System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22710
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 13:57 UTC
- **Last Updated**: February 06, 2025 at 16:56 UTC
- **Reserved Date**: January 07, 2025 at 21:03 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StoreApps Smart Manager allows Blind SQL Injection. This issue affects Smart Manager: from n/a through 8.52.0.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**StoreApps - Smart Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/smart-manager-for-wp-e-commerce/vulnerability/wordpress-smart-manager-plugin-8-52-0-sql-injection-vulnerability?_s_id=cve)
### Credits
- Webula (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8995
- **State**: PUBLISHED
- **Published Date**: April 24, 2019 at 20:20 UTC
- **Last Updated**: September 16, 2024 at 23:26 UTC
- **Reserved Date**: February 21, 2019 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The workspace client, openspace client, and app development client of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, and TIBCO Silver Fabric Enabler for ActiveMatrix BPM contain a vulnerability wherein a malicious URL could trick a user into visiting a website of the attacker's choice. Affected releases are TIBCO Software Inc.'s TIBCO ActiveMatrix BPM: versions up to and including 4.2.0, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric: versions up to and including 4.2.0, and TIBCO Silver Fabric Enabler for ActiveMatrix BPM: versions up to and including 1.4.1.
### Affected Products
**TIBCO Software Inc. - TIBCO ActiveMatrix BPM**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO Silver Fabric Enabler for ActiveMatrix BPM**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2019/04/tibco-security-advisory-april-24-2019-tibco-activematrix-bpm-2019-8995)
3. [108062](http://www.securityfocus.com/bid/108062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5217
- **State**: PUBLISHED
- **Published Date**: December 23, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 13, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in nps/servlet/webacc in the Administration Console server in NetIQ Access Manager (NAM) 4.x before 4.1 allows remote attackers to hijack the authentication of administrators for requests that change the administrative password via an fw.SetPassword action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141218 SEC Consult SA-20141218-2 :: Multiple high risk vulnerabilities in NetIQ Access Manager](http://seclists.org/fulldisclosure/2014/Dec/78)
2. [](https://www.novell.com/support/kb/doc.php?id=7015997)
3. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-2_Novell_NetIQ_Access_Manager_Multiple_Vulnerabilities_v10.txt)
4. [](http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4255
- **State**: PUBLISHED
- **Published Date**: January 27, 2023 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 20:17 UTC
- **Reserved Date**: December 01, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An info leak issue was identified in all versions of GitLab EE from 13.7 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which exposes user email id through webhook payload.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=13.7, <15.4.6 (Status: affected)
- >=15.5, <15.5.5 (Status: affected)
- >=15.6, <15.6.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/373819)
2. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4255.json)
### Credits
- This vulnerability has been discovered internally by the GitLab team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0377
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0418.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201612-27](https://security.gentoo.org/glsa/201612-27)
2. [62694](http://secunia.com/advisories/62694)
3. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
4. [](http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf)
5. [72219](http://www.securityfocus.com/bid/72219)
6. [DSA-3143](http://www.debian.org/security/2015/dsa-3143)
7. [openSUSE-SU-2015:0229](http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html)
8. [oracle-cpujan2015-cve20150377(100176)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100176) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35847
- **State**: PUBLISHED
- **Published Date**: December 30, 2020 at 00:38 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: December 30, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php resetpassword function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://getcockpit.com/)
2. [](https://github.com/agentejo/cockpit/commit/79fc9631ffa29146e3124ceaf99879b92e1ef24b)
3. [](https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af)
4. [](https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466)
5. [](http://packetstormsecurity.com/files/162282/Cockpit-CMS-0.11.1-NoSQL-Injection-Remote-Command-Execution.html)
6. [](http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10330
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:10 UTC
- **Last Updated**: March 20, 2025 at 18:21 UTC
- **Reserved Date**: October 24, 2024 at 04:03 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In lunary-ai/lunary version 1.5.6, the `/v1/evaluators/` endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access potentially sensitive evaluation data.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/598ecd65-1723-4fb7-a9aa-9c4f56a5a2aa)
2. [](https://github.com/lunary-ai/lunary/commit/8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46550
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 18:54 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the CGIbyFieldName parameter at chglog.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#bffdd8897d944a77834b865d9326a1d7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21894
- **State**: PUBLISHED
- **Published Date**: April 04, 2024 at 22:16 UTC
- **Last Updated**: October 03, 2024 at 21:43 UTC
- **Reserved Date**: January 03, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
### Affected Products
**Ivanti - Connect Secure**
Affected versions:
- 22.1R6.2 (Status: affected)
- 22.2R4.2 (Status: affected)
- 22.3R1.2 (Status: affected)
- 22.4R1.2 (Status: affected)
- 22.4R2.4 (Status: affected)
- 22.5R1.3 (Status: affected)
- 22.5R2.4 (Status: affected)
- 22.6R2.3 (Status: affected)
- 9.1R14.6 (Status: affected)
- 9.1R15.4 (Status: affected)
- 9.1R16.4 (Status: affected)
- 9.1R17.4 (Status: affected)
- 9.1R18.5 (Status: affected)
**Ivanti - Policy Secure**
Affected versions:
- 22.4R1.2 (Status: affected)
- 22.6R1.2 (Status: affected)
- 9.1R16.4 (Status: affected)
- 9.1R17.4 (Status: affected)
- 9.1R18.5 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3590
- **State**: PUBLISHED
- **Published Date**: December 14, 2022 at 08:33 UTC
- **Last Updated**: April 21, 2025 at 14:12 UTC
- **Reserved Date**: October 18, 2022 at 14:10 UTC
- **Assigned By**: WPScan
### Vulnerability Description
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
### Weakness Classification (CWE)
- CWE-918 Server-Side Request Forgery (SSRF): Server-Side Request Forgery (SSRF)
- CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition: Security Weakness
### Affected Products
**WordPress - WordPress**
Affected versions:
- 4.1.30 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11)
2. [](https://blog.sonarsource.com/wordpress-core-unauthenticated-blind-ssrf/)
### Credits
- Thomas Chauchefoin
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9750
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 20:02 UTC
- **Last Updated**: September 16, 2024 at 17:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Animate version 20.5 (and earlier) is affected by an out-of-bounds read vulnerability, which could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Animate**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/animate/apsb20-61.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31006
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:51 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Description: A permissions issue was addressed with improved validation. This issue is fixed in watchOS 7.6, tvOS 14.7, macOS Big Sur 11.5. A malicious application may be able to bypass certain Privacy preferences.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212602)
2. [](https://support.apple.com/en-us/HT212605)
3. [](https://support.apple.com/en-us/HT212604) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8712
- **State**: PUBLISHED
- **Published Date**: April 13, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 17, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable nonce reuse vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless AP running firmware 1.1. The device uses one nonce for all session authentication requests and only changes the nonce if the web application has been idle for 300 seconds.
### Affected Products
**Moxa - AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client**
Affected versions:
- 1.1 (Status: affected)
### References
1. [](http://www.talosintelligence.com/reports/TALOS-2016-0225/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47521
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 16:59 UTC
- **Last Updated**: August 02, 2024 at 21:09 UTC
- **Reserved Date**: November 06, 2023 at 08:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Max Bond, AndreSC Q2W3 Post Order allows Reflected XSS.This issue affects Q2W3 Post Order: from n/a through 1.2.8.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Max Bond, AndreSC - Q2W3 Post Order**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/q2w3-post-order/wordpress-q2w3-post-order-plugin-1-2-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26099
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 19:37 UTC
- **Last Updated**: August 03, 2024 at 04:56 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Null pointer dereference vulnerability in parser_infe function of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds read by remote attackers.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Q(10), R(11), S(12) (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3308
- **State**: PUBLISHED
- **Published Date**: June 18, 2023 at 09:00 UTC
- **Last Updated**: August 02, 2024 at 06:48 UTC
- **Reserved Date**: June 18, 2023 at 07:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in whaleal IceFrog 1.1.8. Affected is an unknown function of the component Aviator Template Engine. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231804.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**whaleal - IceFrog**
Affected versions:
- 1.1.8 (Status: affected)
### References
1. [](https://vuldb.com/?id.231804)
2. [](https://vuldb.com/?ctiid.231804)
3. [](https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md)
### Credits
- dreamfly (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12722
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 09, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Out-of-bounds Read issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. A third-party component used in the pump reads memory out of bounds, causing the communications module to crash. Smiths Medical assesses that the crash of the communications module would not impact the operation of the therapeutic module.
### Affected Products
**n/a - Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump**
Affected versions:
- Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-17-250-02A)
2. [101252](http://www.securityfocus.com/bid/101252)
3. [100665](http://www.securityfocus.com/bid/100665) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4200
- **State**: PUBLISHED
- **Published Date**: May 02, 2022 at 07:05 UTC
- **Last Updated**: September 16, 2024 at 17:54 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: suse
### Vulnerability Description
A Improper Privilege Management vulnerability in SUSE Rancher allows write access to the Catalog for any user when restricted-admin role is enabled. This issue affects: SUSE Rancher Rancher versions prior to 2.5.13; Rancher versions prior to 2.6.4.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**SUSE - Rancher**
Affected versions:
- Rancher (Status: affected)
**SUSE - Rancher**
Affected versions:
- Rancher (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1193992) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0322
- **State**: PUBLISHED
- **Published Date**: June 30, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 through CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML by uploading an HTML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [LO88783](http://www-01.ibm.com/support/docview.wss?uid=swg1LO88783)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21982611) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1360
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 06:32 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Profile Service improperly handles file operations, aka 'Windows Profile Service Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 2004 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1360) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5242
- **State**: PUBLISHED
- **Published Date**: January 12, 2023 at 00:00 UTC
- **Last Updated**: April 08, 2025 at 14:20 UTC
- **Reserved Date**: January 09, 2017 at 00:00 UTC
- **Assigned By**: rapid7
### Vulnerability Description
Nexpose and InsightVM virtual appliances downloaded between April 5th, 2017 and May 3rd, 2017 contain identical SSH host keys. Normally, a unique SSH host key should be generated the first time a virtual appliance boots.
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**Rapid7 - Nexpose Virtual Appliance**
Affected versions:
- 2017.04.05 (Status: affected)
- 2017.05.03 (Status: affected)
**Rapid7 - InsightVM Virtual Appliance**
Affected versions:
- 2017.04.05 (Status: affected)
- 2017.05.03 (Status: affected)
### References
1. [](https://www.rapid7.com/blog/post/2017/05/17/rapid7-nexpose-virtual-appliance-duplicate-ssh-host-key-cve-2017-5242/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4498
- **State**: PUBLISHED
- **Published Date**: July 27, 2020 at 13:31 UTC
- **Last Updated**: September 17, 2024 at 03:33 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MQ Appliance 9.1 LTS and 9.1 CD could allow a local privileged user to obtain highly sensitve information due to inclusion of data within trace files. IBM X-Force ID: 182118.
### Affected Products
**IBM - MQ Appliance**
Affected versions:
- 9.1.0.0 (Status: affected)
- 9.1.0.1 (Status: affected)
- 9.1.1 (Status: affected)
- 9.1.0.2 (Status: affected)
- 9.1.2 (Status: affected)
- 9.1.0.3 (Status: affected)
- 9.1.3 (Status: affected)
- 9.1.0.4 (Status: affected)
- 9.1.4 (Status: affected)
- 9.1.0.5 (Status: affected)
- 9.1.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6252409)
2. [ibm-mq-cve20204498-info-disc (182118)](https://exchange.xforce.ibmcloud.com/vulnerabilities/182118) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1484
- **State**: PUBLISHED
- **Published Date**: March 24, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The password reset feature in PunBB 1.2.16 and earlier uses predictable random numbers based on the system time, which allows remote authenticated users to determine the new password via a brute force attack on a seed that is based on the approximate creation time of the targeted account. NOTE: this issue might be related to CVE-2006-5737.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://punbb.org/forums/viewtopic.php?id=18460)
2. [29043](http://secunia.com/advisories/29043)
3. [](http://sektioneins.de/advisories/SE-2008-01.txt)
4. [](http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt)
5. [45561](http://osvdb.org/45561)
6. [20080220 Advisory SE-2008-01: PunBB Blind Password Recovery Vulnerability](http://www.securityfocus.com/archive/1/488408/100/200/threaded)
7. [5165](https://www.exploit-db.com/exploits/5165)
8. [27908](http://www.securityfocus.com/bid/27908) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11971
- **State**: PUBLISHED
- **Published Date**: June 05, 2019 at 15:24 UTC
- **Last Updated**: August 04, 2024 at 23:10 UTC
- **Reserved Date**: May 13, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
### Affected Products
**n/a - HPE Intelligent Management Center (IMC) PLAT**
Affected versions:
- 7.3 E0506P09 and earlier (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32421
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 20:12 UTC
- **Last Updated**: February 13, 2025 at 16:51 UTC
- **Reserved Date**: May 08, 2023 at 22:31 UTC
- **Assigned By**: apple
### Vulnerability Description
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to observe unprotected user data.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213940)
2. [](http://seclists.org/fulldisclosure/2023/Oct/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7989, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7989 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7989
- **State**: REJECTED
- **Last Updated**: August 26, 2024 at 20:16 UTC
- **Reserved Date**: August 19, 2024 at 20:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15130
- **State**: PUBLISHED
- **Published Date**: August 07, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:59 UTC
- **Reserved Date**: August 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ThinkSAAS through 2018-07-25 has XSS via the index.php?app=group&ac=create&ts=do groupdesc parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/thinksaas/ThinkSAAS/issues/18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2587
- **State**: PUBLISHED
- **Published Date**: July 27, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Netpbm - netpbm**
Affected versions:
- 10.61 (Status: affected)
### References
1. [96702](http://www.securityfocus.com/bid/96702)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2587) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8747
- **State**: PUBLISHED
- **Published Date**: February 03, 2016 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: January 06, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The multifilesystem storage backend in Radicale before 1.1 allows remote attackers to read or write to arbitrary files via a crafted component name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160106 Re: CVE request for radicale](http://www.openwall.com/lists/oss-security/2016/01/06/7)
2. [80255](http://www.securityfocus.com/bid/80255)
3. [[oss-security] 20160105 CVE request for radicale](http://www.openwall.com/lists/oss-security/2016/01/05/7)
4. [](https://github.com/Unrud/Radicale/commit/bcaf452e516c02c9bed584a73736431c5e8831f1)
5. [](https://github.com/Kozea/Radicale/pull/343)
6. [DSA-3462](http://www.debian.org/security/2016/dsa-3462)
7. [FEDORA-2016-cf9e2429b5](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html)
8. [[oss-security] 20160106 Re: CVE request for radicale](http://www.openwall.com/lists/oss-security/2016/01/06/4)
9. [FEDORA-2016-f048c43393](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1896
- **State**: PUBLISHED
- **Published Date**: July 10, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21644047)
3. [SSRT101288](https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken)
4. [RHSA-2013:1209](http://rhn.redhat.com/errata/RHSA-2013-1209.html)
5. [oval:org.mitre.oval:def:18835](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835)
6. [](http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h)
7. [openSUSE-SU-2013:1340](http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html)
8. [oval:org.mitre.oval:def:19747](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747)
9. [](http://support.apple.com/kb/HT6150)
10. [RHSA-2013:1156](http://rhn.redhat.com/errata/RHSA-2013-1156.html)
11. [USN-1903-1](http://www.ubuntu.com/usn/USN-1903-1)
12. [HPSBUX02927](https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken)
13. [RHSA-2013:1207](http://rhn.redhat.com/errata/RHSA-2013-1207.html)
14. [61129](http://www.securityfocus.com/bid/61129)
15. [](http://www.apache.org/dist/httpd/Announcement2.2.html)
16. [RHSA-2013:1208](http://rhn.redhat.com/errata/RHSA-2013-1208.html)
17. [20130822 Apache HTTP Server MERGE Request Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896)
18. [](https://httpd.apache.org/security/vulnerabilities_24.html)
19. [openSUSE-SU-2013:1341](http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html)
20. [55032](http://secunia.com/advisories/55032)
21. [openSUSE-SU-2013:1337](http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html)
22. [[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E)
23. [[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E)
24. [[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E)
25. [[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E)
26. [[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E)
27. [[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E)
28. [[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E)
29. [[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E)
30. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E)
31. [[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E)
32. [[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E)
33. [[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E)
34. [[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E)
35. [[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E)
36. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E)
37. [[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E)
38. [[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E)
39. [[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E)
40. [[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54994
- **State**: PUBLISHED
- **Published Date**: January 10, 2025 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 16:30 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MonicaHQ v4.1.2 was discovered to contain multiple Client-Side Injection vulnerabilities via the first_name and last_name parameters in the Add a new relationship feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://monicahq.com)
2. [](https://github.com/p314dO/CVEs/tree/main/CVE-2024-54994) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33450
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 19:07 UTC
- **Last Updated**: March 25, 2025 at 17:45 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection in Finereport v.8.0 allows a remote attacker to obtain sensitive information
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/DKGIXL/1c8bddeb6c5f083ccc3a7bcecfe40398) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3221
- **State**: PUBLISHED
- **Published Date**: September 16, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:22 UTC
- **Reserved Date**: September 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Audio Lib Player (ALP) allows remote attackers to execute arbitrary code via a long URL in a .m3u playlist file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [audiolibplayer-m3u-bo(51873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51873)
2. [35867](http://secunia.com/advisories/35867)
3. [ADV-2009-1963](http://www.vupen.com/english/advisories/2009/1963)
4. [](http://packetstormsecurity.org/0907-exploits/alp-overflow.txt)
5. [56047](http://www.osvdb.org/56047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27483
- **State**: PUBLISHED
- **Published Date**: November 16, 2020 at 20:59 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0007.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6341
- **State**: PUBLISHED
- **Published Date**: February 27, 2009 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:24 UTC
- **Reserved Date**: February 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the SB Universal Plugin (SBuniplug) extension 2.0.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/teams/security/security-bulletins/typo3-20081222-4/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0389
- **State**: PUBLISHED
- **Published Date**: March 03, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 16:34 UTC
- **Reserved Date**: January 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Syndication (Safari RSS) in Mac OS X 10.4 through 10.4.5 allows remote attackers to execute arbitrary JavaScript via unspecified vectors involving RSS feeds.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [macosx-syndication-xss(25040)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25040)
2. [23649](http://www.osvdb.org/23649)
3. [19064](http://secunia.com/advisories/19064)
4. [16907](http://www.securityfocus.com/bid/16907)
5. [ADV-2006-0791](http://www.vupen.com/english/advisories/2006/0791)
6. [APPLE-SA-2006-03-01](http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html)
7. [TA06-062A](http://www.us-cert.gov/cas/techalerts/TA06-062A.html)
8. [](http://docs.info.apple.com/article.html?artnum=303382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0784
- **State**: PUBLISHED
- **Published Date**: February 19, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 02, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=790373)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=801114)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=766452)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=830943)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=799803)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=809295)
7. [USN-1729-1](http://www.ubuntu.com/usn/USN-1729-1)
8. [](http://www.mozilla.org/security/announce/2013/mfsa2013-21.html)
9. [USN-1729-2](http://www.ubuntu.com/usn/USN-1729-2)
10. [USN-1748-1](http://www.ubuntu.com/usn/USN-1748-1)
11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=810169)
12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=819635)
13. [openSUSE-SU-2013:0324](http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html)
14. [](https://bugzilla.mozilla.org/show_bug.cgi?id=827687)
15. [](https://bugzilla.mozilla.org/show_bug.cgi?id=805294)
16. [oval:org.mitre.oval:def:17119](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17119)
17. [](https://bugzilla.mozilla.org/show_bug.cgi?id=799907)
18. [openSUSE-SU-2013:0323](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html)
19. [](https://bugzilla.mozilla.org/show_bug.cgi?id=797977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25415
- **State**: PUBLISHED
- **Published Date**: June 11, 2021 at 14:33 UTC
- **Last Updated**: August 03, 2024 at 20:03 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Assuming EL1 is compromised, an improper address validation in RKP prior to SMR JUN-2021 Release 1 allows local attackers to remap EL2 memory as writable.
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Q(10.0), R(11.0) devices with Exynos9610, 9810, 9820, 9830 (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37372
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 19:26 UTC
- **Reserved Date**: August 02, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17809.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 9.3.361.0 (Status: affected)
### References
1. [](https://www.tracker-software.com/product/pdf-xchange-editor/history)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1100/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17035
- **State**: PUBLISHED
- **Published Date**: November 11, 2020 at 06:48 UTC
- **Last Updated**: September 10, 2024 at 15:51 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kernel Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17035) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0511
- **State**: PUBLISHED
- **Published Date**: January 26, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 12:19 UTC
- **Reserved Date**: January 25, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in phpXMLDOM (phpXD) 0.3 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) dom.php, (2) dtd.php, or (3) parser.php in include/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22201](http://www.securityfocus.com/bid/22201)
2. [32954](http://osvdb.org/32954)
3. [32955](http://osvdb.org/32955)
4. [23875](http://secunia.com/advisories/23875)
5. [ADV-2007-0309](http://www.vupen.com/english/advisories/2007/0309)
6. [phpxd-path-file-include(31726)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31726)
7. [3184](https://www.exploit-db.com/exploits/3184)
8. [32953](http://osvdb.org/32953) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5471
- **State**: PUBLISHED
- **Published Date**: October 24, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 19:48 UTC
- **Reserved Date**: October 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in example/lib/grid3.lib.php in Softerra PHP Developer Library 1.5.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the (1) cfg_dir and (2) lib_dir parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1017046](http://securitytracker.com/id?1017046)
2. [2511](https://www.exploit-db.com/exploits/2511)
3. [phplibrary-grid3-file-include(29437)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29437)
4. [20061010 PHPLibrary <= 1.5.3 Remote File Inclusion](http://marc.info/?l=bugtraq&m=116051953607495&w=2)
5. [20442](http://www.securityfocus.com/bid/20442) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-53132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-53132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-53132
- **State**: PUBLISHED
- **Published Date**: May 02, 2025 at 15:56 UTC
- **Last Updated**: May 04, 2025 at 07:50 UTC
- **Reserved Date**: May 02, 2025 at 15:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix mpi3mr_hba_port memory leak in mpi3mr_remove()
Free mpi3mr_hba_port at .remove.
### Affected Products
**Linux - Linux**
Affected versions:
- 42fc9fee116fc6a225a1f738adf86689d5c39d49 (Status: affected)
- 42fc9fee116fc6a225a1f738adf86689d5c39d49 (Status: affected)
- 42fc9fee116fc6a225a1f738adf86689d5c39d49 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1 (Status: affected)
- 0 (Status: unaffected)
- 6.1.21 (Status: unaffected)
- 6.2.8 (Status: unaffected)
- 6.3 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f28bdab9e208792212c52b0c232a13bba84cf048)
2. [](https://git.kernel.org/stable/c/6322569273071745f2dd0c541b154b9666ae7767)
3. [](https://git.kernel.org/stable/c/d0f3c3728da8af76dfe435f7f0cfa2b9d9e43ef0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15008
- **State**: PUBLISHED
- **Published Date**: July 07, 2020 at 19:39 UTC
- **Last Updated**: August 04, 2024 at 13:00 UTC
- **Reserved Date**: June 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://slagle.tech/2020/07/06/cve-2020-15008/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2121
- **State**: PUBLISHED
- **Published Date**: May 17, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 04, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations on devices.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50732](http://secunia.com/advisories/50732)
2. [RHSA-2012:0743](http://rhn.redhat.com/errata/RHSA-2012-0743.html)
3. [1027083](http://www.securitytracker.com/id?1027083)
4. [[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak](http://www.openwall.com/lists/oss-security/2012/04/19/16)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=814149)
6. [](https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195)
7. [USN-1577-1](http://www.ubuntu.com/usn/USN-1577-1)
8. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4)
9. [USN-2036-1](http://www.ubuntu.com/usn/USN-2036-1)
10. [USN-2037-1](http://www.ubuntu.com/usn/USN-2037-1)
11. [RHSA-2012:0676](http://rhn.redhat.com/errata/RHSA-2012-0676.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3163
- **State**: PUBLISHED
- **Published Date**: September 12, 2024 at 06:00 UTC
- **Last Updated**: September 12, 2024 at 14:16 UTC
- **Reserved Date**: April 01, 2024 at 21:03 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Easy Property Listings WordPress plugin before 3.5.4 does not have CSRF check when deleting contacts in bulk, which could allow attackers to make a logged in admin delete them via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Easy Property Listings**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/f89c8654-5486-4939-880d-101f33d359c0/)
### Credits
- Bob Matyas
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7041
- **State**: PUBLISHED
- **Published Date**: May 08, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 17:53 UTC
- **Reserved Date**: December 09, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20141209 CVE request: pam: password hashes aren't compared case-sensitively](http://www.openwall.com/lists/oss-security/2013/12/09/5)
2. [64180](http://www.securityfocus.com/bid/64180)
3. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731368)
4. [[oss-security] 20141209 Re: CVE request: pam: password hashes aren't compared case-sensitively](http://www.openwall.com/lists/oss-security/2013/12/09/16)
5. [GLSA-201605-05](https://security.gentoo.org/glsa/201605-05)
6. [USN-2935-2](http://www.ubuntu.com/usn/USN-2935-2)
7. [USN-2935-3](http://www.ubuntu.com/usn/USN-2935-3)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=1038555)
9. [USN-2935-1](http://www.ubuntu.com/usn/USN-2935-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6572
- **State**: PUBLISHED
- **Published Date**: May 14, 2019 at 19:54 UTC
- **Last Updated**: August 04, 2024 at 20:23 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The affected device offered SNMP read and write capacities with a publicly know hardcoded community string. The security vulnerability could be exploited by an attacker with network access to the affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Siemens AG - SIMATIC HMI Comfort Panels 4" - 22"**
Affected versions:
- All versions < V15.1 Update 1 (Status: affected)
**Siemens AG - SIMATIC HMI Comfort Outdoor Panels 7" & 15"**
Affected versions:
- All versions < V15.1 Update 1 (Status: affected)
**Siemens AG - SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F**
Affected versions:
- All versions < V15.1 Update 1 (Status: affected)
**Siemens AG - SIMATIC WinCC Runtime Advanced**
Affected versions:
- All versions < V15.1 Update 1 (Status: affected)
**Siemens AG - SIMATIC WinCC Runtime Professional**
Affected versions:
- All versions < V15.1 Update 1 (Status: affected)
**Siemens AG - SIMATIC WinCC (TIA Portal)**
Affected versions:
- All versions < V15.1 Update 1 (Status: affected)
**Siemens AG - SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf)
2. [108412](http://www.securityfocus.com/bid/108412)
3. [](https://www.us-cert.gov/ics/advisories/ICSA-19-134-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27428
- **State**: PUBLISHED
- **Published Date**: March 23, 2022 at 19:46 UTC
- **Last Updated**: April 16, 2025 at 16:40 UTC
- **Reserved Date**: February 19, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**GE - UR family**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02)
2. [](https://www.gegridsolutions.com/Passport/Login.aspx)
### Credits
- SCADA-X, DOE’s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10663, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10663
- **State**: PUBLISHED
- **Published Date**: March 30, 2019 at 16:43 UTC
- **Last Updated**: August 04, 2024 at 22:32 UTC
- **Reserved Date**: March 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to conduct SQL injection attacks via the sord parameter in a listCodeblueGroup API call to the /cgi? URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32170
- **State**: PUBLISHED
- **Published Date**: September 28, 2022 at 09:30 UTC
- **Last Updated**: May 21, 2025 at 14:05 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: Mend
### Vulnerability Description
The “Bytebase” application does not restrict low privilege user to access admin “projects“ for which an unauthorized user can view the “projects“ created by “Admin” and the affected endpoint is “/api/project?user=${userId}”.
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**bytebase - bytebase**
Affected versions:
- 0.1.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.mend.io/vulnerability-database/CVE-2022-32170)
2. [](https://github.com/bytebase/bytebase/blob/1.0.4/frontend/src/store/modules/project.ts#L166-L197)
### Credits
- Mend Vulnerability Research Team (MVR) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20784
- **State**: PUBLISHED
- **Published Date**: February 22, 2019 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: February 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0)
2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0)
3. [](https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2)
4. [RHSA-2019:1959](https://access.redhat.com/errata/RHSA-2019:1959)
5. [RHSA-2019:1971](https://access.redhat.com/errata/RHSA-2019:1971)
6. [USN-4115-1](https://usn.ubuntu.com/4115-1/)
7. [USN-4118-1](https://usn.ubuntu.com/4118-1/)
8. [USN-4211-2](https://usn.ubuntu.com/4211-2/)
9. [USN-4211-1](https://usn.ubuntu.com/4211-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20617
- **State**: PUBLISHED
- **Published Date**: January 14, 2021 at 08:20 UTC
- **Last Updated**: August 03, 2024 at 17:45 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
### Affected Products
**Seeds Co.,Ltd. - acmailer and acmailer DB**
Affected versions:
- acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier (Status: affected)
### References
1. [](https://www.acmailer.jp/info/de.cgi?id=101)
2. [](https://jvn.jp/en/jp/JVN35906450/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5586
- **State**: PUBLISHED
- **Published Date**: September 25, 2013 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 17:15 UTC
- **Reserved Date**: August 23, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in wikka.php in WikkaWiki before 1.3.4-p1 allows remote attackers to inject arbitrary web script or HTML via the wakka parameter to sql/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wush.net/trac/wikka/ticket/1152)
2. [wikkawiki-cve20135586-xss(87013)](https://exchange.xforce.ibmcloud.com/vulnerabilities/87013)
3. [](https://wush.net/trac/wikka/changeset/1896)
4. [](http://packetstormsecurity.com/files/123196)
5. [](https://wush.net/trac/wikka/changeset/1900)
6. [20130911 Cross-Site Scripting (XSS) in WikkaWiki](http://seclists.org/bugtraq/2013/Sep/47)
7. [](http://docs.wikkawiki.org/WhatsNew134)
8. [20130911 Cross-Site Scripting (XSS) in WikkaWiki](http://archives.neohapsis.com/archives/bugtraq/2013-09/0048.html)
9. [97183](http://osvdb.org/97183)
10. [62325](http://www.securityfocus.com/bid/62325)
11. [54790](http://secunia.com/advisories/54790)
12. [](https://www.htbridge.com/advisory/HTB23170)
13. [](https://wush.net/trac/wikka/ticket/1153) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0673
- **State**: PUBLISHED
- **Published Date**: February 13, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in cms/index.php in Magic Calendar Lite 1.02, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) $total_login and (2) $total_password parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [459](http://securityreason.com/securityalert/459)
2. [ADV-2006-0525](http://www.vupen.com/english/advisories/2006/0525)
3. [](http://evuln.com/vulns/71/summary.html)
4. [16646](http://www.securityfocus.com/bid/16646)
5. [1015650](http://securitytracker.com/id?1015650)
6. [18855](http://secunia.com/advisories/18855)
7. [16734](http://www.securityfocus.com/bid/16734)
8. [20060220 [eVuln] Magic Calendar Lite Authentication Bypass](http://www.securityfocus.com/archive/1/425491/100/0/threaded)
9. [magiccalendar-index-sql-injection(24588)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50484
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 07:56 UTC
- **Last Updated**: October 29, 2024 at 18:17 UTC
- **Reserved Date**: October 24, 2024 at 07:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in mahlamusa Multi Purpose Mail Form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through 1.0.2.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**mahlamusa - Multi Purpose Mail Form**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/multi-purpose-mail-form/wordpress-multi-purpose-mail-form-plugin-1-0-2-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37940
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 13:44 UTC
- **Last Updated**: August 02, 2024 at 04:04 UTC
- **Reserved Date**: June 10, 2024 at 21:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Seraphinite Solutions Seraphinite Accelerator (Full, premium).This issue affects Seraphinite Accelerator (Full, premium): from n/a through 2.21.13.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Seraphinite Solutions - Seraphinite Accelerator (Full, premium)**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/seraphinite-accelerator-ext/wordpress-seraphinite-accelerator-full-premium-plugin-2-21-13-csrf-leading-to-arbitrary-file-deletion-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5713
- **State**: PUBLISHED
- **Published Date**: October 30, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Off-by-one error in the GeoIP module in the AMX Mod X 1.76d plugin for Half-Life Server might allow attackers to execute arbitrary code or cause a denial of service via unspecified input related to geolocation, which triggers an error message from the (1) geoip_code2 or (2) geoip_code3 function, leading to a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [41980](http://osvdb.org/41980)
2. [](http://bugs.alliedmods.net/?do=details&task_id=519)
3. [26218](http://www.securityfocus.com/bid/26218)
4. [](http://wiki.alliedmods.net/AMX_Mod_X_1.8.0_Changes)
5. [27411](http://secunia.com/advisories/27411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6361
- **State**: PUBLISHED
- **Published Date**: August 05, 2024 at 18:22 UTC
- **Last Updated**: November 01, 2024 at 17:44 UTC
- **Reserved Date**: June 26, 2024 at 20:35 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Improper Neutralization vulnerability (XSS) has been discovered in OpenText™ ALM Octane. The vulnerability affects all version prior to version 23.4. The vulnerability could cause remote code execution attack.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**OpenText™ - ALM Octane.**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://portal.microfocus.com/s/article/KM000032605?language=en_US)
### Credits
- Vaibhav Kumar Srivastava (Esecforte Technologies Pvt. Ltd.) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2243
- **State**: PUBLISHED
- **Published Date**: July 26, 2013 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 22:50 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
mod/lesson/pagetypes/matching.php in Moodle through 2.2.11, 2.3.x before 2.3.8, 2.4.x before 2.4.5, and 2.5.x before 2.5.1 allows remote authenticated users to obtain sensitive answer information by reading the HTML source code of a document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://moodle.org/mod/forum/discuss.php?d=232500)
2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39546) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3770
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 20:30 UTC
- **Last Updated**: September 17, 2024 at 02:02 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Wyse Management Suite versions prior to 1.4.1 contain a stored cross-site scripting vulnerability when unregistering a device. A remote authenticated malicious user with low privileges could exploit this vulnerability to store malicious HTML or JavaScript code. When victim users access the submitted data through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Dell - Wyse Management Suite**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/article/SLN319512) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48385
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:21 UTC
- **Last Updated**: January 28, 2025 at 17:13 UTC
- **Reserved Date**: March 13, 2023 at 02:25 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In cp_dump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3201
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 06:00 UTC
- **Last Updated**: May 16, 2025 at 17:29 UTC
- **Reserved Date**: April 03, 2025 at 12:46 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Contact Form builder with drag & drop for WordPress WordPress plugin before 2.4.3 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Contact Form builder with drag & drop for WordPress**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/4248289f-36d2-41c5-baf6-bb2c630482ef/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6610
- **State**: PUBLISHED
- **Published Date**: February 05, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 06:10 UTC
- **Reserved Date**: February 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Information Leakage exists in the jLike 1.0 component for Joomla! via a task=getUserByCommentId request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43977](https://www.exploit-db.com/exploits/43977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10399
- **State**: PUBLISHED
- **Published Date**: September 12, 2019 at 13:55 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.
### Affected Products
**Jenkins project - Jenkins Script Security Plugin**
Affected versions:
- 1.62 and earlier (Status: affected)
### References
1. [[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/09/12/2)
2. [](https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0988
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0889, CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5994
- **State**: PUBLISHED
- **Published Date**: January 28, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [checkpoint-connectra-index-xss(45385)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45385)
2. [31553](http://secunia.com/advisories/31553)
3. [31369](http://www.securityfocus.com/bid/31369) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15461
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 16:27 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Samsung J7 Neo Android device with a build fingerprint of samsung/j7velteub/j7velte:8.1.0/M1AJQ/J701MUBS6BSB4:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kryptowire.com/android-firmware-2019/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3499
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:52 UTC
- **Last Updated**: August 01, 2024 at 20:12 UTC
- **Reserved Date**: April 09, 2024 at 01:15 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.0 via the generate_navigation_markup function of the Onepage Scroll module. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**xpeedstudio - ElementsKit Elementor addons and Templates Library**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6158ec37-a6fb-42f9-bab6-bf547ea28ea0?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3070789/elementskit-lite)
### Credits
- Craig Smith |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4162
- **State**: PUBLISHED
- **Published Date**: March 10, 2020 at 11:55 UTC
- **Last Updated**: September 16, 2024 at 20:57 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 11.5 and 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174342.
### Affected Products
**IBM - InfoSphere Information Server**
Affected versions:
- 11.5 (Status: affected)
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/5690451)
2. [ibm-infosphere-cve20204162-xss (174342)](https://exchange.xforce.ibmcloud.com/vulnerabilities/174342) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0040
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 12:47 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The scripting engine in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." This vulnerability is different from that described in CVE-2017-0130.
### Affected Products
**Microsoft Corporation - Internet Explorer**
Affected versions:
- The scripting engine in Microsoft Internet Explorer 9 through 11 (Status: affected)
### References
1. [](http://www.security-assessment.com/files/documents/advisory/reversesegment.pdf)
2. [96094](http://www.securityfocus.com/bid/96094)
3. [1038008](http://www.securitytracker.com/id/1038008)
4. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1002
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:06 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In WT_Interpolate of eas_wtengine.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-194533433
### Affected Products
**n/a - Android**
Affected versions:
- Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7902
- **State**: PUBLISHED
- **Published Date**: May 24, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei 1288H V5 and 288H V5 with software of V100R005C00 have a JSON injection vulnerability. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Due to insufficient verification of the input, this could be exploited to obtain the management privilege of the system.
### Affected Products
**Huawei Technologies Co., Ltd. - 1288H V5; 2288H V5**
Affected versions:
- V100R005C00 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180523-01-json-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41304
- **State**: PUBLISHED
- **Published Date**: October 26, 2021 at 04:15 UTC
- **Last Updated**: October 10, 2024 at 16:06 UTC
- **Reserved Date**: September 16, 2021 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /secure/admin/ImporterFinishedPage.jspa error message. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.2.
### Affected Products
**Atlassian - Jira Server**
Affected versions:
- unspecified (Status: affected)
- 8.14.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Jira Data Center**
Affected versions:
- unspecified (Status: affected)
- 8.14.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-72939) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2862
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 22:31 UTC
- **Last Updated**: October 01, 2024 at 16:35 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle GraalVM Enterprise Edition component of Oracle GraalVM (subcomponent: Java). The supported version that is affected is 19.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H).
### Affected Products
**Oracle Corporation - GraalVM Enterprise Edition**
Affected versions:
- 19.0.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23938
- **State**: REJECTED
- **Last Updated**: February 21, 2023 at 00:00 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: hillstone
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37623
- **State**: PUBLISHED
- **Published Date**: July 26, 2023 at 00:00 UTC
- **Last Updated**: October 23, 2024 at 15:44 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netdisco before v2.063000 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Web/TypeAhead.pm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/benjaminpsinclair/Netdisco-CVE)
2. [](https://github.com/netdisco/netdisco/commit/9f4401f2fb00c84210cd551b97c8ad60e78c71e0)
3. [](https://github.com/netdisco/netdisco/commit/39562e0633a2472d50f7f33e69c36da4ad1fbfa3)
4. [](https://github.com/benjaminpsinclair/Netdisco-2023-Advisory) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31197
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 13:59 UTC
- **Last Updated**: September 18, 2024 at 15:25 UTC
- **Reserved Date**: March 29, 2024 at 08:24 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
Improper Null Termination vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of10::Port:unpack.
This issue affects libfluid: 0.1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-170: Security Weakness
### Affected Products
**Open Networking Foundation (ONF) - libfluid**
Affected versions:
- 0.1.0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31197) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25144
- **State**: PUBLISHED
- **Published Date**: September 25, 2020 at 17:38 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: September 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /apps/?app=../ URIs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/ahpaleus/f2843deea7f90e5b371e5c0370fb7775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4686
- **State**: PUBLISHED
- **Published Date**: October 22, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in ty.c in the TY demux plugin (aka the TiVo demuxer) in VideoLAN VLC media player, probably 0.9.4, might allow remote attackers to execute arbitrary code via a crafted .ty file, a different vulnerability than CVE-2008-4654.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20081022 Re: CVE id request: vlc](http://www.openwall.com/lists/oss-security/2008/10/22/6)
2. [oval:org.mitre.oval:def:14630](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630)
3. [](http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d859e6b9537af2d7326276f70de25a840f554dc3)
4. [[oss-security] 20081019 CVE id request: vlc](http://www.openwall.com/lists/oss-security/2008/10/19/2)
5. [31867](http://www.securityfocus.com/bid/31867) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21905
- **State**: PUBLISHED
- **Published Date**: December 22, 2021 at 18:06 UTC
- **Last Updated**: August 03, 2024 at 18:30 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. After a client successfully authenticates, they can send plaintext commands to manipulate the device.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**n/a - Garrett Metal Detectors**
Affected versions:
- Garrett Metal Detectors iC Module CMA Version 5.0 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8425
- **State**: PUBLISHED
- **Published Date**: November 28, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 22, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-14-387/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27179
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 04:21 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
konzept-ix publiXone before 2020.015 allows attackers to take over arbitrary user accounts by crafting password-reset tokens.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://seclists.org/fulldisclosure/2020/Oct/28)
2. [](https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10332
- **State**: REJECTED
- **Published Date**: January 22, 2021 at 20:09 UTC
- **Last Updated**: January 22, 2021 at 20:09 UTC
- **Reserved Date**: April 24, 2018 at 00:00 UTC
- **Assigned By**: hillstone
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7785
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 12, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2017-19/)
2. [](https://www.mozilla.org/security/advisories/mfsa2017-20/)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1356985)
4. [DSA-3968](https://www.debian.org/security/2017/dsa-3968)
5. [](https://www.mozilla.org/security/advisories/mfsa2017-18/)
6. [RHSA-2017:2456](https://access.redhat.com/errata/RHSA-2017:2456)
7. [RHSA-2017:2534](https://access.redhat.com/errata/RHSA-2017:2534)
8. [100206](http://www.securityfocus.com/bid/100206)
9. [1039124](http://www.securitytracker.com/id/1039124)
10. [GLSA-201803-14](https://security.gentoo.org/glsa/201803-14)
11. [DSA-3928](https://www.debian.org/security/2017/dsa-3928) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3143
- **State**: PUBLISHED
- **Published Date**: August 01, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 09:28 UTC
- **Reserved Date**: July 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080813 rPSA-2008-0243-1 idle python](http://www.securityfocus.com/archive/1/495445/100/0/threaded)
2. [SUSE-SR:2008:017](http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html)
3. [ADV-2008-2288](http://www.vupen.com/english/advisories/2008/2288)
4. [32793](http://secunia.com/advisories/32793)
5. [30491](http://www.securityfocus.com/bid/30491)
6. [](http://svn.python.org/view?rev=60793&view=rev)
7. [37471](http://secunia.com/advisories/37471)
8. [31687](http://secunia.com/advisories/31687)
9. [](http://www.python.org/download/releases/2.5.2/NEWS.txt)
10. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html)
11. [GLSA-200807-16](http://security.gentoo.org/glsa/glsa-200807-16.xml)
12. [31332](http://secunia.com/advisories/31332)
13. [USN-632-1](http://www.ubuntu.com/usn/usn-632-1)
14. [](http://bugs.gentoo.org/show_bug.cgi?id=232137)
15. [MDVSA-2008:164](http://www.mandriva.com/security/advisories?name=MDVSA-2008:164)
16. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded)
17. [31518](http://secunia.com/advisories/31518)
18. [](http://www.python.org/download/releases/2.6/NEWS.txt)
19. [oval:org.mitre.oval:def:7720](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7720)
20. [oval:org.mitre.oval:def:8996](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8996)
21. [31365](http://secunia.com/advisories/31365)
22. [](http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900)
23. [31473](http://secunia.com/advisories/31473)
24. [](http://wiki.rpath.com/Advisories:rPSA-2008-0243)
25. [DSA-1667](http://www.debian.org/security/2008/dsa-1667)
26. [MDVSA-2008:163](http://www.mandriva.com/security/advisories?name=MDVSA-2008:163)
27. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43339
- **State**: PUBLISHED
- **Published Date**: November 03, 2021 at 19:38 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Ericsson Network Location before 2021-07-31, it is possible for an authenticated attacker to inject commands via file_name in the export functionality. For example, a new admin user could be created.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/50469)
2. [](https://pentest.com.tr/blog/RCE-via-Meow-Variant-along-with-an-Example-0day-PacketHackingVillage-Defcon29.html)
3. [](https://www.exploit-db.com/exploits/50468) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1961
- **State**: PUBLISHED
- **Published Date**: April 21, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24813](http://www.osvdb.org/24813)
2. [ADV-2006-1435](http://www.vupen.com/english/advisories/2006/1435)
3. [17609](http://www.securityfocus.com/bid/17609)
4. [](http://www.assurance.com.au/advisories/200604-cisco.txt)
5. [cisco-wlse-shell-privilege-escalation(25884)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25884)
6. [20060419 Multiple vulnerabilities in Linux based Cisco products](http://www.securityfocus.com/archive/1/431371/30/5490/threaded)
7. [19736](http://secunia.com/advisories/19736)
8. [20060419 Re: Multiple vulnerabilities in Linux based Cisco products](http://www.securityfocus.com/archive/1/431367/30/5490/threaded)
9. [19739](http://secunia.com/advisories/19739)
10. [ADV-2006-1434](http://www.vupen.com/english/advisories/2006/1434)
11. [20060419 Multiple Vulnerabilities in the WLSE Appliance](http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml)
12. [19741](http://secunia.com/advisories/19741)
13. [20060419 Response to Privilege Escalation on Multiple Cisco Products](http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml)
14. [1015965](http://securitytracker.com/id?1015965) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1057
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 12:55 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 23, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Pricing Deals for WooCommerce WordPress plugin through 2.0.2.02 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - Pricing Deals for WooCommerce**
Affected versions:
- 2.0.2.02 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243)
### Credits
- wuzhenyu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5175
- **State**: PUBLISHED
- **Published Date**: June 07, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Application plugins in Apache CXF Fediz before 1.1.3 and 1.2.x before 1.2.1 allow remote attackers to cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[cxf-dev] 20150826 New security vulnerability for Apache CXF Fediz - CVE-2015-5175](https://mail-archives.apache.org/mod_mbox/cxf-dev/201508.mbox/%3CCAB8XdGAx=VL_uepDSecE2h8ggTD4kpagXnyfegVjt7Axi_Ossw%40mail.gmail.com%3E)
2. [[oss-security] 20150826 New security vulnerability for Apache CXF Fediz - CVE-2015-5175](http://www.openwall.com/lists/oss-security/2015/08/26/3)
3. [](https://cxf.apache.org/security-advisories.data/CVE-2015-5175.txt.asc?version=1&modificationDate=1440598018000&api=v2)
4. [76486](http://www.securityfocus.com/bid/76486)
5. [](https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git%3Ba=commit%3Bh=f65c961ea31e3c1851daba8e7e49fc37bbf77b19)
6. [[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E)
7. [[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html](https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E)
8. [[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E)
9. [[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E)
10. [[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E)
11. [[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0418
- **State**: PUBLISHED
- **Published Date**: May 24, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
content.pl script in NCM Content Management System allows remote attackers to read arbitrary contents of the content database by inserting SQL characters into the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010413 Exploitable NCM.at - Content Management System](http://archives.neohapsis.com/archives/bugtraq/2001-04/0223.html)
2. [2584](http://www.securityfocus.com/bid/2584) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1332
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-308](http://www.debian.org/security/2003/dsa-308)
2. [7845](http://www.securityfocus.com/bid/7845)
3. [gzip-gzexe-tmp-symlink(7241)](http://www.iss.net/security_center/static/7241.php)
4. [](http://www.redhat.com/support/errata/rh50-errata-general.html#gzip)
5. [19980128 GZEXE - the big problem](http://marc.info/?l=bugtraq&m=88603844115233&w=2)
6. [3812](http://www.osvdb.org/3812) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27512
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 14:46 UTC
- **Last Updated**: March 17, 2025 at 15:01 UTC
- **Reserved Date**: February 26, 2025 at 18:11 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Zincati is an auto-update agent for Fedora CoreOS hosts. Zincati ships a polkit rule which allows the `zincati` system user to use the actions `org.projectatomic.rpmostree1.deploy` to deploy updates to the system and `org.projectatomic.rpmostree1.finalize-deployment` to reboot the system into the deployed update. Since Zincati v0.0.24, this polkit rule contains a logic error which broadens access of those polkit actions to any unprivileged user rather than just the `zincati` system user. In practice, this means that any unprivileged user with access to the system D-Bus socket is able to deploy older Fedora CoreOS versions (which may have other known vulnerabilities). Note that rpm-ostree enforces that the selected version must be from the same branch the system is currently on so this cannot directly be used to deploy an attacker-controlled update payload. This primarily impacts users running untrusted workloads with access to the system D-Bus socket. Note that in general, untrusted workloads should not be given this access, whether containerized or not. By default, containers do not have access to the system D-Bus socket. The logic error is fixed in Zincati v0.0.30. A workaround is to manually add a following polkit rule, instructions for which are available in the GitHub Security Advisory.
### Weakness Classification (CWE)
- CWE-783: OS Command Injection
- CWE-863: Incorrect Authorization
### Affected Products
**coreos - zincati**
Affected versions:
- >= 0.0.24, < 0.0.30 (Status: affected)
### References
1. [https://github.com/coreos/zincati/security/advisories/GHSA-w6fv-6gcc-x825](https://github.com/coreos/zincati/security/advisories/GHSA-w6fv-6gcc-x825)
2. [https://github.com/coreos/zincati/commit/01d8e89f799e6ba21bdf7dc668abce23bd0d8f78](https://github.com/coreos/zincati/commit/01d8e89f799e6ba21bdf7dc668abce23bd0d8f78)
3. [https://github.com/coreos/zincati/commit/28a43aa2c1edda091ba659677d73c13e6e3ea99d](https://github.com/coreos/zincati/commit/28a43aa2c1edda091ba659677d73c13e6e3ea99d)
4. [https://github.com/coreos/zincati/releases/tag/v0.0.24](https://github.com/coreos/zincati/releases/tag/v0.0.24)
5. [https://github.com/coreos/zincati/releases/tag/v0.0.30](https://github.com/coreos/zincati/releases/tag/v0.0.30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0015
- **State**: PUBLISHED
- **Published Date**: February 02, 2014 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56912](http://secunia.com/advisories/56912)
2. [](http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095862)
3. [SSA:2014-044-01](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.502652)
4. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
5. [](http://support.apple.com/kb/HT6296)
6. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
7. [1029710](http://www.securitytracker.com/id/1029710)
8. [FEDORA-2014-1876](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127627.html)
9. [openSUSE-SU-2014:0274](http://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html)
10. [APPLE-SA-2014-06-30-2](http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html)
11. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
12. [65270](http://www.securityfocus.com/bid/65270)
13. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
14. [DSA-2849](http://www.debian.org/security/2014/dsa-2849)
15. [59458](http://secunia.com/advisories/59458)
16. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
17. [56728](http://secunia.com/advisories/56728)
18. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743)
19. [](http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html)
20. [FEDORA-2014-1864](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128408.html)
21. [59475](http://secunia.com/advisories/59475)
22. [](http://curl.haxx.se/docs/adv_20140129.html)
23. [USN-2097-1](http://www.ubuntu.com/usn/USN-2097-1)
24. [56734](http://secunia.com/advisories/56734)
25. [56731](http://secunia.com/advisories/56731) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18702
- **State**: PUBLISHED
- **Published Date**: October 27, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 11:16 UTC
- **Reserved Date**: October 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
spider.admincp.php in iCMS v7.0.11 allows SQL injection via admincp.php?app=spider&do=import_rule because the upfile content is base64 decoded, deserialized, and used for database insertion.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/idreamsoft/iCMS/issues/42) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3909
- **State**: PUBLISHED
- **Published Date**: November 30, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: November 30, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in merchants/index.php in Post Affiliate Pro 2.0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the sortorder parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2629](http://www.vupen.com/english/advisories/2005/2629)
2. [](http://pridels0.blogspot.com/2005/11/post-affiliate-pro-20x-vuln.html)
3. [21172](http://www.osvdb.org/21172)
4. [17751](http://secunia.com/advisories/17751)
5. [15633](http://www.securityfocus.com/bid/15633)
6. [postaffiliatepro-sortorder-sql-injection(23260)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23260) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43752
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 22:04 UTC
- **Last Updated**: December 11, 2024 at 16:12 UTC
- **Reserved Date**: August 15, 2024 at 17:12 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0280
- **State**: PUBLISHED
- **Published Date**: April 26, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:14 UTC
- **Reserved Date**: April 26, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the RealNetworks RealPlayer client versions 6 and 7 allows remote attackers to cause a denial of service via a long Location URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000403 Win32 RealPlayer 6/7 Buffer Overflow](http://archives.neohapsis.com/archives/bugtraq/2000-04/0018.html)
2. [1088](http://www.securityfocus.com/bid/1088) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34204
- **State**: PUBLISHED
- **Published Date**: June 16, 2021 at 19:55 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://d-link.com)
2. [](https://www.dlink.com/en/security-bulletin/)
3. [](http://dir-2640-us.com)
4. [](https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8470
- **State**: PUBLISHED
- **Published Date**: June 15, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8471, CVE-2017-8472, CVE-2017-8473, CVE-2017-8475, CVE-2017-8477, and CVE-2017-8484.
### Affected Products
**Microsoft Corporation - Microsoft Windows**
Affected versions:
- Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016. (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8470)
2. [98848](http://www.securityfocus.com/bid/98848)
3. [42223](https://www.exploit-db.com/exploits/42223/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.