System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1184 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:45 UTC - **Reserved Date**: December 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description telnetd in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes the file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [telnetd-termcap-dos(5959)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5959) 2. [6083](http://www.osvdb.org/6083) 3. [FreeBSD-SA-00:69](ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:69.telnetd.v1.1.asc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42456, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42456 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42456 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 01:06 UTC - **Last Updated**: December 04, 2024 at 16:48 UTC - **Reserved Date**: August 02, 2024 at 01:04 UTC - **Assigned By**: hackerone ### Vulnerability Description A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions. ### Affected Products **Veeam - Backup & Replication** Affected versions: - 12.2 (Status: affected) ### References 1. [](https://www.veeam.com/kb4693)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25992, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25992 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25992 - **State**: PUBLISHED - **Published Date**: March 11, 2024 at 18:55 UTC - **Last Updated**: August 28, 2024 at 18:59 UTC - **Reserved Date**: February 13, 2024 at 19:54 UTC - **Assigned By**: Google_Devices ### Vulnerability Description In tmu_tz_control of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2024-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2898 - **State**: PUBLISHED - **Published Date**: May 24, 2012 at 23:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description net/packet/af_packet.c in the Linux kernel before 2.6.39.3 does not properly restrict user-space access to certain packet data structures associated with VLAN Tag Control Information, which allows local users to obtain potentially sensitive information via a crafted application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13fcb7bd322164c67926ffe272846d4860196dc6) 2. [[oss-security] 20110803 Re: CVE request: Linux kernel af_packet information leak](http://www.openwall.com/lists/oss-security/2011/08/03/7) 3. [](https://github.com/torvalds/linux/commit/13fcb7bd322164c67926ffe272846d4860196dc6) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=728023) 5. [](http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27667 - **State**: PUBLISHED - **Published Date**: April 12, 2022 at 16:11 UTC - **Last Updated**: August 03, 2024 at 05:32 UTC - **Reserved Date**: March 23, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Under certain conditions, SAP BusinessObjects Business Intelligence platform, Client Management Console (CMC) - version 430, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **SAP SE - SAP BusinessObjects Business Intelligence Platform** Affected versions: - 430 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/3145769) 2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9774 - **State**: PUBLISHED - **Published Date**: June 21, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Remote Code Execution was found in Horde_Image 2.x before 2.5.0 via a crafted GET request. Exploitation requires authentication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lists.horde.org/archives/announce/2017/001234.html) 2. [DSA-4276](https://www.debian.org/security/2018/dsa-4276)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35100, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35100 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35100 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 10:11 UTC - **Last Updated**: August 04, 2024 at 00:33 UTC - **Reserved Date**: June 21, 2021 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible buffer over read due to improper calculation of string length while parsing Id3 tag in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables** Affected versions: - APQ8009W, APQ8017, APQ8064AU, APQ8096AU, AQT1000, AR8031, CSRA6620, CSRA6640, FSM10055, FSM10056, MDM9206, MDM9250, MDM9607, MDM9628, MSM8909W, MSM8996AU, QCA6174A, QCA6390, QCA6391, QCA6426, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA9367, QCA9377, QCM2290, QCM4290, QCM6125, QCM6490, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QCS6490, Qualcomm215, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SD 675, SD 8 Gen1 5G, SD205, SD210, SD429, SD460, SD480, SD662, SD675, SD678, SD690 5G, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDA429W, SDM429W, SDW2500, SDX20, SDX55M, SDXR2 5G, SM6250, SM6375, SM7250P, SM7315, SM7325P, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3620, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45393, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45393 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45393 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 15:04 UTC - **Last Updated**: September 10, 2024 at 19:25 UTC - **Reserved Date**: August 28, 2024 at 20:21 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with a CVAT account can access webhook delivery information for any webhook registered on the CVAT instance, including that of other users. For each delivery, this contains information about the event that caused the delivery, typically including full details about the object on which an action was performed (such as the task for an "update:task" event), and the user who performed the action. In addition, the attacker can redeliver any past delivery of any webhook, and trigger a ping event for any webhook. Upgrade to CVAT 2.18.0 or any later version. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **cvat-ai - cvat** Affected versions: - >= 2.3.0, < 2.18.0 (Status: affected) ### References 1. [https://github.com/cvat-ai/cvat/security/advisories/GHSA-p3c9-m7jr-jxxj](https://github.com/cvat-ai/cvat/security/advisories/GHSA-p3c9-m7jr-jxxj) 2. [https://github.com/cvat-ai/cvat/commit/0fafb797fdf022fb83ce81c6405ba19b583a236f](https://github.com/cvat-ai/cvat/commit/0fafb797fdf022fb83ce81c6405ba19b583a236f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39328 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 13:53 UTC - **Last Updated**: October 14, 2024 at 20:29 UTC - **Reserved Date**: July 27, 2023 at 18:04 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in OpenJPEG similar to CVE-2019-6988. This flaw allows an attacker to bypass existing protections and cause an application crash through a maliciously crafted file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 9** ### References 1. [](https://access.redhat.com/security/cve/CVE-2023-39328) 2. [RHBZ#2219236](https://bugzilla.redhat.com/show_bug.cgi?id=2219236)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1073 - **State**: PUBLISHED - **Published Date**: March 18, 2015 at 22:00 UTC - **Last Updated**: August 06, 2024 at 04:33 UTC - **Reserved Date**: January 16, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2015-04-08-3](http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html) 2. [APPLE-SA-2015-06-30-6](http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html) 3. [APPLE-SA-2015-03-17-1](http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html) 4. [](https://support.apple.com/kb/HT204949) 5. [1031936](http://www.securitytracker.com/id/1031936) 6. [](https://support.apple.com/HT204662) 7. [](https://support.apple.com/HT204560) 8. [APPLE-SA-2015-04-08-4](http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html) 9. [](https://support.apple.com/HT204661)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4113 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 10:00 UTC - **Last Updated**: February 10, 2025 at 18:56 UTC - **Reserved Date**: June 12, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx) 2. [](http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html) 3. [60970](http://secunia.com/advisories/60970) 4. [37064](https://www.exploit-db.com/exploits/37064/) 5. [70364](http://www.securityfocus.com/bid/70364) 6. [113167](http://osvdb.org/show/osvdb/113167) 7. [MS14-058](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058) 8. [39666](https://www.exploit-db.com/exploits/39666/) 9. [35101](http://www.exploit-db.com/exploits/35101) 10. [](https://github.com/sam-b/CVE-2014-4113) 11. [](http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23414 - **State**: PUBLISHED - **Published Date**: March 04, 2025 at 03:44 UTC - **Last Updated**: March 11, 2025 at 16:09 UTC - **Reserved Date**: January 20, 2025 at 02:01 UTC - **Assigned By**: OpenHarmony ### Vulnerability Description in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **OpenHarmony - OpenHarmony** Affected versions: - v4.1.0 (Status: affected) ### References 1. [](https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47654 - **State**: PUBLISHED - **Published Date**: October 04, 2024 at 12:18 UTC - **Last Updated**: October 04, 2024 at 14:10 UTC - **Reserved Date**: September 30, 2024 at 11:42 UTC - **Assigned By**: CERT-In ### Vulnerability Description This vulnerability exists in Shilpi Client Dashboard due to lack of rate limiting and Captcha protection for OTP requests in certain API endpoint. An unauthenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints, which could lead to the OTP bombing on the targeted system. ### Weakness Classification (CWE) - CWE-799: Cross-site Scripting (XSS) ### Affected Products **Shilpi Computers - Client Dashboard** Affected versions: - <9.7.0 (Status: affected) ### References 1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313) ### Credits - This vulnerability is reported by Mohit Gadiya.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11034 - **State**: PUBLISHED - **Published Date**: November 23, 2024 at 11:23 UTC - **Last Updated**: November 26, 2024 at 16:28 UTC - **Reserved Date**: November 08, 2024 at 22:56 UTC - **Assigned By**: Wordfence ### Vulnerability Description The The Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation plugin for WordPress is vulnerable to arbitrary shortcode execution via fire_contact_form AJAX action in all versions up to, and including, 1.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **wpbean - Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3ccd3504-5663-48cd-90bc-502c2ce232f7?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/get-a-quote-button-for-woocommerce/tags/1.3.9/includes/class-ajax.php#L31) 3. [](https://wordpress.org/plugins/get-a-quote-button-for-woocommerce/#developers) 4. [](https://plugins.trac.wordpress.org/changeset/3195227/) ### Credits - Arkadiusz Hydzik
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9978, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9978 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9978 - **State**: PUBLISHED - **Published Date**: December 03, 2024 at 12:15 UTC - **Last Updated**: December 03, 2024 at 14:22 UTC - **Reserved Date**: October 15, 2024 at 06:17 UTC - **Assigned By**: OpenHarmony ### Vulnerability Description in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **OpenHarmony - OpenHarmony** Affected versions: - v4.1.0 (Status: affected) ### References 1. [](https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20458 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 14:20 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The logs of sensitive information (PII) or hardware identifier should only be printed in Android "userdebug" or "eng" build. StatusBarNotification.getKey() could contain sensitive information. However, CarNotificationListener.java, it prints out the StatusBarNotification.getKey() directly in logs, which could contain user's account name (i.e. PII), in Android "user" build.Product: AndroidVersions: Android-12LAndroid ID: A-205567776 ### Affected Products **n/a - Android** Affected versions: - Android-12L (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/aaos/2023-01-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9416 - **State**: PUBLISHED - **Published Date**: January 31, 2017 at 22:00 UTC - **Last Updated**: August 06, 2024 at 02:50 UTC - **Reserved Date**: November 17, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the users data handler in MyBB (aka MyBulletinBoard) before 1.8.8 and MyBB Merge System before 1.8.8 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.mybb.com/2016/10/17/mybb-1-8-8-merge-system-1-8-8-release/) 2. [[oss-security] 20161117 Re: CVE request: MyBB multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/11/18/1) 3. [[oss-security] 20161110 CVE request: MyBB multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/11/10/8) 4. [94396](http://www.securityfocus.com/bid/94396)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30302 - **State**: PUBLISHED - **Published Date**: October 20, 2021 at 06:31 UTC - **Last Updated**: August 03, 2024 at 22:32 UTC - **Reserved Date**: April 07, 2021 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Improper authentication of EAP WAPI EAPOL frames from unauthenticated user can lead to information disclosure in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Qualcomm, Inc. - Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking** Affected versions: - AQT1000, AR8035, AR9380, CSR8811, IPQ4018, IPQ4028, IPQ4029, IPQ5010, IPQ5018, IPQ5028, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, PMP8074, QCA1062, QCA1064, QCA10901, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA8072, QCA8075, QCA8081, QCA8337, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9990, QCA9992, QCA9994, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5121, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6122, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS6490, QCX315, QRB5165, QSM8350, SC8180X+SDX55, SC8280XP, SD 8C, SD 8CX, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX55, SDX55M, SDXR2 5G, SM7315, SM7325P, WCD9340, WCD9341, WCD9370, WCD9375, ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13009 - **State**: PUBLISHED - **Published Date**: May 08, 2025 at 17:29 UTC - **Last Updated**: May 08, 2025 at 18:56 UTC - **Reserved Date**: December 28, 2024 at 09:11 UTC - **Assigned By**: eclipse ### Vulnerability Description In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request body. This can result in corrupted and/or inadvertent sharing of data between requests. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **Eclipse Foundation - Jetty** Affected versions: - 9.4.0 (Status: affected) ### References 1. [](https://gitlab.eclipse.org/security/cve-assignement/-/issues/48) 2. [](https://github.com/jetty/jetty.project/security/advisories/GHSA-q4rv-gq96-w7c5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22465 - **State**: PUBLISHED - **Published Date**: July 08, 2022 at 17:45 UTC - **Last Updated**: September 17, 2024 at 00:21 UTC - **Reserved Date**: January 03, 2022 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 could allow a local user to obtain elevated privileges due to improper access permissions. IBM X-Force ID: 225082. ### Affected Products **IBM - Security Verify Access** Affected versions: - 10.0.2.0 (Status: affected) - 10.0.0.0 (Status: affected) - 10.0.1.0 (Status: affected) - 10.0.3.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6601729) 2. [ibm-sam-cve202222465-priv-escalation (225082)](https://exchange.xforce.ibmcloud.com/vulnerabilities/225082)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38359 - **State**: PUBLISHED - **Published Date**: June 20, 2024 at 22:16 UTC - **Last Updated**: August 02, 2024 at 04:04 UTC - **Reserved Date**: June 14, 2024 at 14:16 UTC - **Assigned By**: GitHub_M ### Vulnerability Description The Lightning Network Daemon (lnd) - is a complete implementation of a Lightning Network node. A parsing vulnerability in lnd's onion processing logic and lead to a DoS vector due to excessive memory allocation. The issue was patched in lnd v0.17.0. Users should update to a version > v0.17.0 to be protected. Users unable to upgrade may set the `--rejecthtlc` CLI flag and also disable forwarding on channels via the `UpdateChanPolicyCommand`, or disable listening on a public network interface via the `--nolisten` flag as a mitigation. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **lightningnetwork - lnd** Affected versions: - < 0.17.0 (Status: affected) ### References 1. [https://github.com/lightningnetwork/lnd/security/advisories/GHSA-9gxx-58q6-42p7](https://github.com/lightningnetwork/lnd/security/advisories/GHSA-9gxx-58q6-42p7) 2. [https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979](https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979) 3. [https://github.com/lightningnetwork/lnd/releases/tag/v0.17.0-beta](https://github.com/lightningnetwork/lnd/releases/tag/v0.17.0-beta) 4. [https://lightning.network](https://lightning.network) 5. [https://morehouse.github.io/lightning/lnd-onion-bomb](https://morehouse.github.io/lightning/lnd-onion-bomb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2694, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2694 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2694 - **State**: PUBLISHED - **Published Date**: August 06, 2022 at 17:21 UTC - **Last Updated**: April 15, 2025 at 13:57 UTC - **Reserved Date**: August 06, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Company Website CMS and classified as critical. This issue affects some unknown processing. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205817 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **SourceCodester - Company Website CMS** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Jamison2022/Company-Website-CMS/blob/main/Company%20Website%20CMS-FileUpload.md) 2. [](https://vuldb.com/?id.205817)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21429 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 10:15 UTC - **Last Updated**: April 08, 2025 at 03:56 UTC - **Reserved Date**: December 18, 2024 at 09:50 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - 9206 LTE Modem (Status: affected) - APQ8017 (Status: affected) - APQ8064AU (Status: affected) - AQT1000 (Status: affected) - AR8035 (Status: affected) - C-V2X 9150 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - CSRB31024 (Status: affected) - FastConnect 6200 (Status: affected) - FastConnect 6700 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - MDM9250 (Status: affected) - MDM9628 (Status: affected) - MDM9640 (Status: affected) - MDM9650 (Status: affected) - MSM8996AU (Status: affected) - QAM8255P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QCA6174A (Status: affected) - QCA6175A (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6554A (Status: affected) - QCA6564 (Status: affected) - QCA6564A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6678AQ (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6777AQ (Status: affected) - QCA6787AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCA9367 (Status: affected) - QCA9377 (Status: affected) - QCC2073 (Status: affected) - QCC2076 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM5430 (Status: affected) - QCM6125 (Status: affected) - QCM6490 (Status: affected) - QCN6024 (Status: affected) - QCN9024 (Status: affected) - QCN9074 (Status: affected) - QCS2290 (Status: affected) - QCS410 (Status: affected) - QCS4290 (Status: affected) - QCS5430 (Status: affected) - QCS610 (Status: affected) - QCS6125 (Status: affected) - QCS6490 (Status: affected) - Qualcomm 205 Mobile Platform (Status: affected) - Qualcomm Video Collaboration VC1 Platform (Status: affected) - Qualcomm Video Collaboration VC3 Platform (Status: affected) - SA2150P (Status: affected) - SA4150P (Status: affected) - SA4155P (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8530P (Status: affected) - SA8540P (Status: affected) - SA9000P (Status: affected) - SD626 (Status: affected) - SD660 (Status: affected) - SD670 (Status: affected) - SD730 (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SDM429W (Status: affected) - SDX55 (Status: affected) - SDX61 (Status: affected) - SM4125 (Status: affected) - SM6250 (Status: affected) - SM6370 (Status: affected) - Smart Audio 200 Platform (Status: affected) - Smart Audio 400 Platform (Status: affected) - Smart Display 200 Platform (APQ5053-AA) (Status: affected) - Snapdragon 1200 Wearable Platform (Status: affected) - Snapdragon 210 Processor (Status: affected) - Snapdragon 212 Mobile Platform (Status: affected) - Snapdragon 4 Gen 1 Mobile Platform (Status: affected) - Snapdragon 429 Mobile Platform (Status: affected) - Snapdragon 460 Mobile Platform (Status: affected) - Snapdragon 480 5G Mobile Platform (Status: affected) - Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected) - Snapdragon 625 Mobile Platform (Status: affected) - Snapdragon 626 Mobile Platform (Status: affected) - Snapdragon 660 Mobile Platform (Status: affected) - Snapdragon 662 Mobile Platform (Status: affected) - Snapdragon 670 Mobile Platform (Status: affected) - Snapdragon 675 Mobile Platform (Status: affected) - Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected) - Snapdragon 680 4G Mobile Platform (Status: affected) - Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected) - Snapdragon 695 5G Mobile Platform (Status: affected) - Snapdragon 710 Mobile Platform (Status: affected) - Snapdragon 720G Mobile Platform (Status: affected) - Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected) - Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected) - Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected) - Snapdragon 8 Gen 3 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 1 Mobile Platform (Status: affected) - Snapdragon 820 Automotive Platform (Status: affected) - Snapdragon 855 Mobile Platform (Status: affected) - Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon Auto 5G Modem-RF (Status: affected) - Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected) - Snapdragon W5+ Gen 1 Wearable Platform (Status: affected) - Snapdragon X24 LTE Modem (Status: affected) - Snapdragon X5 LTE Modem (Status: affected) - Snapdragon X50 5G Modem-RF System (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X62 5G Modem-RF System (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon XR1 Platform (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - Snapdragon XR2+ Gen 1 Platform (Status: affected) - Snapdragon Auto 4G Modem (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR1120 (Status: affected) - SXR2130 (Status: affected) - SXR2230P (Status: affected) - SXR2250P (Status: affected) - Vision Intelligence 100 Platform (APQ8053-AA) (Status: affected) - Vision Intelligence 200 Platform (APQ8053-AC) (Status: affected) - WCD9326 (Status: affected) - WCD9330 (Status: affected) - WCD9335 (Status: affected) - WCD9341 (Status: affected) - WCD9360 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WCN3610 (Status: affected) - WCN3615 (Status: affected) - WCN3620 (Status: affected) - WCN3660B (Status: affected) - WCN3680B (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46625 - **State**: PUBLISHED - **Published Date**: November 13, 2023 at 00:33 UTC - **Last Updated**: August 29, 2024 at 13:31 UTC - **Reserved Date**: October 24, 2023 at 13:10 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in DAEXT Autolinks Manager plugin <= 1.10.04 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **DAEXT - Autolinks Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/daext-autolinks-manager/wordpress-autolinks-manager-plugin-1-10-04-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0952 - **State**: PUBLISHED - **Published Date**: August 19, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:31 UTC - **Reserved Date**: October 13, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HP-UX B.11.00 through B.11.23, when running Ignite-UX and using the add_new_client command, causes the TFTP server to set world-writable permissions on part of the directory tree, which allows remote attackers to modify data or cause disk consumption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBUX01219](http://marc.info/?l=bugtraq&m=112422597529112&w=2) 2. [oval:org.mitre.oval:def:5775](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5775) 3. [hpigniteux-addnewclient-gain-access(21857)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21857) 4. [20050816 Corsaire Security Advisory: HP Ignite-UX filesystem permissions issue](http://marc.info/?l=bugtraq&m=112420609211136&w=2) 5. [16456](http://secunia.com/advisories/16456/) 6. [1014711](http://securitytracker.com/id?1014711) 7. [SSRT4874](http://marc.info/?l=bugtraq&m=112422597529112&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29472, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29472 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29472 - **State**: PUBLISHED - **Published Date**: December 24, 2020 at 19:28 UTC - **Last Updated**: August 04, 2024 at 16:55 UTC - **Reserved Date**: December 02, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description EGavilan Media Under Construction page with cPanel 1.0 contains a SQL injection vulnerability. An attacker can gain Admin Panel access using malicious SQL injection queries to perform remote arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/49150) 2. [](https://systemweakness.com/cve-2020-29472-under-construction-page-with-cpanel-1-0-sql-injection-18a6508c9683)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3986, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3986 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3986 - **State**: PUBLISHED - **Published Date**: December 19, 2022 at 13:41 UTC - **Last Updated**: April 17, 2025 at 13:57 UTC - **Reserved Date**: November 14, 2022 at 10:29 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - WP Stripe Checkout** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39383, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39383 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39383 - **State**: PUBLISHED - **Published Date**: November 16, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:37 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **kubevela - kubevela** Affected versions: - >= 1.6.0, < 1.6.1 (Status: affected) - < 1.5.9 (Status: affected) ### References 1. [](https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7) 2. [](https://github.com/kubevela/kubevela/pull/5000)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1640 - **State**: PUBLISHED - **Published Date**: February 20, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 01:00 UTC - **Reserved Date**: February 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in XOOPS 0.94 and 1.0 allow remote attackers to execute arbitrary web script and HTML via the (1) terme parameter to search.php or (2) letter parameter to letter.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [xoops-dictionary-letter-xss(17154)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17154) 2. [9394](http://www.osvdb.org/9394) 3. [](http://cyruxnet.org/modulo_dic_xoops.htm) 4. [11064](http://www.securityfocus.com/bid/11064) 5. [20040828 Cross Site Scripting in XOOPS Version 2.x Dictionary module](http://marc.info/?l=bugtraq&m=109394077209963&w=2) 6. [xoops-dictionary-search-xss(17152)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17152) 7. [12424](http://secunia.com/advisories/12424) 8. [9393](http://www.osvdb.org/9393)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4720 - **State**: PUBLISHED - **Published Date**: February 15, 2006 at 11:00 UTC - **Last Updated**: September 16, 2024 at 18:08 UTC - **Reserved Date**: February 15, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox 1.0.7 and earlier on Linux allows remote attackers to cause a denial of service (client crash) via an IFRAME element with a large value of the WIDTH attribute, which triggers a problem related to representation of floating-point numbers, leading to an infinite loop of widget resizes and a corresponding large number of function calls on the stack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1015011](http://securitytracker.com/id?1015011) 2. [15015](http://www.securityfocus.com/bid/15015) 3. [](http://www.security-protocols.com/advisory/sp-x19-advisory.txt) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=303433) 5. [17071](http://secunia.com/advisories/17071) 6. [](http://security-protocols.com/modules.php?name=News&file=article&sid=2978)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19157 - **State**: REJECTED - **Published Date**: July 07, 2022 at 19:44 UTC - **Last Updated**: July 07, 2022 at 19:44 UTC - **Reserved Date**: November 21, 2019 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3270, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3270 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3270 - **State**: PUBLISHED - **Published Date**: October 03, 2011 at 23:00 UTC - **Last Updated**: September 16, 2024 at 17:04 UTC - **Reserved Date**: August 29, 2011 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Unspecified vulnerability in Cisco IOS 12.2SB before 12.2(33)SB10 and 15.0S before 15.0(1)S3a on Cisco 10000 series routers allows remote attackers to cause a denial of service (device reload) via a sequence of crafted ICMP packets, aka Bug ID CSCtk62453. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=24114) 2. [20110928 Cisco 10000 Series Denial of Service Vulnerability](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d50.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8583 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 17:33 UTC - **Last Updated**: August 04, 2024 at 21:24 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - iTunes for Windows** Affected versions: - unspecified (Status: affected) **Apple - iCloud for Windows** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT210118) 2. [](https://support.apple.com/HT210119) 3. [](https://support.apple.com/HT210120) 4. [](https://support.apple.com/HT210123) 5. [](https://support.apple.com/HT210124) 6. [](https://support.apple.com/HT210125) 7. [](https://support.apple.com/HT210212) 8. [](https://support.apple.com/HT210122)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5899 - **State**: PUBLISHED - **Published Date**: September 18, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description libpthread in the kernel in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033609](http://www.securitytracker.com/id/1033609) 2. [](https://support.apple.com/HT205212) 3. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html) 4. [76764](http://www.securityfocus.com/bid/76764) 5. [](https://support.apple.com/HT205267) 6. [APPLE-SA-2015-09-21-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html) 7. [](https://support.apple.com/HT205213) 8. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35451 - **State**: PUBLISHED - **Published Date**: March 09, 2021 at 15:20 UTC - **Last Updated**: February 13, 2025 at 16:27 UTC - **Reserved Date**: December 14, 2020 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation. ### Weakness Classification (CWE) - CWE-377: Security Weakness ### Affected Products **Apache Software Foundation - Apache Oozie** Affected versions: - unspecified (Status: affected) ### References 1. [](https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E) 2. [[oozie-user] 20210309 CVE-2020-35451: Oozie local privilege escalation](https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E) 3. [[oss-security] 20210309 CVE-2020-35451: Oozie local privilege escalation](http://www.openwall.com/lists/oss-security/2021/03/09/2) ### Credits - The Apache Oozie PMC would like to thank Jonathan Leitschuh for reporting the issue
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46946 - **State**: PUBLISHED - **Published Date**: September 19, 2024 at 00:00 UTC - **Last Updated**: September 19, 2024 at 14:06 UTC - **Reserved Date**: September 15, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain. LLMSymbolicMathChain was introduced in fcccde406dd9e9b05fc9babcbeb9ff527b0ec0c6 (2023-10-05). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cwe.mitre.org/data/definitions/95.html) 2. [](https://github.com/langchain-ai/langchain/releases/tag/langchain-experimental%3D%3D0.3.0) 3. [](https://docs.sympy.org/latest/modules/codegen.html) 4. [](https://gist.github.com/12end/68c0c58d2564ef4141bccd4651480820#file-cve-2024-46946-txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21482, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21482 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21482 - **State**: PUBLISHED - **Published Date**: July 01, 2024 at 14:17 UTC - **Last Updated**: August 01, 2024 at 22:20 UTC - **Reserved Date**: December 12, 2023 at 06:07 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - CSR8811 (Status: affected) - Immersive Home 214 Platform (Status: affected) - Immersive Home 216 Platform (Status: affected) - Immersive Home 316 Platform (Status: affected) - Immersive Home 318 Platform (Status: affected) - Immersive Home 3210 Platform (Status: affected) - Immersive Home 326 Platform (Status: affected) - IPQ5010 (Status: affected) - IPQ5028 (Status: affected) - IPQ5302 (Status: affected) - IPQ5312 (Status: affected) - IPQ5332 (Status: affected) - IPQ6000 (Status: affected) - IPQ6010 (Status: affected) - IPQ6018 (Status: affected) - IPQ6028 (Status: affected) - IPQ8070A (Status: affected) - IPQ8071A (Status: affected) - IPQ8072A (Status: affected) - IPQ8074A (Status: affected) - IPQ8076 (Status: affected) - IPQ8076A (Status: affected) - IPQ8078 (Status: affected) - IPQ8078A (Status: affected) - IPQ8173 (Status: affected) - IPQ8174 (Status: affected) - IPQ9008 (Status: affected) - IPQ9554 (Status: affected) - IPQ9570 (Status: affected) - IPQ9574 (Status: affected) - QCA4024 (Status: affected) - QCA8075 (Status: affected) - QCA8081 (Status: affected) - QCA8082 (Status: affected) - QCA8084 (Status: affected) - QCA8085 (Status: affected) - QCA8386 (Status: affected) - QCA9888 (Status: affected) - QCA9889 (Status: affected) - QCF8000 (Status: affected) - QCF8001 (Status: affected) - QCN5022 (Status: affected) - QCN5024 (Status: affected) - QCN5052 (Status: affected) - QCN5122 (Status: affected) - QCN5124 (Status: affected) - QCN5152 (Status: affected) - QCN5154 (Status: affected) - QCN5164 (Status: affected) - QCN6023 (Status: affected) - QCN6024 (Status: affected) - QCN6112 (Status: affected) - QCN6122 (Status: affected) - QCN6132 (Status: affected) - QCN6402 (Status: affected) - QCN6412 (Status: affected) - QCN6422 (Status: affected) - QCN6432 (Status: affected) - QCN9000 (Status: affected) - QCN9022 (Status: affected) - QCN9024 (Status: affected) - QCN9070 (Status: affected) - QCN9072 (Status: affected) - QCN9074 (Status: affected) - QCN9100 (Status: affected) - QCN9274 (Status: affected) - SDX55 (Status: affected) - SDX65M (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) ### References 1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27336 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:55 UTC - **Last Updated**: August 02, 2024 at 12:09 UTC - **Reserved Date**: February 28, 2023 at 17:58 UTC - **Assigned By**: zdi ### Vulnerability Description Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC client certificates. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20508. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Softing - edgeConnector Siemens** Affected versions: - 3.40 (Status: affected) ### References 1. [ZDI-23-1065](https://www.zerodayinitiative.com/advisories/ZDI-23-1065/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36076, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36076 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36076 - **State**: PUBLISHED - **Published Date**: September 02, 2022 at 12:30 UTC - **Last Updated**: April 22, 2025 at 17:40 UTC - **Reserved Date**: July 15, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. Due to an unnecessarily strict conditional in the code handling the first step of the SSO process, the pre-existing logic that added (and later checked) a nonce was inadvertently rendered opt-in instead of opt-out. This re-exposed a vulnerability in that a specially crafted Man-in-the-Middle (MITM) attack could theoretically take over another user account during the single sign-on process. The issue has been fully patched in version 1.17.2. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **NodeBB - NodeBB** Affected versions: - < 1.17.2 (Status: affected) ### References 1. [](https://blogs.opera.com/security/2022/03/bug-bounty-adventures-a-nodebb-0-day/) 2. [](https://github.com/NodeBB/NodeBB/security/advisories/GHSA-xmgg-fx9p-prq6) 3. [](https://github.com/NodeBB/NodeBB/commit/a2400f6baff44cb2996487bcd0cc6e2acc74b3d4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2991 - **State**: PUBLISHED - **Published Date**: February 15, 2017 at 06:11 UTC - **Last Updated**: August 05, 2024 at 14:09 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 codec (related to decompression). Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - Adobe Flash Player 24.0.0.194 and earlier.** Affected versions: - Adobe Flash Player 24.0.0.194 and earlier. (Status: affected) ### References 1. [96190](http://www.securityfocus.com/bid/96190) 2. [GLSA-201702-20](https://security.gentoo.org/glsa/201702-20) 3. [RHSA-2017:0275](http://rhn.redhat.com/errata/RHSA-2017-0275.html) 4. [1037815](http://www.securitytracker.com/id/1037815) 5. [](https://helpx.adobe.com/security/products/flash-player/apsb17-04.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1480 - **State**: PUBLISHED - **Published Date**: February 02, 2013 at 00:00 UTC - **Last Updated**: August 06, 2024 at 15:04 UTC - **Reserved Date**: January 30, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16045](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16045) 2. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 3. [57691](http://www.securityfocus.com/bid/57691) 4. [MDVSA-2013:095](http://www.mandriva.com/security/advisories?name=MDVSA-2013:095) 5. [oval:org.mitre.oval:def:18845](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18845) 6. [](http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/50e268c1fb1f) 7. [SSRT101156](http://marc.info/?l=bugtraq&m=136570436423916&w=2) 8. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html) 9. [RHSA-2013:0236](http://rhn.redhat.com/errata/RHSA-2013-0236.html) 10. [oval:org.mitre.oval:def:19351](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19351) 11. [oval:org.mitre.oval:def:19504](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19504) 12. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html) 13. [VU#858729](http://www.kb.cert.org/vuls/id/858729) 14. [SUSE-SU-2013:0478](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html) 15. [RHSA-2013:0237](http://rhn.redhat.com/errata/RHSA-2013-0237.html) 16. [HPSBUX02857](http://marc.info/?l=bugtraq&m=136439120408139&w=2) 17. [RHSA-2013:0247](http://rhn.redhat.com/errata/RHSA-2013-0247.html) 18. [](https://bugzilla.redhat.com/show_bug.cgi?id=906904) 19. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2) 20. [SSRT101103](http://marc.info/?l=bugtraq&m=136439120408139&w=2) 21. [openSUSE-SU-2013:0377](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html) 22. [RHSA-2013:0246](http://rhn.redhat.com/errata/RHSA-2013-0246.html) 23. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html) 24. [HPSBUX02864](http://marc.info/?l=bugtraq&m=136570436423916&w=2) 25. [RHSA-2013:0245](http://rhn.redhat.com/errata/RHSA-2013-0245.html) 26. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html) 27. [](http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS) 28. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2) 29. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24711 - **State**: PUBLISHED - **Published Date**: October 11, 2021 at 10:45 UTC - **Last Updated**: August 03, 2024 at 19:42 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The del_reistered_domains AJAX action of the Software License Manager WordPress plugin before 4.5.1 does not have any CSRF checks, and is vulnerable to a CSRF attack ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - Software License Manager** Affected versions: - 4.5.1 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/3351bc30-e5ff-471f-8d1c-b1bcdf419937) 2. [](https://jetpack.com/2021/09/14/csrf-vulnerability-found-in-software-license-manager-plugin/) ### Credits - Harald Eilertsen (JetPack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4378 - **State**: PUBLISHED - **Published Date**: September 30, 2013 at 16:00 UTC - **Last Updated**: September 17, 2024 at 00:51 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in HtmlSessionInformationsReport.java in JavaMelody 1.46 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted X-Forwarded-For header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20130926 Re: CVE request: Javamelody blind XSS through X-Forwarded-For header](http://seclists.org/oss-sec/2013/q3/679) 2. [](https://code.google.com/p/javamelody/source/detail?r=3515) 3. [](https://code.google.com/p/javamelody/wiki/ReleaseNotes) 4. [62679](http://www.securityfocus.com/bid/62679) 5. [](https://code.google.com/p/javamelody/issues/detail?id=346) 6. [97778](http://osvdb.org/97778)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4775 - **State**: PUBLISHED - **Published Date**: September 14, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 19:23 UTC - **Reserved Date**: September 13, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.phenoelit.de/stuff/CiscoVTP.txt) 2. [21896](http://secunia.com/advisories/21896) 3. [19998](http://www.securityfocus.com/bid/19998) 4. [28776](http://www.osvdb.org/28776) 5. [20060913 Cisco VLAN Trunking Protocol Vulnerabilities](http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml) 6. [1016843](http://securitytracker.com/id?1016843) 7. [20060913 Re: Cisco IOS VTP issues](http://www.securityfocus.com/archive/1/445938/100/0/threaded) 8. [ADV-2006-3600](http://www.vupen.com/english/advisories/2006/3600) 9. [cisco-ios-vtp-wrap-config-manipulation(28925)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28925) 10. [VU#175148](http://www.kb.cert.org/vuls/id/175148) 11. [20060913 Cisco IOS VTP issues](http://www.securityfocus.com/archive/1/445896/100/0/threaded) 12. [21902](http://secunia.com/advisories/21902)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1218 - **State**: PUBLISHED - **Published Date**: February 21, 2012 at 00:00 UTC - **Last Updated**: August 06, 2024 at 18:53 UTC - **Reserved Date**: February 20, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in freelancerKit 2.35 allow remote attackers to execute arbitrary SQL commands via unspecified vectors to the (1) notes and (2) tickets components. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [freelancerkit-multiple-sql-injection(73105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73105) 2. [51946](http://www.securityfocus.com/bid/51946) 3. [](http://www.vulnerability-lab.com/get_content.php?id=402) 4. [47766](http://secunia.com/advisories/47766)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1615 - **State**: PUBLISHED - **Published Date**: March 23, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 13:06 UTC - **Reserved Date**: March 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in ScriptMagix Jokes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-1012](http://www.vupen.com/english/advisories/2007/1012) 2. [scriptmagixjokes-index-sql-injection(33063)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33063) 3. [24595](http://secunia.com/advisories/24595) 4. [23015](http://www.securityfocus.com/bid/23015) 5. [3509](https://www.exploit-db.com/exploits/3509)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27895 - **State**: PUBLISHED - **Published Date**: December 08, 2020 at 20:06 UTC - **Last Updated**: August 04, 2024 at 16:25 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs. ### Affected Products **Apple - iTunes for Windows** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT211933)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6345 - **State**: PUBLISHED - **Published Date**: November 02, 2013 at 20:00 UTC - **Last Updated**: September 16, 2024 at 20:32 UTC - **Reserved Date**: November 02, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 has unknown impact and attack vectors related to an "Application Exception." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.novell.com/support/kb/doc.php?id=7012027)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7676 - **State**: PUBLISHED - **Published Date**: February 09, 2019 at 22:00 UTC - **Last Updated**: August 04, 2024 at 20:54 UTC - **Reserved Date**: February 09, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pudding2/enphase-energy/blob/master/weak_password_1.png) 2. [](https://github.com/pudding2/enphase-energy/blob/master/weak_password_2.png) 3. [](https://github.com/pudding2/enphase-energy/blob/master/weak_password.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2267 - **State**: PUBLISHED - **Published Date**: March 07, 2024 at 22:00 UTC - **Last Updated**: August 26, 2024 at 14:50 UTC - **Reserved Date**: March 07, 2024 at 14:34 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in keerti1924 Online-Book-Store-Website 1.0 and classified as problematic. This issue affects some unknown processing of the file /shop.php. The manipulation of the argument product_price leads to business logic errors. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256037 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-840: Security Weakness ### Affected Products **keerti1924 - Online-Book-Store-Website** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-256037 | keerti1924 Online-Book-Store-Website shop.php logic error](https://vuldb.com/?id.256037) 2. [VDB-256037 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.256037) 3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md) ### Credits - Joshua Lictan - nochizplz (VulDB User) - nochizplz (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6748 - **State**: PUBLISHED - **Published Date**: December 27, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 20:42 UTC - **Reserved Date**: December 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in i-accueil.php in Newxooper 0.9 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-5118](http://www.vupen.com/english/advisories/2006/5118)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3225 - **State**: PUBLISHED - **Published Date**: October 17, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:57 UTC - **Reserved Date**: June 06, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 5.3.0 through 5.3.4 allows remote authenticated users to affect confidentiality and integrity, related to BASE. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html) 2. [51019](http://secunia.com/advisories/51019) 3. [flexcubedirectbanking-base-cve20123225(79358)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79358) 4. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2716 - **State**: PUBLISHED - **Published Date**: January 18, 2018 at 02:00 UTC - **Last Updated**: October 03, 2024 at 20:26 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Financial Services Market Risk Measurement and Management component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Market Risk Measurement and Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Market Risk Measurement and Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Market Risk Measurement and Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Market Risk Measurement and Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Financial Services Market Risk Measurement and Management** Affected versions: - 8.0.5 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html) 2. [1040214](http://www.securitytracker.com/id/1040214) 3. [102672](http://www.securityfocus.com/bid/102672)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3628 - **State**: PUBLISHED - **Published Date**: July 09, 2007 at 16:00 UTC - **Last Updated**: August 07, 2024 at 14:21 UTC - **Reserved Date**: July 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the fetch function in MDB2.php in PEAR Structures-DataGrid-DataSource-MDB2 0.1.9 and earlier allows attackers to "manipulate the generated sorting queries." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45805](http://osvdb.org/45805) 2. [](http://pear.php.net/package/Structures_DataGrid_DataSource_MDB2/download/0.1.10) 3. [ADV-2007-2425](http://www.vupen.com/english/advisories/2007/2425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39820 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 16:53 UTC - **Last Updated**: April 23, 2025 at 18:15 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) is affected by an Out-of-bounds Write vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - InDesign** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/indesign/apsb21-73.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1892 - **State**: PUBLISHED - **Published Date**: April 18, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 08:41 UTC - **Reserved Date**: April 18, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in bs_auth.php in Blogator-script 0.95 and 1.01 allows remote attackers to inject arbitrary web script or HTML via the msg parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29684](http://secunia.com/advisories/29684) 2. [blogatorscript-bsauth-xss(41930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41930) 3. [28810](http://www.securityfocus.com/bid/28810)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11567 - **State**: PUBLISHED - **Published Date**: April 27, 2019 at 13:57 UTC - **Last Updated**: August 04, 2024 at 22:55 UTC - **Reserved Date**: April 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in AikCms v2.0. There is a SQL Injection vulnerability via $_GET['del'], as demonstrated by an admin/page/system/nav.php?del= URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kikulo/DebugOpen/blob/master/Aikcms2.0/main.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32837 - **State**: PUBLISHED - **Published Date**: November 06, 2023 at 03:50 UTC - **Last Updated**: April 25, 2025 at 16:03 UTC - **Reserved Date**: May 16, 2023 at 03:04 UTC - **Assigned By**: MediaTek ### Vulnerability Description In video, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08250357. ### Affected Products **MediaTek, Inc. - MT6883, MT6885, MT6889, MT6893, MT8797, MT8798** Affected versions: - Android 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/November-2023) 2. [](http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53247 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 18:00 UTC - **Last Updated**: February 28, 2025 at 11:03 UTC - **Reserved Date**: November 19, 2024 at 18:30 UTC - **Assigned By**: Splunk ### Vulnerability Description In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE). ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Splunk - Splunk Enterprise** Affected versions: - 9.3 (Status: affected) - 9.2 (Status: affected) - 9.1 (Status: affected) **Splunk - Splunk Secure Gateway** Affected versions: - 3.7 (Status: affected) - 3.4 (Status: affected) ### References 1. [](https://advisory.splunk.com/advisories/SVD-2024-1205) ### Credits - Danylo Dmytriiev (DDV_UA)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38732 - **State**: PUBLISHED - **Published Date**: October 28, 2022 at 00:00 UTC - **Last Updated**: May 07, 2025 at 16:15 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SEMCMS SHOP v 1.1 is vulnerable to SQL via Ant_Message.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sem-cms.cn/wenda/view-56.html) 2. [](https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-3.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4146 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0064 - **State**: PUBLISHED - **Published Date**: May 14, 2020 at 20:12 UTC - **Last Updated**: August 04, 2024 at 05:47 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An improper authorization while processing the provisioning data.Product: AndroidVersions: Android SoCAndroid ID: A-149866855 ### Affected Products **n/a - Android** Affected versions: - Android SoC (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-05-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5078 - **State**: PUBLISHED - **Published Date**: December 19, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 10:40 UTC - **Reserved Date**: November 14, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [enscript-recognize-tilde-bo(47680)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47680) 2. [](http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm) 3. [33181](http://secunia.com/advisories/33181) 4. [SUSE-SR:2009:005](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html) 5. [RHSA-2008:1021](http://www.redhat.com/support/errata/RHSA-2008-1021.html) 6. [oval:org.mitre.oval:def:11807](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11807) 7. [1021401](http://www.securitytracker.com/id?1021401) 8. [](https://bugzilla.redhat.com/show_bug.cgi?id=473958)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-10001, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-10001 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-10001 - **State**: PUBLISHED - **Published Date**: November 01, 2021 at 08:45 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: October 31, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP-Stats WordPress plugin before 2.52 does not have CSRF check when saving its settings, and did not escape some of them when outputting them, allowing attacker to make logged in high privilege users change them and set Cross-Site Scripting payloads ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - WP-Stats** Affected versions: - 2.52 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734) 2. [](https://www.openwall.com/lists/oss-security/2015/06/17/6) ### Credits - Sebastian Wolfgang Kraemer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1026 - **State**: PUBLISHED - **Published Date**: April 09, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 22:38 UTC - **Reserved Date**: December 22, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2016:1305](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html) 2. [openSUSE-SU-2016:1306](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html) 3. [RHSA-2016:0610](http://rhn.redhat.com/errata/RHSA-2016-0610.html) 4. [85932](http://www.securityfocus.com/bid/85932) 5. [1035509](http://www.securitytracker.com/id/1035509) 6. [](https://helpx.adobe.com/security/products/flash-player/apsb16-10.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6964 - **State**: PUBLISHED - **Published Date**: June 20, 2019 at 13:50 UTC - **Last Updated**: August 04, 2024 at 20:31 UTC - **Reserved Date**: January 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A heap-based buffer over-read in Service_SetParamStringValue in cosa_x_cisco_com_ddns_dml.c of the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve information disclosure and code execution by crafting an AJAX call responsible for DDNS configuration with an exactly 64-byte username, password, or domain, for which the buffer size is insufficient for the final '\0' character. This is related to the CcspCommonLibrary and WebUI modules. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35091 - **State**: PUBLISHED - **Published Date**: May 23, 2024 at 17:04 UTC - **Last Updated**: February 13, 2025 at 15:54 UTC - **Reserved Date**: May 09, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in SysTenantMapper.xml. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.j2eefast.com/) 2. [](https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35091.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33725 - **State**: PUBLISHED - **Published Date**: June 21, 2023 at 00:00 UTC - **Last Updated**: December 06, 2024 at 17:14 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.6.1-GA. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Contrast-Security-OSS/Burptrast/tree/main/docs/CVE-2023-33725)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0780 - **State**: PUBLISHED - **Published Date**: February 14, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 07:54 UTC - **Reserved Date**: February 14, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in MoinMoin 1.5.x through 1.5.8 and 1.6.x before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the login action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33755](http://secunia.com/advisories/33755) 2. [GLSA-200803-27](http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml) 3. [29262](http://secunia.com/advisories/29262) 4. [29010](http://secunia.com/advisories/29010) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=432747) 6. [](http://hg.moinmo.in/moin/1.5/rev/2f952fa361c7) 7. [FEDORA-2008-1880](https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00726.html) 8. [28987](http://secunia.com/advisories/28987) 9. [ADV-2008-0569](http://www.vupen.com/english/advisories/2008/0569/references) 10. [27904](http://www.securityfocus.com/bid/27904) 11. [29444](http://secunia.com/advisories/29444) 12. [FEDORA-2008-1905](https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00752.html) 13. [USN-716-1](https://usn.ubuntu.com/716-1/) 14. [](http://hg.moinmo.in/moin/1.6/rev/9f4bdc7ef80d) 15. [DSA-1514](http://www.debian.org/security/2008/dsa-1514)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25803 - **State**: PUBLISHED - **Published Date**: July 26, 2021 at 16:26 UTC - **Last Updated**: August 03, 2024 at 20:11 UTC - **Reserved Date**: January 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow vulnerability in the vlc_input_attachment_New component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://code.videolan.org/videolan/vlc-3.0/-/commit/56cbe9c4b59edbdc5e1bb2687992f3bbf492eccb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31718 - **State**: PUBLISHED - **Published Date**: September 21, 2023 at 00:00 UTC - **Last Updated**: September 24, 2024 at 18:24 UTC - **Reserved Date**: April 29, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/frangoteam/FUXA) 2. [](https://youtu.be/VCQkEGntN04) 3. [](https://github.com/MateusTesser/CVE-2023-31718)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000441 - **State**: REJECTED - **Published Date**: January 10, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 17:33 UTC - **Reserved Date**: January 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9443 - **State**: PUBLISHED - **Published Date**: September 26, 2019 at 03:51 UTC - **Last Updated**: August 06, 2024 at 08:51 UTC - **Reserved Date**: September 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The accurate-form-data-real-time-form-validation plugin 1.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=Accu_Data_WP. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/accurate-form-data-real-time-form-validation/#developers) 2. [](http://packetstormsecurity.com/files/132911/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-7045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-7045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-7045 - **State**: PUBLISHED - **Published Date**: August 24, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 11:49 UTC - **Reserved Date**: August 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description AJ Square Free Polling Script (AJPoll) Database version allows remote attackers to bypass authentication and reset poll votes via a direct request to admin/resetvote.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7086](https://www.exploit-db.com/exploits/7086) 2. [49779](http://osvdb.org/49779) 3. [32600](http://secunia.com/advisories/32600)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2059 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: December 04, 2019 at 00:00 UTC - **Assigned By**: palo_alto ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2125 - **State**: PUBLISHED - **Published Date**: June 19, 2009 at 17:32 UTC - **Last Updated**: September 16, 2024 at 23:45 UTC - **Reserved Date**: June 19, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description delete_bug.php in Elvin before 1.2.1 does not require administrative privileges, which allows remote authenticated users to bypass intended access restrictions and delete arbitrary bugs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.elvinbts.org/show_bug.php?id=50) 2. [35430](http://secunia.com/advisories/35430) 3. [55101](http://osvdb.org/55101)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0907 - **State**: PUBLISHED - **Published Date**: February 13, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 12:34 UTC - **Reserved Date**: February 13, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-1264](http://www.us.debian.org/security/2007/dsa-1264) 2. [24295](http://secunia.com/advisories/24295) 3. [2007-0009](http://www.trustix.org/errata/2007/0009/) 4. [OpenPKG-SA-2007.010](http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html) 5. [24195](http://secunia.com/advisories/24195) 6. [1017671](http://www.securitytracker.com/id?1017671) 7. [32767](http://osvdb.org/32767) 8. [24606](http://secunia.com/advisories/24606) 9. [24642](http://secunia.com/advisories/24642) 10. [24217](http://secunia.com/advisories/24217) 11. [](http://support.avaya.com/elmodocs2/security/ASA-2007-101.htm) 12. [24248](http://secunia.com/advisories/24248) 13. [24514](http://secunia.com/advisories/24514) 14. [22496](http://www.securityfocus.com/bid/22496) 15. [](https://issues.rpath.com/browse/RPL-1088) 16. [24284](http://secunia.com/advisories/24284) 17. [USN-424-2](http://www.ubuntu.com/usn/usn-424-2) 18. [](http://www.php.net/releases/5_2_1.php) 19. [GLSA-200703-21](http://security.gentoo.org/glsa/glsa-200703-21.xml) 20. [24432](http://secunia.com/advisories/24432) 21. [24421](http://secunia.com/advisories/24421) 22. [24089](http://secunia.com/advisories/24089) 23. [SUSE-SA:2007:020](http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html) 24. [RHSA-2007:0076](http://www.redhat.com/support/errata/RHSA-2007-0076.html) 25. [24419](http://secunia.com/advisories/24419) 26. [RHSA-2007:0089](http://rhn.redhat.com/errata/RHSA-2007-0089.html) 27. [RHSA-2007:0088](http://www.redhat.com/support/errata/RHSA-2007-0088.html) 28. [20070227 rPSA-2007-0043-1 php php-mysql php-pgsql](http://www.securityfocus.com/archive/1/461462/100/0/threaded) 29. [](http://support.avaya.com/elmodocs2/security/ASA-2007-136.htm) 30. [RHSA-2007:0082](http://www.redhat.com/support/errata/RHSA-2007-0082.html) 31. [oval:org.mitre.oval:def:11321](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11321) 32. [20070201-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc) 33. [](http://www.php.net/ChangeLog-5.php#5.2.1) 34. [MDKSA-2007:048](http://www.mandriva.com/security/advisories?name=MDKSA-2007:048) 35. [USN-424-1](http://www.ubuntu.com/usn/usn-424-1) 36. [RHSA-2007:0081](http://www.redhat.com/support/errata/RHSA-2007-0081.html) 37. [24322](http://secunia.com/advisories/24322) 38. [24236](http://secunia.com/advisories/24236) 39. [ADV-2007-0546](http://www.vupen.com/english/advisories/2007/0546)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32754 - **State**: PUBLISHED - **Published Date**: July 04, 2024 at 10:43 UTC - **Last Updated**: May 01, 2025 at 03:55 UTC - **Reserved Date**: April 17, 2024 at 17:26 UTC - **Assigned By**: jci ### Vulnerability Description Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version. Once configured, the controller will no longer broadcast this information. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Johnson Controls - Kantech KT1 Door Controller, Rev01** Affected versions: - 0 (Status: affected) **Johnson Controls - Kantech KT2 Door Controller, Rev01** Affected versions: - 0 (Status: affected) **Johnson Controls - Kantech KT400 Door Controller, Rev01** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories) 2. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01) ### Credits - National Computer Emergency Response Team (CERT) of India
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5867, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5867 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5867 - **State**: PUBLISHED - **Published Date**: January 09, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 20:04 UTC - **Reserved Date**: November 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSA:2007-024-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.517995) 2. [USN-405-1](http://www.ubuntu.com/usn/usn-405-1) 3. [24966](http://secunia.com/advisories/24966) 4. [31580](http://osvdb.org/31580) 5. [23781](http://secunia.com/advisories/23781) 6. [24174](http://secunia.com/advisories/24174) 7. [DSA-1259](http://www.debian.org/security/2007/dsa-1259) 8. [23838](http://secunia.com/advisories/23838) 9. [24151](http://secunia.com/advisories/24151) 10. [](http://docs.info.apple.com/article.html?artnum=305391) 11. [23714](http://secunia.com/advisories/23714) 12. [21903](http://www.securityfocus.com/bid/21903) 13. [24284](http://secunia.com/advisories/24284) 14. [23631](http://secunia.com/advisories/23631) 15. [24007](http://secunia.com/advisories/24007) 16. [23804](http://secunia.com/advisories/23804) 17. [20070105 fetchmail security announcement 2006-02 (CVE-2006-5867)](http://www.securityfocus.com/archive/1/456115/100/0/threaded) 18. [ADV-2007-0088](http://www.vupen.com/english/advisories/2007/0088) 19. [SUSE-SR:2007:004](http://www.novell.com/linux/security/advisories/2007_4_sr.html) 20. [TA07-109A](http://www.us-cert.gov/cas/techalerts/TA07-109A.html) 21. [23695](http://secunia.com/advisories/23695) 22. [](http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt) 23. [MDKSA-2007:016](http://www.mandriva.com/security/advisories?name=MDKSA-2007:016) 24. [FEDORA-2007-041](http://fedoranews.org/cms/node/2429) 25. [23923](http://secunia.com/advisories/23923) 26. [OpenPKG-SA-2007.004](http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.004.html) 27. [2007-0007](http://www.trustix.org/errata/2007/0007) 28. [20070218 Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure](http://www.securityfocus.com/archive/1/460528/100/0/threaded) 29. [GLSA-200701-13](http://security.gentoo.org/glsa/glsa-200701-13.xml) 30. [1017478](http://securitytracker.com/id?1017478) 31. [](https://issues.rpath.com/browse/RPL-919) 32. [20070201-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc) 33. [APPLE-SA-2007-04-19](http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html) 34. [ADV-2007-1470](http://www.vupen.com/english/advisories/2007/1470) 35. [ADV-2007-0087](http://www.vupen.com/english/advisories/2007/0087) 36. [RHSA-2007:0018](http://www.redhat.com/support/errata/RHSA-2007-0018.html) 37. [oval:org.mitre.oval:def:10566](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10566)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4959 - **State**: REJECTED - **Published Date**: December 30, 2019 at 16:19 UTC - **Last Updated**: December 30, 2019 at 16:19 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28068, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28068 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28068 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 03, 2024 at 17:57 UTC - **Reserved Date**: March 28, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/radareorg/radare2/commit/637f4bd1af6752e28e0a9998e954e2e9ce6fa992)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29778 - **State**: PUBLISHED - **Published Date**: May 02, 2023 at 00:00 UTC - **Last Updated**: January 30, 2025 at 16:39 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GL.iNET MT3000 4.1.0 Release 2 is vulnerable to OS Command Injection via /usr/lib/oui-httpd/rpc/logread. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://glinet.com) 2. [](https://github.com/OlivierLaflamme/cve/blob/main/GL.iNET/MT3000/get_nginx_log_RCE.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27097, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27097 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27097 - **State**: PUBLISHED - **Published Date**: February 17, 2021 at 22:36 UTC - **Last Updated**: August 03, 2024 at 20:40 UTC - **Reserved Date**: February 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0) 2. [](https://github.com/u-boot/u-boot/commit/8a7d4cf9820ea16fabd25a6379351b4dc291204b) 3. [](https://github.com/u-boot/u-boot/commit/6f3c2d8aa5e6cbd80b5e869bbbddecb66c329d01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2306 - **State**: PUBLISHED - **Published Date**: April 26, 2013 at 10:00 UTC - **Last Updated**: September 16, 2024 at 18:29 UTC - **Reserved Date**: March 04, 2013 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description The jigbrowser+ application before 1.6.4 for Android does not properly open windows, which allows remote attackers to spoof the address bar via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVN#01313594](http://jvn.jp/en/jp/JVN01313594/index.html) 2. [](https://play.google.com/store/apps/details?id=jp.jig.product.browser_plus) 3. [JVNDB-2013-000036](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000036)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3635 - **State**: PUBLISHED - **Published Date**: August 14, 2019 at 16:18 UTC - **Last Updated**: August 04, 2024 at 19:12 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Exfiltration of Data in McAfee Web Gateway (MWG) 7.8.2.x prior to 7.8.2.12 allows attackers to obtain sensitive data via crafting a complex webpage that will trigger the Web Gateway to block the user accessing an iframe. ### Affected Products **McAfee, LLC - McAfee Web Gateway (MWG)** Affected versions: - 7.8.2.x (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10293)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6224 - **State**: PUBLISHED - **Published Date**: July 30, 2024 at 06:00 UTC - **Last Updated**: October 28, 2024 at 19:52 UTC - **Reserved Date**: June 20, 2024 at 18:56 UTC - **Assigned By**: WPScan ### Vulnerability Description The Send email only on Reply to My Comment WordPress plugin through 1.0.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) - CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - Send email only on Reply to My Comment** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/54457f1b-6572-4de0-9100-3433c715c5ce/) ### Credits - Bob Matyas - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6755 - **State**: PUBLISHED - **Published Date**: December 06, 2018 at 23:00 UTC - **Last Updated**: August 05, 2024 at 06:10 UTC - **Reserved Date**: February 06, 2018 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Weak Directory Permission Vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and earlier allows local users to execute arbitrary code via specially crafted malware. ### Affected Products **McAfee - True Key** Affected versions: - 5.1.230.7 (Status: affected) ### References 1. [45961](https://www.exploit-db.com/exploits/45961/) 2. [](http://service.mcafee.com/FAQDocument.aspx?&id=TS102872) ### Credits - McAfee acknowledges James Forshaw of Google Project Zero for finding these vulnerabilities with the True Key product.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3344 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 08:31 UTC - **Last Updated**: April 07, 2025 at 16:28 UTC - **Reserved Date**: April 06, 2025 at 12:32 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in codeprojects Online Restaurant Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/assign_save.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **codeprojects - Online Restaurant Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-303558 | codeprojects Online Restaurant Management System assign_save.php sql injection](https://vuldb.com/?id.303558) 2. [VDB-303558 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.303558) 3. [Submit #551918 | codeprojects Online Restaurant Management System 1.0 SQL Injection](https://vuldb.com/?submit.551918) 4. [](https://github.com/p1026/CVE/issues/59) ### Credits - pyj2cve (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35838 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 14:02 UTC - **Last Updated**: May 04, 2025 at 09:06 UTC - **Reserved Date**: May 17, 2024 at 13:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak When a station is allocated, links are added but not set to valid yet (e.g. during connection to an AP MLD), we might remove the station without ever marking links valid, and leak them. Fix that. ### Affected Products **Linux - Linux** Affected versions: - cb71f1d136a635decf43c3b502ee34fb05640fcd (Status: affected) - cb71f1d136a635decf43c3b502ee34fb05640fcd (Status: affected) - cb71f1d136a635decf43c3b502ee34fb05640fcd (Status: affected) - cb71f1d136a635decf43c3b502ee34fb05640fcd (Status: affected) **Linux - Linux** Affected versions: - 6.0 (Status: affected) - 0 (Status: unaffected) - 6.1.76 (Status: unaffected) - 6.6.15 (Status: unaffected) - 6.7.3 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1) 2. [](https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034) 3. [](https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9) 4. [](https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15524 - **State**: PUBLISHED - **Published Date**: August 26, 2019 at 12:52 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CSZ CMS 1.2.3 allows arbitrary file upload, as demonstrated by a .php file to admin/filemanager in the File Management Module, which leads to remote code execution by visiting a photo/upload/2019/ URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cszcms.com) 2. [](https://pastebin.com/vbx4JWQh)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36874 - **State**: PUBLISHED - **Published Date**: July 11, 2023 at 17:03 UTC - **Last Updated**: January 27, 2025 at 22:25 UTC - **Reserved Date**: June 27, 2023 at 20:26 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Error Reporting Service Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Error Reporting Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2193 - **State**: PUBLISHED - **Published Date**: April 24, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 24, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the ID_X.apl plugin in ACDSee 9.0 Build 108, Pro 8.1 Build 99, and Photo Editor 4.0 Build 195 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24994](http://secunia.com/advisories/24994) 2. [ADV-2007-1489](http://www.vupen.com/english/advisories/2007/1489) 3. [3776](https://www.exploit-db.com/exploits/3776) 4. [23620](http://www.securityfocus.com/bid/23620) 5. [acdsee-xpm-bo(33812)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33812) 6. [](http://www.acdsee.com/support/knowledgebase/article?id=2800) 7. [35236](http://osvdb.org/35236)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17519 - **State**: PUBLISHED - **Published Date**: February 12, 2020 at 18:04 UTC - **Last Updated**: August 05, 2024 at 01:40 UTC - **Reserved Date**: October 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Bluetooth Low Energy implementation on NXP SDK through 2.2.1 for KW41Z devices does not properly restrict the Link Layer payload length, allowing attackers in radio range to cause a buffer overflow via a crafted packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://asset-group.github.io/disclosures/sweyntooth/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1090 - **State**: PUBLISHED - **Published Date**: June 18, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 03:51 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In Pulp before version 2.16.2, secrets are passed into override_config when triggering a task and then become readable to all users with read access on the distributor/importer. An attacker with API access can then view these secrets. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **[UNKNOWN] - pulp** Affected versions: - pulp 2.16.2 (Status: affected) ### References 1. [](https://pulp.plan.io/issues/3521) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1090) 3. [RHSA-2018:2927](https://access.redhat.com/errata/RHSA-2018:2927)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4481 - **State**: PUBLISHED - **Published Date**: May 09, 2025 at 16:31 UTC - **Last Updated**: May 09, 2025 at 19:52 UTC - **Reserved Date**: May 09, 2025 at 11:43 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Apartment Visitor Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **SourceCodester - Apartment Visitor Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-308195 | SourceCodester Apartment Visitor Management System search-result.php sql injection](https://vuldb.com/?id.308195) 2. [VDB-308195 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308195) 3. [Submit #566671 | SourceCodester Apartment Visitor Management System\ V1.0 SQL Injection](https://vuldb.com/?submit.566671) 4. [](https://github.com/hackerzhuo/CVE/issues/1) 5. [](https://www.sourcecodester.com/) ### Credits - zhuozi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34849 - **State**: PUBLISHED - **Published Date**: June 29, 2023 at 00:00 UTC - **Last Updated**: November 26, 2024 at 21:22 UTC - **Reserved Date**: June 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An unauthorized command injection vulnerability exists in the ActionLogin function of the webman.lua file in Ikuai router OS through 3.7.1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cczzmm/IOT-POC/tree/main/Ikuai)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55239 - **State**: PUBLISHED - **Published Date**: December 18, 2024 at 00:00 UTC - **Last Updated**: December 25, 2024 at 02:27 UTC - **Reserved Date**: December 06, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A reflected Cross-Site Scripting vulnerability in the standard documentation upload functionality in Portabilis i-Educar 2.9 allows attacker to craft malicious urls with arbitrary javascript in the 'titulo_documento' parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/RegularUs3r/CVE-Research/blob/main/CVE-2024/Portabilis%20-%20iEducar/CVE-2024-55649%20-%20Reflected%20Cross-Site%20Scripting.md) 2. [](https://github.com/RegularUs3r/CVE-Research/blob/main/CVE-2024/Portabilis%20-%20iEducar/CVE-2024-55239%20-%20Reflected%20Cross-Site%20Scripting.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20752 - **State**: PUBLISHED - **Published Date**: July 01, 2021 at 05:45 UTC - **Last Updated**: August 03, 2024 at 17:53 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability in IkaIka RSS Reader all versions allows a remote attacker to inject an arbitrary script via unspecified vectors. ### Affected Products **IKaIKa Software Co.,LTD. - IkaIka RSS Reader** Affected versions: - all versions (Status: affected) ### References 1. [](https://jvn.jp/en/jp/JVN15185184/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32035, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32035 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32035 - **State**: PUBLISHED - **Published Date**: July 01, 2022 at 17:27 UTC - **Last Updated**: August 03, 2024 at 07:32 UTC - **Reserved Date**: May 31, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formMasterMng. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28709, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28709 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28709 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 00:00 UTC - **Last Updated**: March 25, 2025 at 16:40 UTC - **Reserved Date**: March 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting vulnerability in LimeSurvey before 6.5.12+240611 allows a remote attacker to execute arbitrary code via a crafted script to the title and comment fields. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://limesurvey.com) 2. [](https://github.com/LimeSurvey/LimeSurvey/commit/c844c4fba81cc26ffe6544bf095bad6252910bc0)