/RHSA-2018:0587)
2. [102708](http://www.securityfocus.com/bid/102708)
3. [USN-3537-1](https://usn.ubuntu.com/3537-1/)
4. [RHSA-2018:0586](https://access.redhat.com/errata/RHSA-2018:0586)
5. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
6. [](https://security.netapp.com/advisory/ntap-20180117-0002/)
7. [1040216](http://www.securitytracker.com/id/1040216) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20666
- **State**: PUBLISHED
- **Published Date**: April 06, 2023 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 14:58 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310651; Issue ID: ALPS07292173.
### Affected Products
**MediaTek, Inc. - MT6789, MT6855, MT6895, MT6983, MT8188, MT8195, MT8365, MT8781, MT8795T, MT8798**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/April-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1640
- **State**: PUBLISHED
- **Published Date**: May 26, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 29, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blobdiff%3Bf=libclamav/pe_icons.c%3Bh=3f1bc5be69d0f9d84e576814d1a3cc6f40c4ff2c%3Bhp=39a714f05968f9e929576bf171dd0eb58bf06bef%3Bhb=7f0e3bbf77382d9782e0189bf80f5f59a95779b3%3Bhpb=f0eb394501ec21b9fe67f36cbf5db788711d4236)
2. [[oss-security] 20100521 CVE Request: off by one DoS in pe_icons.c](http://www.openwall.com/lists/oss-security/2010/05/21/7)
3. [clamav-parseicon-dos(58825)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58825)
4. [40318](http://www.securityfocus.com/bid/40318)
5. [ADV-2010-1214](http://www.vupen.com/english/advisories/2010/1214)
6. [MDVSA-2010:110](http://www.mandriva.com/security/advisories?name=MDVSA-2010:110)
7. [SUSE-SR:2010:014](http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html)
8. [](https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2031)
9. [39895](http://secunia.com/advisories/39895)
10. [](http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39116
- **State**: PUBLISHED
- **Published Date**: January 04, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 14:48 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In sprd_sysdump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4720
- **State**: PUBLISHED
- **Published Date**: December 28, 2014 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 00:16 UTC
- **Reserved Date**: December 10, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hillstone HS TFTP Server 1.3.2 allows remote attackers to cause a denial of service (daemon crash) via a long filename in a (1) RRQ or (2) WRQ operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secpod.org/blog/?p=419) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44426
- **State**: PUBLISHED
- **Published Date**: January 04, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 15:21 UTC
- **Reserved Date**: October 31, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3270
- **State**: PUBLISHED
- **Published Date**: October 20, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in DiskMountNotify for Symantec Norton AntiVirus 9.0.3 allows local users to gain privileges by modifying the PATH to reference a malicious (1) ps or (2) grep file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20051020 Symantec Norton AntiVirus DiskMountNotify Local Privilege Escalation](http://www.idefense.com/application/poi/display?id=325&type=vulnerabilities)
2. [17268](http://secunia.com/advisories/17268)
3. [1015084](http://securitytracker.com/id?1015084)
4. [15142](http://www.securityfocus.com/bid/15142)
5. [15143](http://www.securityfocus.com/bid/15143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21617
- **State**: PUBLISHED
- **Published Date**: January 12, 2024 at 00:57 UTC
- **Last Updated**: August 01, 2024 at 22:27 UTC
- **Reserved Date**: December 27, 2023 at 19:38 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Incomplete Cleanup vulnerability in Nonstop active routing (NSR) component of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause memory leak leading to Denial of Service (DoS).
On all Junos OS platforms, when NSR is enabled, a BGP flap will cause memory leak. A manual reboot of the system will restore the services.
Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability.
The memory usage can be monitored using the below commands.
user@host> show chassis routing-engine no-forwarding
user@host> show system memory | no-more
This issue affects:
Juniper Networks Junos OS
* 21.2 versions earlier than 21.2R3-S5;
* 21.3 versions earlier than 21.3R3-S4;
* 21.4 versions earlier than 21.4R3-S4;
* 22.1 versions earlier than 22.1R3-S2;
* 22.2 versions earlier than 22.2R3-S2;
* 22.3 versions earlier than 22.3R2-S1, 22.3R3;
* 22.4 versions earlier than 22.4R1-S2, 22.4R2.
This issue does not affect Junos OS versions earlier than 20.4R3-S7.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-459: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
- 0 (Status: unaffected)
### References
1. [](https://supportportal.juniper.net/JSA75758)
2. [](https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8716
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:42 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. An application may be able to execute arbitrary code with system privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT210722) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36940
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 18:12 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft SharePoint Server Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Enterprise Server 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36940) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.