System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3364
- **State**: PUBLISHED
- **Published Date**: September 24, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 06:22 UTC
- **Reserved Date**: September 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in FTPShell Client 4.1 RC2 allows remote FTP servers to execute arbitrary code via a long response to a PASV command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57899](http://www.osvdb.org/57899)
2. [36628](http://secunia.com/advisories/36628)
3. [9613](http://www.exploit-db.com/exploits/9613)
4. [36327](http://www.securityfocus.com/bid/36327)
5. [ADV-2009-2604](http://www.vupen.com/english/advisories/2009/2604)
6. [ftpshell-pasv-bo(53126)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48791
- **State**: PUBLISHED
- **Published Date**: December 13, 2023 at 06:45 UTC
- **Last Updated**: December 02, 2024 at 14:29 UTC
- **Reserved Date**: November 19, 2023 at 19:58 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper neutralization of special elements used in a command ('Command Injection') vulnerability [CWE-77] in FortiPortal version 7.2.0, version 7.0.6 and below may allow a remote authenticated attacker with at least R/W permission to execute unauthorized commands via specifically crafted arguments in the Schedule System Backup page field.
### CVSS Metrics
- **CVSS Base Score**: 7.9/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Fortinet - FortiPortal**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-23-425](https://fortiguard.com/psirt/FG-IR-23-425) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3218
- **State**: PUBLISHED
- **Published Date**: June 03, 2020 at 17:41 UTC
- **Last Updated**: November 15, 2024 at 17:16 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code with root privileges on the underlying Linux shell. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by first creating a malicious file on the affected device itself and then uploading a second malicious file to the device. A successful exploit could allow the attacker to execute arbitrary code with root privileges or bypass licensing requirements on the device.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco IOS XE Software 16.6.1**
Affected versions:
- n/a (Status: affected)
### References
1. [20200603 Cisco IOS XE Software Web UI Remote Code Execution Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-rce-uk8BXcUD) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6204
- **State**: PUBLISHED
- **Published Date**: February 20, 2009 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 19, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in SuperNET Shop 1.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to secure/admin/guncelle.asp, (2) kulad and sifre parameters to secure/admin/giris.asp, and (3) username and password to secure/admin/default.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-1161](http://www.vupen.com/english/advisories/2008/1161/references)
2. [5409](https://www.exploit-db.com/exploits/5409)
3. [supernetshop-guncelle-giris-sql-injection(41727)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41727)
4. [28709](http://www.securityfocus.com/bid/28709) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29229
- **State**: PUBLISHED
- **Published Date**: May 18, 2022 at 20:55 UTC
- **Last Updated**: April 23, 2025 at 18:25 UTC
- **Reserved Date**: April 13, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CaSS is a Competency and Skills System. CaSS Library, (npm:cassproject) has a missing cryptographic step when storing cryptographic keys that can allow a server administrator access to an account’s cryptographic keys. This affects CaSS servers using standalone username/password authentication, which uses a method that expects e2e cryptographic security of authorization credentials. The issue has been patched in 1.5.8, however, the vulnerable accounts are only resecured when the user next logs in using standalone authentication, as the data required to resecure the account is not available to the server. The issue may be mitigated by using SSO or client side certificates to log in. Please note that SSO and client side certificate authentication does not have this expectation of no-knowledge credential access, and cryptographic keys are available to the server administrator.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-325: Security Weakness
### Affected Products
**cassproject - CASS**
Affected versions:
- < 1.5.8 (Status: affected)
### References
1. [](https://github.com/cassproject/CASS/security/advisories/GHSA-7qcx-4p32-qcmx)
2. [](https://github.com/cassproject/CASS/releases/tag/1.5.8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33515
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 16:28 UTC
- **Last Updated**: August 02, 2024 at 02:36 UTC
- **Reserved Date**: April 23, 2024 at 14:21 UTC
- **Assigned By**: hpe
### Vulnerability Description
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central**
Affected versions:
- ArubaOS 10.5.x.x: 10.5.1.0 and below (Status: affected)
- ArubaOS 10.4.x.x: 10.4.1.0 and below (Status: affected)
- ArubaOS 8.11.x.x: 8.11.2.1 and below (Status: affected)
- ArubaOS 8.10.x.x: 8.10.0.10 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt)
### Credits
- Chancen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0267
- **State**: PUBLISHED
- **Published Date**: June 29, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM UrbanCode Deploy 6.0.x before 6.0.1.13, 6.1.x before 6.1.3.3, and 6.2.x before 6.2.1.1 allows remote authenticated users to obtain sensitive cleartext secure-property information via (1) the server UI or (2) a database request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg2C1000151) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1359
- **State**: PUBLISHED
- **Published Date**: April 22, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:13 UTC
- **Reserved Date**: April 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the SCTP sockets implementation in Sun OpenSolaris snv_106 through snv_107 allows local users to cause a denial of service (panic) via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34628](http://www.securityfocus.com/bid/34628)
2. [ADV-2009-1120](http://www.vupen.com/english/advisories/2009/1120)
3. [257331](http://sunsolve.sun.com/search/document.do?assetkey=1-66-257331-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4345
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 01:51 UTC
- **Last Updated**: December 28, 2024 at 00:56 UTC
- **Reserved Date**: June 06, 2023 at 12:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability and nonce checks on the UlistingUserRole::save_role_api method in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to remove or add roles, and add capabilities.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**stylemix - Directory Listings WordPress plugin – uListing**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/44e112a7-8f51-4d2a-a4b3-74a47ef3aec7?source=cve)
2. [](https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vulnerabilities/)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2456786%40ulisting&new=2456786%40ulisting&sfp_email=&sfph_mail=)
### Credits
- Jerome Bruandet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1225
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 19:43 UTC
- **Last Updated**: August 04, 2024 at 06:31 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1226.
### Affected Products
**Microsoft - Microsoft 365 Apps for Enterprise for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise for 64-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Office**
Affected versions:
- 2019 for 32-bit editions (Status: affected)
- 2019 for 64-bit editions (Status: affected)
- 2019 for Mac (Status: affected)
- 2016 for Mac (Status: affected)
**Microsoft - Microsoft Excel**
Affected versions:
- 2016 (32-bit edition) (Status: affected)
- 2016 (64-bit edition) (Status: affected)
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1225)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1045) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44043
- **State**: PUBLISHED
- **Published Date**: December 14, 2021 at 17:50 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in UiPath App Studio 21.4.4. There is a persistent XSS vulnerability in the file-upload functionality for uploading icons when attempting to create new Apps. An attacker with minimal privileges in the application can build their own App and upload a malicious file containing an XSS payload, by uploading an arbitrary file and modifying the MIME type in a subsequent HTTP request. This then allows the file to be stored and retrieved from the server by other users in the same organization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.uipath.com/robot/docs/uipath-assistant)
2. [](https://docs.uipath.com/apps/v2021.10/docs/2021-10-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32564
- **State**: PUBLISHED
- **Published Date**: August 10, 2023 at 19:04 UTC
- **Last Updated**: October 09, 2024 at 19:33 UTC
- **Reserved Date**: May 10, 2023 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remove code execution.
### Affected Products
**Ivanti - Avalanche**
Affected versions:
- 6.4.1 (Status: unaffected)
### References
1. [](https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49828
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 14:09 UTC
- **Last Updated**: May 04, 2025 at 08:46 UTC
- **Reserved Date**: May 01, 2025 at 14:05 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
hugetlbfs: don't delete error page from pagecache
This change is very similar to the change that was made for shmem [1], and
it solves the same problem but for HugeTLBFS instead.
Currently, when poison is found in a HugeTLB page, the page is removed
from the page cache. That means that attempting to map or read that
hugepage in the future will result in a new hugepage being allocated
instead of notifying the user that the page was poisoned. As [1] states,
this is effectively memory corruption.
The fix is to leave the page in the page cache. If the user attempts to
use a poisoned HugeTLB page with a syscall, the syscall will fail with
EIO, the same error code that shmem uses. For attempts to map the page,
the thread will get a BUS_MCEERR_AR SIGBUS.
[1]: commit a76054266661 ("mm: shmem: don't truncate page if memory failure happens")
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.80 (Status: unaffected)
- 6.0.10 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/30571f28bb35c826219971c63bcf60d2517112ed)
2. [](https://git.kernel.org/stable/c/ec667443b2dbc6cdbbac4073e51a17733158ec6a)
3. [](https://git.kernel.org/stable/c/8625147cafaa9ba74713d682f5185eb62cb2aedb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11834
- **State**: PUBLISHED
- **Published Date**: May 09, 2019 at 04:38 UTC
- **Last Updated**: August 04, 2024 at 23:03 UTC
- **Reserved Date**: May 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cJSON before 1.7.11 allows out-of-bounds access, related to \x00 in a string literal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
2. [](https://github.com/DaveGamble/cJSON/issues/337)
3. [](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.11)
4. [](https://github.com/DaveGamble/cJSON/compare/c69134d...93688cb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20390
- **State**: PUBLISHED
- **Published Date**: May 15, 2020 at 17:07 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: January 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in Subrion CMS 4.2.1 that allows a remote attacker to remove files on the server without a victim's knowledge, by enticing an authenticated user to visit an attacker's web page. The application fails to validate the CSRF token for a GET request. An attacker can craft a panel/uploads/read.json?cmd=rm URL (removing this token) and send it to the victim.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/157700/Subrion-CMS-4.2.1-Cross-Site-Request-Forgery.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17048
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 14:19 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 14, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
admin/Lib/Action/FpluginAction.class.php in FDCMS (aka Fangfa Content Manage System) 4.2 allows SQL Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/badongdyc/fangfacms/commits/master)
2. [](http://www.fangfacms.com/)
3. [](http://www.cnvd.org.cn/flaw/show/CNVD-2018-19263) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2064
- **State**: PUBLISHED
- **Published Date**: September 05, 2012 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 23:06 UTC
- **Reserved Date**: April 04, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in theme/views_lang_switch.theme.inc in the Views Language Switcher module before 7.x-1.2 for Drupal allows remote attackers to inject arbitrary web script or HTML via the q parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [52497](http://www.securityfocus.com/bid/52497)
2. [80071](http://www.osvdb.org/80071)
3. [48355](http://secunia.com/advisories/48355)
4. [](http://drupal.org/node/1482420)
5. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1)
6. [](http://drupalcode.org/project/views_lang_switch.git/commit/c27c318) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2469
- **State**: PUBLISHED
- **Published Date**: May 02, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 02, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in FileRun 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the fid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [filerun-index-sql-injection(34006)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34006)
2. [25075](http://secunia.com/advisories/25075)
3. [ADV-2007-1627](http://www.vupen.com/english/advisories/2007/1627)
4. [](http://pridels0.blogspot.com/2007/05/filerun-vuln.html)
5. [23752](http://www.securityfocus.com/bid/23752) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7104
- **State**: PUBLISHED
- **Published Date**: December 14, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 17:53 UTC
- **Reserved Date**: December 14, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
McAfee Email Gateway 7.6 allows remote authenticated administrators to execute arbitrary commands by specifying them in the value attribute in a (1) Command or (2) Script XML element. NOTE: this issue can be combined with CVE-2013-7092 to allow remote attackers to execute commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html)
2. [100581](http://osvdb.org/100581)
3. [64150](http://www.securityfocus.com/bid/64150)
4. [20131203 McAfee Email Gateway multiple vulns](http://seclists.org/fulldisclosure/2013/Dec/18)
5. [mcafee-gateway-cve20137104-command-exec(90163)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90163) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22295
- **State**: PUBLISHED
- **Published Date**: August 06, 2021 at 12:54 UTC
- **Last Updated**: August 03, 2024 at 18:37 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83&pageSize=10&pageIndex=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3026
- **State**: PUBLISHED
- **Published Date**: July 13, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 19:32 UTC
- **Reserved Date**: March 27, 2024 at 18:59 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WordPress Button Plugin MaxButtons WordPress plugin before 9.7.8 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WordPress Button Plugin MaxButtons**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/aba9d8a5-20a7-49e5-841c-9cfcb9bc6144/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29282
- **State**: PUBLISHED
- **Published Date**: May 11, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:02 UTC
- **Reserved Date**: April 04, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - Substance3D - Painter**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52006
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:39 UTC
- **Last Updated**: January 21, 2025 at 17:03 UTC
- **Reserved Date**: November 04, 2024 at 17:46 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
### Weakness Classification (CWE)
- CWE-116: Security Weakness
- CWE-147: Security Weakness
- CWE-150: Security Weakness
### Affected Products
**git - git**
Affected versions:
- <= 2.40.3 (Status: affected)
- >= 2.41.0, <= 2.41.2 (Status: affected)
- >= 2.42.0, <= 2.42.3 (Status: affected)
- >= 2.43.0, <= 2.43.5 (Status: affected)
- >= 2.44.0, <= 2.44.2 (Status: affected)
- >= 2.45.0, <= 2.45.2 (Status: affected)
- >= 2.46.0, <= 2.46.2 (Status: affected)
- >= 2.47.0, < 2.47.2 (Status: affected)
- = 2.48.0 (Status: affected)
### References
1. [https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp](https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp)
2. [https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g](https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g)
3. [https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q](https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q)
4. [https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060](https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31583
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 12:55 UTC
- **Last Updated**: March 31, 2025 at 16:22 UTC
- **Reserved Date**: March 31, 2025 at 10:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Ashish Ajani WP Copy Media URL allows Stored XSS. This issue affects WP Copy Media URL: from n/a through 2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Ashish Ajani - WP Copy Media URL**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-copy-media-url/vulnerability/wordpress-wp-copy-media-url-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37237
- **State**: PUBLISHED
- **Published Date**: August 30, 2022 at 15:30 UTC
- **Last Updated**: August 03, 2024 at 10:29 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An attacker can send malicious RTMP requests to make the ZLMediaKit server crash remotely. Affected version is below commit 7d8b212a3c3368bc2f6507cb74664fc419eb9327.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZLMediaKit/ZLMediaKit/issues/1839) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1683
- **State**: PUBLISHED
- **Published Date**: March 12, 2025 at 15:25 UTC
- **Last Updated**: May 15, 2025 at 14:53 UTC
- **Reserved Date**: February 25, 2025 at 10:27 UTC
- **Assigned By**: 1E
### Vulnerability Description
Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged access on a Windows system to delete arbitrary files on the device by exploiting symbolic links.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**1E - 1E Client**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 25.3 (Status: unaffected)
### References
1. [](https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2025-2001/)
2. [](https://nvd.nist.gov/vuln/detail/CVE-2025-1683)
3. [](https://cwe.mitre.org/data/definitions/59.html)
4. [](https://capec.mitre.org/data/definitions/27.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0059
- **State**: PUBLISHED
- **Published Date**: February 05, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 18:09 UTC
- **Reserved Date**: December 07, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:0101](http://rhn.redhat.com/errata/RHSA-2012-0101.html)
2. [RHSA-2012:0102](http://rhn.redhat.com/errata/RHSA-2012-0102.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0454
- **State**: PUBLISHED
- **Published Date**: February 06, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:19 UTC
- **Reserved Date**: January 23, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#649732](http://www.kb.cert.org/vuls/id/649732)
2. [24046](http://secunia.com/advisories/24046)
3. [24101](http://secunia.com/advisories/24101)
4. [20070207 rPSA-2007-0026-1 samba samba-swat](http://www.securityfocus.com/archive/1/459365/100/0/threaded)
5. [GLSA-200702-01](http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml)
6. [OpenPKG-SA-2007.012](http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html)
7. [1017588](http://securitytracker.com/id?1017588)
8. [24151](http://secunia.com/advisories/24151)
9. [ADV-2007-0483](http://www.vupen.com/english/advisories/2007/0483)
10. [24021](http://secunia.com/advisories/24021)
11. [](https://issues.rpath.com/browse/RPL-1005)
12. [](http://us1.samba.org/samba/security/CVE-2007-0454.html)
13. [24067](http://secunia.com/advisories/24067)
14. [33101](http://osvdb.org/33101)
15. [24145](http://secunia.com/advisories/24145)
16. [24060](http://secunia.com/advisories/24060)
17. [MDKSA-2007:034](http://www.mandriva.com/security/advisories?name=MDKSA-2007:034)
18. [20070205 [SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin](http://www.securityfocus.com/archive/1/459179/100/0/threaded)
19. [2007-0007](http://www.trustix.org/errata/2007/0007)
20. [USN-419-1](http://www.ubuntu.com/usn/usn-419-1)
21. [samba-afsacl-format-string(32304)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32304)
22. [22403](http://www.securityfocus.com/bid/22403)
23. [SSA:2007-038-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916)
24. [DSA-1257](http://www.debian.org/security/2007/dsa-1257) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-53077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-53077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-53077
- **State**: PUBLISHED
- **Published Date**: May 02, 2025 at 15:55 UTC
- **Last Updated**: May 04, 2025 at 07:49 UTC
- **Reserved Date**: May 02, 2025 at 15:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes
[WHY]
When PTEBufferSizeInRequests is zero, UBSAN reports the following
warning because dml_log2 returns an unexpected negative value:
shift exponent 4294966273 is too large for 32-bit type 'int'
[HOW]
In the case PTEBufferSizeInRequests is zero, skip the dml_log2() and
assign the result directly.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10.176 (Status: unaffected)
- 5.15.104 (Status: unaffected)
- 6.1.21 (Status: unaffected)
- 6.2.8 (Status: unaffected)
- 6.3 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7257070be70e19a9138f39009c1a26c83a8a7cfa)
2. [](https://git.kernel.org/stable/c/bec1bea2fa974e63f6059c33edde669c7894d0bc)
3. [](https://git.kernel.org/stable/c/a16394b5d661afec9a264fecac3abd87aea439ea)
4. [](https://git.kernel.org/stable/c/e12b95680821b9880cd9992c0f3555389363604f)
5. [](https://git.kernel.org/stable/c/031f196d1b1b6d5dfcb0533b431e3ab1750e6189) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5139
- **State**: PUBLISHED
- **Published Date**: September 19, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 17:06 UTC
- **Reserved Date**: August 15, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The IOSerialFamily driver in Apple iOS before 7 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds array access) via a crafted application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1029054](http://www.securitytracker.com/id/1029054)
2. [APPLE-SA-2013-10-22-3](http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html)
3. [](http://support.apple.com/kb/HT6150)
4. [54886](http://secunia.com/advisories/54886)
5. [](http://support.apple.com/kb/HT5934)
6. [APPLE-SA-2013-09-18-2](http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5534
- **State**: PUBLISHED
- **Published Date**: October 26, 2006 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 19:55 UTC
- **Reserved Date**: October 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in index.htm in Zwahlen Online Shop Freeware 5.2.2.50, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) cat, (2) Kat, (3) id, or (4) no parameters. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4160](http://www.vupen.com/english/advisories/2006/4160)
2. [30016](http://www.osvdb.org/30016)
3. [22571](http://secunia.com/advisories/22571)
4. [20061103 Zwahlen Online Shop](http://attrition.org/pipermail/vim/2006-November/001106.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29383
- **State**: PUBLISHED
- **Published Date**: May 13, 2022 at 12:49 UTC
- **Last Updated**: August 03, 2024 at 06:17 UTC
- **Reserved Date**: April 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NETGEAR ProSafe SSL VPN firmware FVS336Gv2 and FVS336Gv3 was discovered to contain a SQL injection vulnerability via USERDBDomains.Domainname at cgi-bin/platform.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.netgear.com/about/security/)
2. [](https://github.com/badboycxcc/Netgear-ssl-vpn-20211222) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8130
- **State**: PUBLISHED
- **Published Date**: March 12, 2018 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 13:10 UTC
- **Reserved Date**: October 10, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT204941)
2. [RHSA-2016:1547](http://rhn.redhat.com/errata/RHSA-2016-1547.html)
3. [72353](http://www.securityfocus.com/bid/72353)
4. [](https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543)
5. [APPLE-SA-2015-06-30-2](http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html)
6. [[oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools](http://openwall.com/lists/oss-security/2015/01/24/15)
7. [GLSA-201701-16](https://security.gentoo.org/glsa/201701-16)
8. [1032760](http://www.securitytracker.com/id/1032760)
9. [](http://support.apple.com/kb/HT204942)
10. [](http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt)
11. [APPLE-SA-2015-06-30-1](http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html)
12. [RHSA-2016:1546](http://rhn.redhat.com/errata/RHSA-2016-1546.html)
13. [](https://bugzilla.redhat.com/show_bug.cgi?id=1185817)
14. [](http://bugzilla.maptools.org/show_bug.cgi?id=2483) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10627
- **State**: PUBLISHED
- **Published Date**: July 24, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 21:04 UTC
- **Reserved Date**: May 01, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Echelon - SmartServer 1**
Affected versions:
- all versions (Status: affected)
**Echelon - SmartServer 2**
Affected versions:
- all versions prior to release 4.11.007 (Status: affected)
**Echelon - i.LON 100**
Affected versions:
- all versions (Status: affected)
**Echelon - i.LON 600**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7290
- **State**: PUBLISHED
- **Published Date**: March 30, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 15:56 UTC
- **Reserved Date**: March 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in XOOPS 2.5.7.2 and other versions before 2.5.8.1 allows remote authenticated administrators to execute arbitrary SQL commands via the url parameter to findusers.php. An example attack uses "into outfile" to create a backdoor program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/jk1986/3b304ac6b4ae52ae667bba380c2dce19)
2. [97230](http://www.securityfocus.com/bid/97230) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2165
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 21:17 UTC
- **Last Updated**: September 16, 2024 at 23:40 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The IMHO Webmail module 0.97.3 and earlier for Roxen leaks the REFERER from the browser's previous login session in an error page, which allows local users to read another user's inbox.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securitybugware.org/Other/5537.html)
2. [imho-roxen-session-hijacking(9615)](http://www.iss.net/security_center/static/9615.php)
3. [5238](http://www.securityfocus.com/bid/5238) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3456
- **State**: PUBLISHED
- **Published Date**: August 04, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: August 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
phpMyAdmin before 2.11.8 does not sufficiently prevent its pages from using frames that point to pages in other domains, which makes it easier for remote attackers to conduct spoofing or phishing activities via a cross-site framing attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2008:202](http://www.mandriva.com/security/advisories?name=MDVSA-2008:202)
2. [FEDORA-2008-6868](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01316.html)
3. [](http://yehg.net/lab/pr0js/advisories/Cross-Site_Framing_inphpMyAdmin2.11.7.pdf)
4. [FEDORA-2008-6810](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01239.html)
5. [phpmyadmin-multiple-weak-security(44050)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44050)
6. [32834](http://secunia.com/advisories/32834)
7. [ADV-2008-2226](http://www.vupen.com/english/advisories/2008/2226/references)
8. [DSA-1641](http://www.debian.org/security/2008/dsa-1641)
9. [31312](http://secunia.com/advisories/31312)
10. [31263](http://secunia.com/advisories/31263)
11. [](http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-6)
12. [30420](http://www.securityfocus.com/bid/30420)
13. [SUSE-SR:2008:026](http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13830
- **State**: PUBLISHED
- **Published Date**: June 04, 2020 at 17:08 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: June 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with P(9.0) software. One UI HOME logging can leak information. The Samsung ID is SVE-2019-16382 (June 2020).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22394
- **State**: PUBLISHED
- **Published Date**: November 19, 2020 at 17:55 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In YzmCMS v5.5 the member contribution function in the editor contains a cross-site scripting (XSS) vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yzmcms/yzmcms/issues/42) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7408
- **State**: PUBLISHED
- **Published Date**: March 03, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201702-23](https://security.gentoo.org/glsa/201702-23)
2. [92970](http://www.securityfocus.com/bid/92970)
3. [[oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74](http://www.openwall.com/lists/oss-security/2016/09/15/2)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1376353)
5. [](https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4919
- **State**: PUBLISHED
- **Published Date**: January 22, 2020 at 18:03 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 14, 2012 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Gallery Plugin1.4 for WordPress has a Remote File Include Vulnerability
### Affected Products
**Gallery Plugin authors - Gallery**
Affected versions:
- 1.4 (Status: affected)
### References
1. [](http://www.securityfocus.com/bid/57650)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/81713) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1879
- **State**: PUBLISHED
- **Published Date**: July 18, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2013:1029](http://rhn.redhat.com/errata/RHSA-2013-1029.html)
2. [54073](http://secunia.com/advisories/54073)
3. [](https://issues.apache.org/jira/browse/AMQ-4397)
4. [61142](http://www.securityfocus.com/bid/61142)
5. [activemq-cve20131879-xss(85586)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85586) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4477
- **State**: PUBLISHED
- **Published Date**: June 15, 2020 at 13:25 UTC
- **Last Updated**: September 16, 2024 at 17:33 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Protect Plus 10.1.0 through 10.1.5 discloses highly sensitive information in plain text in the virgo log file which could be used in further attacks against the system. IBM X-Force ID: 181779.
### Affected Products
**IBM - Spectrum Protect Plus**
Affected versions:
- 10.1.0 (Status: affected)
- 10.1.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6221388)
2. [ibm-spectrum-cve20204477-info-disc (181779)](https://exchange.xforce.ibmcloud.com/vulnerabilities/181779) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0158
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: March 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Xsun on Solaris 2.6 through 8 allows local users to gain root privileges via a long -co (color database) command line argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14)
2. [solaris-xsun-co-bo(8703)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8703)
3. [20020402 NSFOCUS SA2002-01: Sun Solaris Xsun "-co" heap overflow](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0000.html)
4. [oval:org.mitre.oval:def:33](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A33)
5. [20020402 NSFOCUS SA2002-01: Sun Solaris Xsun "-co" heap overflow](http://marc.info/?l=bugtraq&m=101776858410652&w=2)
6. [](http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fpatches%2F108652)
7. [4408](http://www.securityfocus.com/bid/4408) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0555
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An information disclosure vulnerability in libavc in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access data without permission. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33551775.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-6.0 (Status: affected)
- Android-6.0.1 (Status: affected)
- Android-7.0 (Status: affected)
- Android-7.1.1 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-04-01)
2. [](https://android.googlesource.com/platform/external/libavc/+/0b23c81c3dd9ec38f7e6806a3955fed1925541a0)
3. [97332](http://www.securityfocus.com/bid/97332)
4. [1038201](http://www.securitytracker.com/id/1038201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1517
- **State**: PUBLISHED
- **Published Date**: June 04, 2021 at 16:45 UTC
- **Last Updated**: November 07, 2024 at 22:10 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the multimedia viewer feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to bypass security protections. This vulnerability is due to unsafe handling of shared content within the multimedia viewer feature. An attacker could exploit this vulnerability by sharing a file through the multimedia viewer feature. A successful exploit could allow the attacker to bypass security protections and prevent warning dialogs from appearing before files are offered to other users.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**Cisco - Cisco WebEx Meetings Server**
Affected versions:
- n/a (Status: affected)
### References
1. [20210602 Cisco Webex Meetings and Webex Meetings Server Multimedia Sharing Security Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-multimedia-26DpqVRO) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5435
- **State**: PUBLISHED
- **Published Date**: June 24, 2016 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 01:01 UTC
- **Reserved Date**: June 15, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in Huawei IPS Module, NGFW Module, NIP6300, NIP6600, and Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 V500R001C00 before V500R001C20SPC100, when in hot standby networking where two devices are not directly connected, allows remote attackers to cause a denial of service (memory consumption and reboot) via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-standby-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41611
- **State**: PUBLISHED
- **Published Date**: October 18, 2021 at 08:56 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed along to clients, allowing access to unsafe or hijacked services.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.squid-cache.org/Versions/v6/changesets/squid-6-43d6b5c81b88ec2256b430c69a872a1e4f324e4a.patch)
2. [](https://github.com/squid-cache/squid/security/advisories/GHSA-47m4-g3mv-9q5r)
3. [FEDORA-2021-15d2f70a07](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CWQ2WKDWTSO47S3F6XJJ6HGG2ULWEAE4/)
4. [[oss-security] 20211223 CVE-2021-44273: e2guardian did not validate TLS hostnames](http://www.openwall.com/lists/oss-security/2021/12/23/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2806
- **State**: PUBLISHED
- **Published Date**: May 08, 2025 at 11:23 UTC
- **Last Updated**: May 08, 2025 at 13:32 UTC
- **Reserved Date**: March 25, 2025 at 21:38 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The tagDiv Composer plugin for WordPress, used by the Newspaper theme, is vulnerable to Reflected Cross-Site Scripting via the ‘data’ parameter in all versions up to, and including, 5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**tagDiv - tagDiv Composer**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/52bd9946-dccc-427a-9abd-0b7153e7484f?source=cve)
2. [](http://localhost:1337/wp-content/plugins/td-composer/legacy/common/wp_booster/td_ajax.php#L2034)
3. [](https://tagdiv.com/td_deploy/Newspaper/changed_files_12.6.9_12.7.html)
### Credits
- Truoc Phan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3844
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7966
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 20:20 UTC
- **Last Updated**: August 27, 2024 at 13:05 UTC
- **Reserved Date**: August 19, 2024 at 19:17 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 128.0.6613.84 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html)
2. [](https://issues.chromium.org/issues/355465305) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56946
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 15:17 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Denial of service in DNS-over-QUIC in Technitium DNS Server <= v13.2.2 allows remote attackers to permanently stop the server from accepting new DNS-over-QUIC connections by triggering unhandled exceptions in listener threads.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:L/C:N/I:N/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-133)
2. [](https://github.com/TechnitiumSoftware/DnsServer/commit/a7d1cfb6e836798ef9171677bf8919cf99d9dcb0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31482
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 22:36 UTC
- **Last Updated**: August 02, 2024 at 01:52 UTC
- **Reserved Date**: April 03, 2024 at 21:21 UTC
- **Assigned By**: hpe
### Vulnerability Description
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba InstantOS and Aruba Access Points running ArubaOS 10**
Affected versions:
- InstantOS or ArubaOS (access points) 10.5.x.x: 10.5.1.0 and below. (Status: affected)
- InstantOS or ArubaOS (access points) 10.4.x.x: 10.4.1.0 and below. (Status: affected)
- InstantOS or ArubaOS (access points) 8.11.x.x: 8.11.2.1 and below. (Status: affected)
- InstantOS or ArubaOS (access points) 8.10.x.x: 8.10.0.10 and below. (Status: affected)
- InstantOS or ArubaOS (access points) 8.6.x.x: 8.6.0.23 and below. (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt)
### Credits
- Chancen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37336
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:58 UTC
- **Last Updated**: August 02, 2024 at 17:09 UTC
- **Reserved Date**: June 30, 2023 at 17:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
Kofax Power PDF TIF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20392.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Kofax - Power PDF**
Affected versions:
- 5.0.0.19 (Status: affected)
### References
1. [ZDI-23-931](https://www.zerodayinitiative.com/advisories/ZDI-23-931/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4393
- **State**: PUBLISHED
- **Published Date**: October 07, 2008 at 18:27 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 02, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in VeriSign Kontiki Delivery Management System (DMS) 5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the action parameter to zodiac/servlet/zodiac.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20081003 IRM Security Advisory: VeriSign Kontiki Delivery Management System (DMS) Cross-Site Scripting Vulnerability](http://seclists.org/fulldisclosure/2008/Oct/0054.html)
2. [](https://customersupport.kontiki.com/software/patch-20102)
3. [kontiki-zodiac-xss(45670)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45670)
4. [32156](http://secunia.com/advisories/32156)
5. [](http://www.irmplc.com/researchlab/advisories/170)
6. [31580](http://www.securityfocus.com/bid/31580) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6674
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 12:46 UTC
- **Last Updated**: October 29, 2024 at 13:41 UTC
- **Reserved Date**: July 10, 2024 at 20:35 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A CORS misconfiguration in parisneo/lollms-webui prior to version 10 allows attackers to steal sensitive information such as logs, browser sessions, and settings containing private API keys from other services. This vulnerability can also enable attackers to perform actions on behalf of a user, such as deleting a project or sending a message. The issue impacts the confidentiality and integrity of the information.
### Weakness Classification (CWE)
- CWE-346: Security Weakness
### Affected Products
**parisneo - parisneo/lollms-webui**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/e688f71b-a3a4-4f6d-b48a-837073fa6908)
2. [](https://github.com/parisneo/lollms-webui/commit/c1bb1ad19752aa7541675b398495eaf98fd589f1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2756
- **State**: PUBLISHED
- **Published Date**: May 23, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 15:44 UTC
- **Reserved Date**: April 03, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C allows remote attackers to bypass the console proxy authentication by leveraging knowledge of the source code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [cloudstack-cve20132756-sec-bypass(83781)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83781)
2. [](http://support.citrix.com/article/CTX135815)
3. [[cloudstack-dev] 20130424 Apache CloudStack Security Advisory: Multiple vulnerabilities in Apache CloudStack](http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E)
4. [92748](http://osvdb.org/92748)
5. [59463](http://www.securityfocus.com/bid/59463)
6. [1028473](http://www.securitytracker.com/id/1028473)
7. [53204](http://secunia.com/advisories/53204)
8. [53175](http://secunia.com/advisories/53175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3714
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 04:08 UTC
- **Last Updated**: May 28, 2025 at 06:48 UTC
- **Reserved Date**: April 16, 2025 at 07:46 UTC
- **Assigned By**: twcert
### Vulnerability Description
The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**ATEN - CL5708IM**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-10099-0ad69-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-10107-26b24-2.html)
### Credits
- Nataliya Tlyapova (Positive Technologies), Denis Goryushev (Positive Technologies) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48690
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 17:44 UTC
- **Last Updated**: May 04, 2025 at 08:21 UTC
- **Reserved Date**: May 03, 2024 at 14:55 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix DMA mappings leak
Fix leak, when user changes ring parameters.
During reallocation of RX buffers, new DMA mappings are created for
those buffers. New buffers with different RX ring count should
substitute older ones, but those buffers were freed in ice_vsi_cfg_rxq
and reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused
leak of already mapped DMA.
Reallocate ZC with xdp_buf struct, when BPF program loads. Reallocate
back to rx_buf, when BPF program unloads.
If BPF program is loaded/unloaded and XSK pools are created, reallocate
RX queues accordingly in XDP_SETUP_XSK_POOL handler.
Steps for reproduction:
while :
do
for ((i=0; i<=8160; i=i+32))
do
ethtool -G enp130s0f0 rx $i tx $i
sleep 0.5
ethtool -g enp130s0f0
done
done
### Affected Products
**Linux - Linux**
Affected versions:
- 617f3e1b588c802517c236087561c6bcb0b4afd6 (Status: affected)
- 617f3e1b588c802517c236087561c6bcb0b4afd6 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 5.19.9 (Status: unaffected)
- 6.0 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/07f40e9f0ff342eb3e97d5c544783b7cb641689c)
2. [](https://git.kernel.org/stable/c/7e753eb675f0523207b184558638ee2eed6c9ac2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40903
- **State**: PUBLISHED
- **Published Date**: June 17, 2022 at 13:46 UTC
- **Last Updated**: August 04, 2024 at 02:51 UTC
- **Reserved Date**: September 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in Antminer Monitor 0.50.0 exists because of backdoor or misconfiguration inside a settings file in flask server. Settings file has a predefined secret string, which would be randomly generated, however it is static.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/50267)
2. [](https://github.com/anselal/antminer-monitor)
3. [](https://packetstormsecurity.com/files/164048/Antminer-Monitor-0.5.0-Authentication-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6305
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 03:17 UTC
- **Reserved Date**: January 25, 2018 at 00:00 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
Denial of service in Gemalto's Sentinel LDK RTE version before 7.65
### Affected Products
**Gemalto - Gemalto's Sentinel LDK RTE**
Affected versions:
- before 7.65 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-566773.pdf)
2. [](https://sentinel.gemalto.com/technical-support/security-updates-sm/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29328
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 17:08 UTC
- **Last Updated**: February 27, 2025 at 21:09 UTC
- **Reserved Date**: April 04, 2023 at 22:34 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Teams Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft Teams for Desktop**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Teams for iOS**
Affected versions:
- 2.0.0 (Status: affected)
**Microsoft - Microsoft Teams for Android**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Teams for Mac**
Affected versions:
- 1.0.0.0 (Status: affected)
### References
1. [Microsoft Teams Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48958
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 00:00 UTC
- **Last Updated**: October 10, 2024 at 20:35 UTC
- **Reserved Date**: October 10, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5)
2. [](https://github.com/libarchive/libarchive/pull/2148) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30458
- **State**: PUBLISHED
- **Published Date**: May 24, 2022 at 13:22 UTC
- **Last Updated**: August 03, 2024 at 06:48 UTC
- **Reserved Date**: May 09, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Automotive Shop Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via /asms/classes/Master.php?f=save_product, name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mikeccltt/automotive/blob/main/automotive-shop-management-system/xss.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13908
- **State**: PUBLISHED
- **Published Date**: June 14, 2019 at 17:02 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 11, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Truncated access authentication token leads to weakened access control for stored secure application data in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57654
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 16:14 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the qst_vec_get_int64 component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/openlink/virtuoso-opensource/issues/1205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11935
- **State**: PUBLISHED
- **Published Date**: February 25, 2019 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 07, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Improper input validation might result in incorrect app id returned to the caller Instead of returning failure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in versions MDM9607, MDM9650, MDM9655, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130.
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile**
Affected versions:
- MDM9607, MDM9650, MDM9655, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins)
2. [106845](http://www.securityfocus.com/bid/106845) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17149
- **State**: REJECTED
- **Published Date**: January 15, 2020 at 00:05 UTC
- **Last Updated**: January 15, 2020 at 00:05 UTC
- **Reserved Date**: October 04, 2019 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5093
- **State**: PUBLISHED
- **Published Date**: September 27, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: August 08, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ceriksen.com/2013/08/20/graphite-remote-code-execution-vulnerability-advisory/)
2. [27752](http://www.exploit-db.com/exploits/27752)
3. [](https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst)
4. [96436](http://www.osvdb.org/96436)
5. [61894](http://www.securityfocus.com/bid/61894)
6. [54556](http://secunia.com/advisories/54556)
7. [](https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/graphite_pickle_exec.rb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20302
- **State**: PUBLISHED
- **Published Date**: March 04, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 17:37 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - OpenEXR**
Affected versions:
- Fixed in v2.5.4 and beyond. (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939161)
2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894)
3. [](https://github.com/AcademySoftwareFoundation/openexr/pull/842)
4. [[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0366
- **State**: PUBLISHED
- **Published Date**: January 22, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:34 UTC
- **Reserved Date**: January 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Phpclanwebsite (aka PCW) allows remote attackers to inject arbitrary web script or HTML via a javascript URI in a BBCode img tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060117 Phpclanwebsite BBCode IMG Tag XSS Vulnerability](http://www.securityfocus.com/archive/1/422265/100/0/threaded)
2. [20060118 Phpclanwebsite BBCode IMG Tag XSS Vulnerability](https://archive.cert.uni-stuttgart.de/bugtraq/2006/01/msg00343.html)
3. [16300](http://www.securityfocus.com/bid/16300)
4. [18541](http://secunia.com/advisories/18541)
5. [ADV-2006-0254](http://www.vupen.com/english/advisories/2006/0254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4649
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 13:31 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: May 08, 2024 at 05:57 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263493 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Campcodes - Complete Web-Based School Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-263493 | Campcodes Complete Web-Based School Management System student_exam_mark_insert_form1.php cross site scripting](https://vuldb.com/?id.263493)
2. [VDB-263493 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263493)
3. [Submit #330123 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.330123)
4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2018.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1258
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 18:13 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens. This vulnerability allows an authenticated attacker to perform actions in context of another user.
The authenticated attacker can exploit this vulneraiblity by accessing a service configured for On-Behalf-Of flow that assigns incorrect tokens.
This security update addresses the vulnerability by removing fallback cache look-up for On-Behalf-Of scenarios.
### Affected Products
**Microsoft - ADAL.NET**
Affected versions:
- 5.0.0 (Status: affected)
**Microsoft - Nuget 5.2.0**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50191
- **State**: PUBLISHED
- **Published Date**: November 08, 2024 at 05:43 UTC
- **Last Updated**: May 04, 2025 at 09:48 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ext4: don't set SB_RDONLY after filesystem errors
When the filesystem is mounted with errors=remount-ro, we were setting
SB_RDONLY flag to stop all filesystem modifications. We knew this misses
proper locking (sb->s_umount) and does not go through proper filesystem
remount procedure but it has been the way this worked since early ext2
days and it was good enough for catastrophic situation damage
mitigation. Recently, syzbot has found a way (see link) to trigger
warnings in filesystem freezing because the code got confused by
SB_RDONLY changing under its hands. Since these days we set
EXT4_FLAGS_SHUTDOWN on the superblock which is enough to stop all
filesystem modifications, modifying SB_RDONLY shouldn't be needed. So
stop doing that.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.168 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.57 (Status: unaffected)
- 6.11.4 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fbb177bc1d6487cd3e9b50ae0be2781b7297980d)
2. [](https://git.kernel.org/stable/c/4061e07f040a091f694f461b86a26cf95ae66439)
3. [](https://git.kernel.org/stable/c/58c0648e4c773f5b54f0cb63bc8c7c6bf52719a9)
4. [](https://git.kernel.org/stable/c/ee77c388469116565e009eaa704a60bc78489e09)
5. [](https://git.kernel.org/stable/c/d3476f3dad4ad68ae5f6b008ea6591d1520da5d8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4338
- **State**: PUBLISHED
- **Published Date**: April 03, 2019 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 05:11 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.
### Affected Products
**n/a - macOS**
Affected versions:
- Versions prior to: macOS Mojave 10.14 (Status: affected)
### References
1. [](https://support.apple.com/kb/HT209139) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31429
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 15:56 UTC
- **Last Updated**: June 09, 2025 at 17:22 UTC
- **Reserved Date**: March 28, 2025 at 11:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in themeton PressGrid - Frontend Publish Reaction & Multimedia Theme allows Object Injection. This issue affects PressGrid - Frontend Publish Reaction & Multimedia Theme: from n/a through 1.3.1.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**themeton - PressGrid - Frontend Publish Reaction & Multimedia Theme**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/press-grid/vulnerability/wordpress-pressgrid-frontend-publish-reaction-multimedia-theme-1-3-1-deserialization-of-untrusted-data-vulnerability?_s_id=cve)
### Credits
- Tran Nguyen Bao Khanh (VCI - VNPT Cyber Immunity) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20769
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:53 UTC
- **Last Updated**: October 07, 2024 at 13:15 UTC
- **Reserved Date**: December 04, 2023 at 16:52 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2703
- **State**: PUBLISHED
- **Published Date**: July 27, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 02:39 UTC
- **Reserved Date**: July 12, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to execute arbitrary code via a long HTTP request to webappmon.exe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-1866](http://www.vupen.com/english/advisories/2010/1866)
2. [14916](http://www.exploit-db.com/exploits/14916)
3. [66514](http://osvdb.org/66514)
4. [41829](http://www.securityfocus.com/bid/41829)
5. [20100721 VUPEN Security Research - HP OpenView Network Node Manager "ov.dll" Buffer Overflow Vulnerability (CVE-2010-2704)](http://www.securityfocus.com/archive/1/512544/100/0/threaded)
6. [SSRT100025](http://marc.info/?l=bugtraq&m=127973001009749&w=2)
7. [20100727 CVE number confusion in HP OV NNM products](http://www.attrition.org/pipermail/vim/2010-July/002374.html)
8. [40686](http://secunia.com/advisories/40686)
9. [1024238](http://www.securitytracker.com/id?1024238)
10. [1024224](http://www.securitytracker.com/id?1024224)
11. [8161](http://securityreason.com/securityalert/8161)
12. [20100721 ZDI-10-137: Hewlett-Packard OpenView NNM webappmon.exe execvp_nc Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/512552/100/0/threaded)
13. [HPSBMA02557](http://marc.info/?l=bugtraq&m=127973001009749&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9581
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 02:06 UTC
- **Last Updated**: October 10, 2024 at 16:18 UTC
- **Reserved Date**: October 07, 2024 at 14:09 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Shortcodes AnyWhere plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**happyplugins - Shortcodes AnyWhere**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7e289b06-66c8-4d50-a8f7-e07c5ae8f7c8?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/shortcodes-anywhere/trunk/core/shortcodeEverywhere.class.php#L15)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0935
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
classifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28732
- **State**: REJECTED
- **Published Date**: September 08, 2021 at 16:23 UTC
- **Last Updated**: September 08, 2021 at 16:59 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9668
- **State**: PUBLISHED
- **Published Date**: December 31, 2019 at 16:06 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 11, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in rovinbhandari FTP through 2012-03-28. receive_file in file_transfer_functions.c allows remote attackers to cause a denial of service (daemon crash) via a 0xffff datalen field value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/152058/robinbhandari-FTP-Remote-Denial-Of-Service.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2596
- **State**: PUBLISHED
- **Published Date**: November 29, 2005 at 02:00 UTC
- **Last Updated**: August 08, 2024 at 01:29 UTC
- **Reserved Date**: November 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Quake II server before R1Q2, as used in multiple products, allows remote attackers to cause a denial of service (exhaustion of connection slots) via a large number of connections from the same IP address.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/)
2. [1011979](http://securitytracker.com/id?1011979)
3. [11551](http://www.securityfocus.com/bid/11551)
4. [quake-mult-conn-dos(17894)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17894)
5. [13013](http://secunia.com/advisories/13013)
6. [](http://secur1ty.net/advisories/001)
7. [20041027 Multiple Vulnerabilites in Quake II Server](http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25091
- **State**: PUBLISHED
- **Published Date**: March 01, 2024 at 08:59 UTC
- **Last Updated**: August 05, 2024 at 18:52 UTC
- **Reserved Date**: February 05, 2024 at 04:43 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Protection mechanism failure issue exists in RevoWorks SCVX prior to scvimage4.10.21_1013 (when using 'VirusChecker' or 'ThreatChecker' feature) and RevoWorks Browser prior to 2.2.95 (when using 'VirusChecker' or 'ThreatChecker' feature). If data containing malware is saved in a specific file format (eml, dmg, vhd, iso, msi), malware may be taken outside the sandboxed environment.
### Affected Products
**J's Communications Co., Ltd. - RevoWorks SCVX**
Affected versions:
- prior to scvimage4.10.21_1013 (Status: affected)
**J's Communications Co., Ltd. - RevoWorks Browser**
Affected versions:
- prior to 2.2.95 (Status: affected)
### References
1. [](https://jscom.jp/news-20240229/)
2. [](https://jvn.jp/en/jp/JVN35928117/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23725
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:31 UTC
- **Last Updated**: December 09, 2024 at 18:40 UTC
- **Reserved Date**: January 17, 2023 at 15:49 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Chris Baldelomar Shortcodes allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Shortcodes: from n/a through 3.46.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Chris Baldelomar - Shortcodes**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wc-shortcodes/vulnerability/wordpress-shortcodes-by-angie-makes-plugin-3-46-broken-access-control-vulnerability?_s_id=cve)
### Credits
- István Márton (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46514
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:08 UTC
- **Last Updated**: April 25, 2025 at 13:51 UTC
- **Reserved Date**: April 24, 2025 at 14:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in milat Milat jQuery Automatic Popup allows Stored XSS. This issue affects Milat jQuery Automatic Popup: from n/a through 1.3.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**milat - Milat jQuery Automatic Popup**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/milat-jquery-automatic-popup/vulnerability/wordpress-milat-jquery-automatic-popup-plugin-1-3-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- johska (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21718
- **State**: PUBLISHED
- **Published Date**: February 14, 2023 at 19:32 UTC
- **Last Updated**: February 28, 2025 at 21:14 UTC
- **Reserved Date**: December 13, 2022 at 18:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-191: Security Weakness
### Affected Products
**Microsoft - Microsoft SQL Server 2012 Service Pack 4 (QFE)**
Affected versions:
- 11.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 (QFE)**
Affected versions:
- 11.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2017 (GDR)**
Affected versions:
- 14.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2014 Service Pack 3 (GDR)**
Affected versions:
- 12.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2014 Service Pack 3 (CU 4)**
Affected versions:
- 12.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (GDR)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2016 Service Pack 3 (GDR)**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2017 (CU 31)**
Affected versions:
- 14.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 (GDR)**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (CU 18)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2008 R2 Service Pack 3 (QFE)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2008 Service Pack 4 (QFE)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0333, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0333
- **State**: PUBLISHED
- **Published Date**: February 10, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LANChat Pro Revival 1.666c allows remote attackers to cause a denial of service (application crash) via a malformed UDP packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lanchatpro-udp-packet-dos(19213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19213)
2. [](http://www.autistici.org/fdonato/advisory/LANChatRevival1.666c-adv.txt)
3. [20050203 DoS in LANChat Pro Revival 1.666c](http://marc.info/?l=bugtraq&m=110746524021133&w=2)
4. [12439](http://www.securityfocus.com/bid/12439) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38068
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 14:39 UTC
- **Last Updated**: February 20, 2025 at 20:08 UTC
- **Reserved Date**: August 09, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Apasionados Export Post Info plugin <= 1.1.0 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Apasionados - Export Post Info (WordPress plugin)**
Affected versions:
- <= 1.1.0 (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/export-post-info/wordpress-export-post-info-plugin-1-1-0-authenticated-stored-cross-site-scripting-xss-vulnerability/_s_id=cve)
2. [](https://wordpress.org/plugins/export-post-info/#developers)
### Credits
- Vulnerability discovered by Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45558
- **State**: PUBLISHED
- **Published Date**: January 20, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 15:25 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross site scripting (XSS) vulnerability in Hundredrabbits Left 7.1.5 for MacOS allows attackers to execute arbitrary code via the meta tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hundredrabbits/Left/issues/168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36787
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 08:13 UTC
- **Last Updated**: May 04, 2025 at 06:59 UTC
- **Reserved Date**: February 26, 2024 at 17:07 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: aspeed: fix clock handling logic
Video engine uses eclk and vclk for its clock sources and its reset
control is coupled with eclk so the current clock enabling sequence works
like below.
Enable eclk
De-assert Video Engine reset
10ms delay
Enable vclk
It introduces improper reset on the Video Engine hardware and eventually
the hardware generates unexpected DMA memory transfers that can corrupt
memory region in random and sporadic patterns. This issue is observed
very rarely on some specific AST2500 SoCs but it causes a critical
kernel panic with making a various shape of signature so it's extremely
hard to debug. Moreover, the issue is observed even when the video
engine is not actively used because udevd turns on the video engine
hardware for a short time to make a query in every boot.
To fix this issue, this commit changes the clock handling logic to make
the reset de-assertion triggered after enabling both eclk and vclk. Also,
it adds clk_unprepare call for a case when probe fails.
clk: ast2600: fix reset settings for eclk and vclk
Video engine reset setting should be coupled with eclk to match it
with the setting for previous Aspeed SoCs which is defined in
clk-aspeed.c since all Aspeed SoCs are sharing a single video engine
driver. Also, reset bit 6 is defined as 'Video Engine' reset in
datasheet so it should be de-asserted when eclk is enabled. This
commit fixes the setting.
### Affected Products
**Linux - Linux**
Affected versions:
- d2b4387f3bdf016e266d23cf657465f557721488 (Status: affected)
- d2b4387f3bdf016e266d23cf657465f557721488 (Status: affected)
- d2b4387f3bdf016e266d23cf657465f557721488 (Status: affected)
- d2b4387f3bdf016e266d23cf657465f557721488 (Status: affected)
- d2b4387f3bdf016e266d23cf657465f557721488 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.0 (Status: affected)
- 0 (Status: unaffected)
- 5.4.119 (Status: unaffected)
- 5.10.37 (Status: unaffected)
- 5.11.21 (Status: unaffected)
- 5.12.4 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1dc1d30ac101bb8335d9852de2107af60c2580e7)
2. [](https://git.kernel.org/stable/c/a59d01384c80a8a4392665802df57c3df20055f5)
3. [](https://git.kernel.org/stable/c/2964c37563e86cfdc439f217eb3c5a69adfdba6a)
4. [](https://git.kernel.org/stable/c/75321dc8aebe3f30eff226028fe6da340fe0bf02)
5. [](https://git.kernel.org/stable/c/3536169f8531c2c5b153921dc7d1ac9fd570cda7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8165
- **State**: PUBLISHED
- **Published Date**: March 05, 2018 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 01:11 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Mate 9 Huawei smart phones with versions earlier than MHA-AL00BC00B233 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Successful exploitation may cause sensitive information leak.
### Affected Products
**Huawei Technologies Co., Ltd. - Mate 9**
Affected versions:
- Versions earlier than MHA-AL00BC00B233 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171117-01-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34711
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 19:46 UTC
- **Last Updated**: November 07, 2024 at 21:48 UTC
- **Reserved Date**: June 15, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-36: Security Weakness
### Affected Products
**Cisco - Cisco IP Phones with Multiplatform Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20211006 Cisco IP Phone Software Arbitrary File Read Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26076
- **State**: PUBLISHED
- **Published Date**: February 16, 2023 at 19:59 UTC
- **Last Updated**: January 27, 2025 at 18:24 UTC
- **Reserved Date**: March 09, 2022 at 23:14 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path element in the Intel(R) oneAPI Deep Neural Network (oneDNN) before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - Intel(R) oneAPI Deep Neural Network (oneDNN)**
Affected versions:
- before version 2022.1 (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42236
- **State**: PUBLISHED
- **Published Date**: January 13, 2025 at 00:00 UTC
- **Last Updated**: January 31, 2025 at 18:47 UTC
- **Reserved Date**: September 08, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /common/ajaxfunction.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1542
- **State**: PUBLISHED
- **Published Date**: May 30, 2022 at 08:35 UTC
- **Last Updated**: August 03, 2024 at 00:10 UTC
- **Reserved Date**: April 29, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The HPB Dashboard WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - hpb Dashboard**
Affected versions:
- 1.3.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359)
### Credits
- Vinay Varma Mudunuri
- Krishna Harsha Kondaveeti |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5460
- **State**: PUBLISHED
- **Published Date**: July 08, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 06:50 UTC
- **Reserved Date**: July 08, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in app/views/events/_menu.html.erb in Snorby 2.6.2 allows remote attackers to inject arbitrary web script or HTML via the title (cls.name variable) when creating a classification.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Snorby/snorby/commit/89d7cbcd3697c8a842f1a61b99e9a78f295798fb)
2. [20150703 Snorby 2.6.2 - Stored Cross-site Scripting Vulnerability](http://www.securityfocus.com/archive/1/535930/100/0/threaded)
3. [75561](http://www.securityfocus.com/bid/75561)
4. [](http://packetstormsecurity.com/files/132552/Snorby-2.6.2-Cross-Site-Scripting.html)
5. [](https://github.com/Snorby/snorby/issues/377)
6. [20150703 Snorby 2.6.2 - Stored Cross-site Scripting Vulnerability](http://seclists.org/fulldisclosure/2015/Jul/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29820
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 16:45 UTC
- **Last Updated**: September 16, 2024 at 23:51 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz for Service Management and IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204347.
### Affected Products
**IBM - Tivoli Netcool/OMNIbus**
Affected versions:
- 8.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6490747)
2. [ibm-tivoli-cve202129820-xss (204347)](https://exchange.xforce.ibmcloud.com/vulnerabilities/204347) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4422
- **State**: PUBLISHED
- **Published Date**: August 18, 2023 at 18:35 UTC
- **Last Updated**: October 03, 2024 at 14:19 UTC
- **Reserved Date**: August 18, 2023 at 18:35 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**cockpit-hq - cockpit-hq/cockpit**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e)
2. [](https://github.com/cockpit-hq/cockpit/commit/b8dad5e070608bb5e4ec58fabbee101b5af737cf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27007
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 10:54 UTC
- **Last Updated**: May 05, 2025 at 17:09 UTC
- **Reserved Date**: February 17, 2025 at 11:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Incorrect Privilege Assignment vulnerability in Brainstorm Force SureTriggers allows Privilege Escalation.This issue affects SureTriggers: from n/a through 1.0.82.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-266: Security Weakness
### Affected Products
**Brainstorm Force - SureTriggers**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve)
2. [](https://patchstack.com/articles/additional-critical-ottokit-formerly-suretriggers-vulnerability-patched?_s_id=cve)
### Credits
- Denver Jackson (Patchstack Alliance) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.