System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35045
- **State**: PUBLISHED
- **Published Date**: June 22, 2021 at 13:21 UTC
- **Last Updated**: August 04, 2024 at 00:33 UTC
- **Reserved Date**: June 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross site scripting (XSS) vulnerability in Ice Hrm 29.0.0.OS, allows attackers to execute arbitrary code via the parameters to the /app/ endpoint.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xoffense/POC/blob/main/Account%20takeover%20%28Chaining%20session%20fixation%20%2B%20reflected%20Cross%20Site%20Scripting%29%20in%20ICE%20Hrm%20Version%2029.0.0.OS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9631
- **State**: PUBLISHED
- **Published Date**: July 07, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 14, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Null Pointer Dereference issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The null pointer dereference vulnerability could allow an attacker to crash the logger process, causing a denial of service for logging and log-viewing (applications that use the Wonderware ArchestrA Logger continue to run when the Wonderware ArchestrA Logger service is unavailable).
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**n/a - Schneider Electric Wonderware ArchestrA Logger**
Affected versions:
- Schneider Electric Wonderware ArchestrA Logger (Status: affected)
### References
1. [99488](http://www.securityfocus.com/bid/99488)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-187-04)
3. [](http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000116/)
4. [1038836](http://www.securitytracker.com/id/1038836) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6591
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2015:0503](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html)
2. [DSA-3144](http://www.debian.org/security/2015/dsa-3144)
3. [RHSA-2015:0136](http://rhn.redhat.com/errata/RHSA-2015-0136.html)
4. [RHSA-2015:0079](http://rhn.redhat.com/errata/RHSA-2015-0079.html)
5. [](http://www.vmware.com/security/advisories/VMSA-2015-0003.html)
6. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
7. [RHSA-2015:0264](http://rhn.redhat.com/errata/RHSA-2015-0264.html)
8. [USN-2487-1](http://www.ubuntu.com/usn/USN-2487-1)
9. [72175](http://www.securityfocus.com/bid/72175)
10. [RHSA-2015:0085](http://rhn.redhat.com/errata/RHSA-2015-0085.html)
11. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
12. [RHSA-2015:0086](http://rhn.redhat.com/errata/RHSA-2015-0086.html)
13. [GLSA-201603-14](https://security.gentoo.org/glsa/201603-14)
14. [SUSE-SU-2015:0336](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html)
15. [RHSA-2015:0080](http://rhn.redhat.com/errata/RHSA-2015-0080.html)
16. [](https://www-304.ibm.com/support/docview.wss?uid=swg21695474)
17. [RHSA-2015:0068](http://rhn.redhat.com/errata/RHSA-2015-0068.html)
18. [USN-2486-1](http://www.ubuntu.com/usn/USN-2486-1)
19. [GLSA-201507-14](https://security.gentoo.org/glsa/201507-14)
20. [SSRT101951](http://marc.info/?l=bugtraq&m=142496355704097&w=2)
21. [HPSBUX03281](http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581)
22. [SSRT101968](http://marc.info/?l=bugtraq&m=142607790919348&w=2)
23. [openSUSE-SU-2015:0190](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html)
24. [HPSBUX03273](http://marc.info/?l=bugtraq&m=142496355704097&w=2)
25. [1031580](http://www.securitytracker.com/id/1031580)
26. [DSA-3147](http://www.debian.org/security/2015/dsa-3147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13099
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 17:08 UTC
- **Reserved Date**: August 22, 2017 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT."
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
### Affected Products
**wolfSSL - wolfSSL**
Affected versions:
- <3.12.2 (Status: affected)
### References
1. [102174](http://www.securityfocus.com/bid/102174)
2. [](https://robotattack.org/)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf)
4. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt)
5. [VU#144389](http://www.kb.cert.org/vuls/id/144389)
6. [](https://github.com/wolfSSL/wolfssl/pull/1229) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3269
- **State**: PUBLISHED
- **Published Date**: May 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The SNMP module in Cisco IOS XE 3.5E allows remote authenticated users to cause a denial of service (device reload) by polling frequently, aka Bug ID CSCug65204.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140516 Cisco IOS XE Software SNMP Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3269)
2. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=34268) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16761
- **State**: PUBLISHED
- **Published Date**: November 10, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Open Redirect vulnerability in Inedo BuildMaster before 5.8.2 allows remote attackers to redirect users to arbitrary web sites.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://inedo.com/blog/buildmaster-582-released)
2. [](https://inedo.com/buildmaster/versions#v5.8)
3. [](https://inedo.myjetbrains.com/youtrack/issue/BM-3101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6309
- **State**: PUBLISHED
- **Published Date**: October 02, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Email Security Appliance (ESA) 8.5.6-106 and 9.6.0-042 allows remote authenticated users to cause a denial of service (file-descriptor consumption and device reload) via crafted HTTP requests, aka Bug ID CSCuw32211.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150930 Cisco Email Security Appliance Max Files Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=41241)
2. [1033716](http://www.securitytracker.com/id/1033716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0173
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FormMail CGI program can be used by web servers other than the host server that the program resides on.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5376
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 09:44 UTC
- **Last Updated**: February 13, 2025 at 17:20 UTC
- **Reserved Date**: October 04, 2023 at 09:30 UTC
- **Assigned By**: CyberDanube
### Vulnerability Description
An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Korenix - JetNet Series**
Affected versions:
- firmware older than 2024/01 (Status: affected)
### References
1. [](https://www.beijerelectronics.com/en/support/Help___online?docId=69947)
2. [](https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/)
3. [](http://seclists.org/fulldisclosure/2024/Jan/11)
4. [](http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html)
### Credits
- S. Dietz (CyberDanube) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26753
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 14:17 UTC
- **Last Updated**: February 25, 2025 at 19:21 UTC
- **Reserved Date**: February 14, 2025 at 06:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper VideoWhisper Live Streaming Integration allows Path Traversal. This issue affects VideoWhisper Live Streaming Integration: from n/a through 6.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**videowhisper - VideoWhisper Live Streaming Integration**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/videowhisper-live-streaming-integration/vulnerability/wordpress-videowhisper-live-streaming-integration-plugin-6-2-arbitrary-file-download-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1254
- **State**: PUBLISHED
- **Published Date**: February 27, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple Type Services (ATS) in Apple OS X before 10.9.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Type 1 font that is embedded in a document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0216
- **State**: PUBLISHED
- **Published Date**: August 26, 2022 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 23:18 UTC
- **Reserved Date**: January 13, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - QEMU**
Affected versions:
- Affects QEMU < v6.0.0, Fixed in v7.1.0-rc0 (Status: affected)
### References
1. [](https://starlabs.sg/advisories/22/22-0216/)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=2036953)
3. [](https://gitlab.com/qemu-project/qemu/-/issues/972)
4. [](https://gitlab.com/qemu-project/qemu/-/commit/4367a20cc4)
5. [](https://access.redhat.com/security/cve/CVE-2022-0216)
6. [FEDORA-2022-4387579e67](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4334
- **State**: PUBLISHED
- **Published Date**: December 07, 2015 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The default configuration of SGOS in Blue Coat ProxySG before 6.2.16.5, 6.5 before 6.5.7.1, and 6.6 before 6.6.2.1 forwards authentication challenges from upstream origin content servers (OCS) when used in an explicit proxy deployment, which makes it easier for remote attackers to obtain sensitive information via a 407 (aka Proxy Authentication Required) HTTP status code, as demonstrated when using NTLM authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032149](http://www.securitytracker.com/id/1032149)
2. [](https://twitter.com/bugch3ck/status/591492380294979585)
3. [](https://bto.bluecoat.com/security-advisory/sa93) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19543
- **State**: PUBLISHED
- **Published Date**: November 26, 2018 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mdadams/jasper/issues/182)
2. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
3. [openSUSE-SU-2020:1517](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html)
4. [openSUSE-SU-2020:1523](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32780, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32780
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 20:55 UTC
- **Last Updated**: August 03, 2024 at 23:33 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions Envoy transitions a H/2 connection to the CLOSED state when it receives a GOAWAY frame without any streams outstanding. The connection state is transitioned to DRAINING when it receives a SETTING frame with the SETTINGS_MAX_CONCURRENT_STREAMS parameter set to 0. Receiving these two frames in the same I/O event results in abnormal termination of the Envoy process due to invalid state transition from CLOSED to DRAINING. A sequence of H/2 frames delivered by an untrusted upstream server will result in Denial of Service in the presence of untrusted **upstream** servers. Envoy versions 1.19.1, 1.18.4 contain fixes to stop processing of pending H/2 frames after connection transition to the CLOSED state.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-754: Security Weakness
### Affected Products
**envoyproxy - envoy**
Affected versions:
- >= 1.19.0, < 1.19.1 (Status: affected)
- >= 1.18.0, < 1.18.4 (Status: affected)
### References
1. [](https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history)
2. [](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37078
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 16:04 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 20, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42513, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42513
- **State**: PUBLISHED
- **Published Date**: February 10, 2025 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 21:50 UTC
- **Reserved Date**: August 02, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when using HTTPS endpoints.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-42513.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5590
- **State**: PUBLISHED
- **Published Date**: October 19, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in Miranda before 0.7.1 allow remote attackers to execute arbitrary code via unspecified vectors involving (1) IRC options, (2) Jabber forms, and unspecified aspects of the (3) ICQ and (4) Yahoo! instant messaging functionality. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?group_id=94142&release_id=547866)
2. [41805](http://osvdb.org/41805)
3. [27287](http://secunia.com/advisories/27287)
4. [41806](http://osvdb.org/41806)
5. [41807](http://osvdb.org/41807)
6. [41804](http://osvdb.org/41804)
7. [miranda-im-multiple-bo(37291)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37291)
8. [ADV-2007-3539](http://www.vupen.com/english/advisories/2007/3539)
9. [26115](http://www.securityfocus.com/bid/26115) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12127
- **State**: PUBLISHED
- **Published Date**: March 19, 2020 at 17:30 UTC
- **Last Updated**: August 04, 2024 at 23:10 UTC
- **Reserved Date**: May 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ONAP OOM through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jira.onap.org/browse/OJSI-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4747
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 05:00 UTC
- **Last Updated**: May 16, 2025 at 15:57 UTC
- **Reserved Date**: May 15, 2025 at 08:21 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Bohua NetDragon Firewall 1.0 and classified as critical. This issue affects some unknown processing of the file /systemstatus/ip_status.php. The manipulation of the argument subnet leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
- CWE-74: Security Weakness
### Affected Products
**Bohua - NetDragon Firewall**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-309047 | Bohua NetDragon Firewall ip_status.php command injection](https://vuldb.com/?id.309047)
2. [VDB-309047 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309047)
3. [Submit #571035 | Zhongke Bohua Information Technology Co., Ltd. Bohua NetDragon Firewall v1.0 Command Execution](https://vuldb.com/?submit.571035)
4. [](https://github.com/lche511/cve/issues/1)
### Credits
- pengguogood (VulDB User)
- pengguogood (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0268
- **State**: PUBLISHED
- **Published Date**: January 17, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5, 9.2.0.7, and 10.1.0.5 have unknown impact and attack vectors related to (1) the Advanced Queuing component and sys.dbms_aqsys.dbms_aq privileges (DB01), (2) Advanced Replication and sys.dbms_repcat_untrusted (DB07), and (3) Oracle Text and ctxload (DB15). NOTE: Oracle has not publicly claims by reliable researchers that DB01 is for SQL injection in the SYS.DBMS_AQ_INV package, and DB07 is for a buffer overflow in the UNREGISTER_SNAPSHOT procedure in the DBMS_REPCAT_UNTRUSTED package.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32913](http://osvdb.org/32913)
2. [20070129 Re: Re: Oracle Buffer Overflows in DBMS_CAPTURE_ADM_INTERNAL](http://www.securityfocus.com/archive/1/458475/100/100/threaded)
3. [23794](http://secunia.com/advisories/23794)
4. [32921](http://osvdb.org/32921)
5. [22083](http://www.securityfocus.com/bid/22083)
6. [VU#221788](http://www.kb.cert.org/vuls/id/221788)
7. [32907](http://osvdb.org/32907)
8. [20070124 Oracle Buffer Overflow in DBMS_REPCAT_UNTRUSTED.UNREGISTER_SNAPSHOT](http://www.securityfocus.com/archive/1/458005/100/0/threaded)
9. [](http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html)
10. [TA07-017A](http://www.us-cert.gov/cas/techalerts/TA07-017A.html)
11. [oracle-cpu-jan2007(31541)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31541)
12. [](http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aq_inv.html)
13. [1017522](http://securitytracker.com/id?1017522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0665
- **State**: PUBLISHED
- **Published Date**: May 16, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Heap-based buffer overflow in Apple QuickTime before 7.7.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1027065](http://www.securitytracker.com/id?1027065)
2. [oval:org.mitre.oval:def:15938](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15938)
3. [](http://support.apple.com/kb/HT5261)
4. [53576](http://www.securityfocus.com/bid/53576)
5. [APPLE-SA-2012-05-15-1](http://lists.apple.com/archives/security-announce/2012/May/msg00005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1356
- **State**: PUBLISHED
- **Published Date**: April 09, 2019 at 20:55 UTC
- **Last Updated**: October 25, 2024 at 14:07 UTC
- **Reserved Date**: December 11, 2017 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A reflected Cross-Site-Scripting (XSS) vulnerability in Fortinet FortiSandbox before 3.0 may allow an attacker to execute unauthorized code or commands via the back_url parameter in the file scan component.
### Affected Products
**Fortinet - FortiSandbox**
Affected versions:
- 2.5.2 (Status: affected)
- 2.5.1 (Status: affected)
- 2.5.0 (Status: affected)
- 2.4.1 (Status: affected)
- 2.4.0 (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-18-024)
2. [107838](http://www.securityfocus.com/bid/107838) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5308
- **State**: PUBLISHED
- **Published Date**: October 17, 2006 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 19:48 UTC
- **Reserved Date**: October 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Open Conference Systems (OCS) before 1.1.6 allow remote attackers to execute arbitrary PHP code via a URL in the fullpath parameter in (1) include/theme.inc.php or (2) include/footer.inc.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pkp.sfu.ca:8043/bugzilla/show_bug.cgi?id=2436)
2. [](http://pkp.sfu.ca/ocs_download)
3. [](http://pkp.sfu.ca:8043/bugzilla/attachment.cgi?id=90)
4. [ocs-fullpath-file-include(29517)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29517)
5. [1017071](http://securitytracker.com/id?1017071)
6. [2536](https://www.exploit-db.com/exploits/2536)
7. [22412](http://secunia.com/advisories/22412)
8. [ADV-2006-4041](http://www.vupen.com/english/advisories/2006/4041)
9. [20061013 Open Conference Systems <= 1.1.3 Remote File Inclusion](http://www.securityfocus.com/archive/1/448548/100/0/threaded)
10. [](http://isc.sans.org/diary.php?storyid=1791)
11. [20567](http://www.securityfocus.com/bid/20567) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20494
- **State**: PUBLISHED
- **Published Date**: June 28, 2021 at 16:10 UTC
- **Last Updated**: September 17, 2024 at 02:47 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Identity Manager Adapters 6.0 and 7.0 are vulnerable to a heap based buffer overflow, caused by improper bounds. An authenticared user could overflow the buffer and cause the service to crash. IBM X-Force ID: 197882.
### Affected Products
**IBM - Security Identity Manager Adapters**
Affected versions:
- 6.0 (Status: affected)
- 7.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6465875)
2. [ibm-sim-cve202120494-dos (197882)](https://exchange.xforce.ibmcloud.com/vulnerabilities/197882) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5705
- **State**: PUBLISHED
- **Published Date**: April 15, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 05, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SpiderLabs/ModSecurity/commit/f8d441cd25172fdfe5b613442fedfc0da3cc333d)
2. [DSA-2991](http://www.debian.org/security/2014/dsa-2991)
3. [](http://martin.swende.se/blog/HTTPChunked.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4236
- **State**: PUBLISHED
- **Published Date**: July 22, 2019 at 13:35 UTC
- **Last Updated**: September 16, 2024 at 23:06 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
A IBM Spectrum Protect 7.l client backup or archive operation running for an HP-UX VxFS object is silently skipping Access Control List (ACL) entries from backup or archive if there are more than twelve ACL entries associated with the object in total. As a result, it could allow a local attacker to restore or retrieve the object with incorrect ACL entries. IBM X-Force ID: 159418.
### Affected Products
**IBM - Spectrum Protect**
Affected versions:
- 7.l (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10884766)
2. [ibm-tsm-cve20194236-info-disc (159418)](https://exchange.xforce.ibmcloud.com/vulnerabilities/159418) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20507
- **State**: PUBLISHED
- **Published Date**: December 30, 2019 at 21:24 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: December 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Enterprise Edition 11.2.x through 11.4.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/2018/12/31/security-release-gitlab-11-dot-6-dot-1-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2255
- **State**: PUBLISHED
- **Published Date**: April 25, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 25, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Download-Engine 1.4.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) eng_dir parameter to addmember.php, (2) lang_path parameter to admin/enginelib/class.phpmailer.php, and the (3) spaw_root parameter to admin/includes/spaw/dialogs/colorpicker.php, different vectors than CVE-2006-5291 and CVE-2006-5459. NOTE: vector 3 might be an issue in SPAW.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [downloadengine-multiple-file-include(33723)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33723)
2. [35400](http://osvdb.org/35400)
3. [35399](http://osvdb.org/35399)
4. [20070417 Remot File Include download_engine_V1.4.3](http://www.securityfocus.com/archive/1/465984/100/100/threaded)
5. [2619](http://securityreason.com/securityalert/2619)
6. [35398](http://osvdb.org/35398) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2658
- **State**: PUBLISHED
- **Published Date**: August 31, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in the SQLDriverConnect function in unixODBC 2.3.1 allows local users to cause a denial of service (crash) via a long string in the DRIVER option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [82460](http://www.osvdb.org/82460)
2. [unixodbc-sdc-bo(75940)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75940)
3. [[oss-security] 20120605 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/06/06/3)
4. [[oss-security] 20120530 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/30/7)
5. [[oss-security] 20120531 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/31/2)
6. [53712](http://www.securityfocus.com/bid/53712)
7. [[oss-security] 20120529 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/29/10)
8. [[oss-security] 20120529 CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/29/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51676
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 12:44 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 21, 2023 at 14:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Server-Side Request Forgery (SSRF) vulnerability in Leevio Happy Addons for Elementor.This issue affects Happy Addons for Elementor: from n/a through 3.9.1.1.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Leevio - Happy Addons for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-9-1-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve)
### Credits
- Yuchen Ji (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15771
- **State**: PUBLISHED
- **Published Date**: September 18, 2020 at 13:22 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1. Cross-site transmission of cookie containing CSRF token allows remote attacker to bypass CSRF mitigation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gradle/gradle/security/advisories)
2. [](https://security.gradle.com/advisory/CVE-2020-15771) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10089
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 16:27 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GitLab 8.11 through 12.8.1 allows a Denial of Service when using several features to recursively request eachother,
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/)
2. [](https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16966
- **State**: PUBLISHED
- **Published Date**: April 15, 2019 at 20:37 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a CSRF vulnerability in the mndpsingh287 File Manager plugin 3.0 for WordPress via the page=wp_file_manager_root public_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-file-manager/#developers)
2. [](https://ansawaf.blogspot.com/2019/04/file-manager-plugin-wordpress-plugin.html)
3. [](https://wpvulndb.com/vulnerabilities/9614) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27351
- **State**: PUBLISHED
- **Published Date**: February 19, 2021 at 18:57 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Terminate Session feature in the Telegram application through 7.2.1 for Android, and through 2.4.7 for Windows and UNIX, fails to invalidate a recently active session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://0ffsecninja.github.io/Telegram:CVE-2021-2735.html)
2. [GLSA-202105-07](https://security.gentoo.org/glsa/202105-07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3082, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3082
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 11:08 UTC
- **Last Updated**: April 01, 2025 at 15:14 UTC
- **Reserved Date**: April 01, 2025 at 08:47 UTC
- **Assigned By**: mongodb
### Vulnerability Description
A user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**MongoDB Inc - MongoDB Server**
Affected versions:
- 5.0 (Status: affected)
- 6.0 (Status: affected)
- 7.0 (Status: affected)
- 7.3 (Status: affected)
### References
1. [](https://jira.mongodb.org/browse/SERVER-103151) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6493
- **State**: PUBLISHED
- **Published Date**: May 22, 2018 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 04:25 UTC
- **Reserved Date**: February 01, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
SQL Injection in HP Network Operations Management Ultimate, version 2017.07, 2017.11, 2018.02 and in Network Automation, version 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50. This vulnerability could be remotely exploited to allow Remote SQL Injection.
### Affected Products
**Micro Focus - Network Operations Management Ultimate**
Affected versions:
- 2017.07, 2017.11, 2018.02 (Status: affected)
**Micro Focus - Network Automation**
Affected versions:
- 10.00, 10.10, 10.11, 10.20, 10.30, 10.40, 10.50 (Status: affected)
### References
1. [](https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158014)
2. [1040900](http://www.securitytracker.com/id/1040900)
3. [104131](http://www.securityfocus.com/bid/104131)
### Credits
- Micro Focus would like to thank Tilman Bender, Dennis Herrmann and Bastian Kanbach of Context Information Security GmbH for reporting this issue to cyber-psrt@microfocus.com. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0056
- **State**: PUBLISHED
- **Published Date**: February 01, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: January 29, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8236](http://secunia.com/advisories/8236)
2. [CLA-2003:643](http://www.net-security.org/advisory.php?id=2010)
3. [20040202-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc)
4. [7982](http://secunia.com/advisories/7982)
5. [](http://www.usg.org.uk/advisories/2003.001.txt)
6. [MDKSA-2003:015](http://www.mandriva.com/security/advisories?name=MDKSA-2003:015)
7. [10720](http://secunia.com/advisories/10720)
8. [DSA-252](http://www.debian.org/security/2003/dsa-252)
9. [20030125 Re: [USG- SA- 2003.001] USG Security Advisory (slocate)](http://marc.info/?l=bugtraq&m=104348607205691&w=2)
10. [20030202 GLSA: slocate](http://marc.info/?l=bugtraq&m=104428624705363&w=2)
11. [8118](http://secunia.com/advisories/8118/)
12. [oval:org.mitre.oval:def:11369](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11369)
13. [RHSA-2004:041](http://rhn.redhat.com/errata/RHSA-2004-041.html)
14. [20030124 [USG- SA- 2003.001] USG Security Advisory (slocate)](http://marc.info/?l=bugtraq&m=104342864418213&w=2)
15. [8749](http://secunia.com/advisories/8749)
16. [CSSA-2003-009.0](ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-009.0.txt)
17. [7947](http://secunia.com/advisories/7947)
18. [8007](http://secunia.com/advisories/8007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1565
- **State**: PUBLISHED
- **Published Date**: April 12, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 06, 2009 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
vmnc.dll in the VMnc media codec in VMware Movie Decoder before 6.5.4 Build 246459 on Windows, and the movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Windows, allows remote attackers to execute arbitrary code via an AVI file with crafted HexTile-encoded video chunks that trigger heap-based buffer overflows, related to "integer truncation errors."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39206](http://secunia.com/advisories/39206)
2. [[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://lists.vmware.com/pipermail/security-announce/2010/000090.html)
3. [36712](http://secunia.com/advisories/36712)
4. [20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html)
5. [](http://www.vmware.com/security/advisories/VMSA-2010-0007.html)
6. [63615](http://www.osvdb.org/63615)
7. [](http://secunia.com/secunia_research/2009-37/)
8. [1023838](http://www.securitytracker.com/id?1023838)
9. [39364](http://www.securityfocus.com/bid/39364)
10. [39215](http://secunia.com/advisories/39215)
11. [20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4405
- **State**: PUBLISHED
- **Published Date**: October 03, 2008 at 17:18 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
xend in Xen 3.0.3 does not properly limit the contents of the /local/domain xenstore directory tree, and does not properly restrict a guest VM's write access within this tree, which allows guest OS users to cause a denial of service and possibly have unspecified other impact by writing to (1) console/tty, (2) console/limit, or (3) image/device-model-pid. NOTE: this issue was originally reported as an issue in libvirt 0.3.3 and xenstore, but CVE is considering the core issue to be related to Xen.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-2709](http://www.vupen.com/english/advisories/2008/2709)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=464817)
3. [MDVSA-2009:016](http://www.mandriva.com/security/advisories?name=MDVSA-2009:016)
4. [32064](http://secunia.com/advisories/32064)
5. [[xen-devel] 20080930 [PATCH] [Xend] Move some backend configuration](http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00992.html)
6. [SUSE-SR:2009:015](http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html)
7. [[oss-security] 20080930 CVE Request (xen)](http://openwall.com/lists/oss-security/2008/09/30/6)
8. [RHSA-2009:0003](http://www.redhat.com/support/errata/RHSA-2009-0003.html)
9. [](http://xenbits.xensource.com/staging/xen-3.3-testing.hg?rev/e0e17216ba70)
10. [[xen-devel] 20080930 Re: [PATCH] [Xend] Move some backend configuration](http://lists.xensource.com/archives/html/xen-devel/2008-09/msg00994.html)
11. [31499](http://www.securityfocus.com/bid/31499)
12. [oval:org.mitre.oval:def:10627](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10627)
13. [1020955](http://www.securitytracker.com/id?1020955)
14. [[oss-security] 20081004 Re: CVE Request (xen)](http://www.openwall.com/lists/oss-security/2008/10/04/3)
15. [](https://bugzilla.redhat.com/show_bug.cgi?id=464818) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14863
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:09 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1 - 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Affected Products
**Oracle Corporation - One-to-One Fulfillment**
Affected versions:
- 12.1.1 - 12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1419
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1426.
### Affected Products
**Microsoft - Windows 10 Version 2004 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 2004 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1419) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50964
- **State**: PUBLISHED
- **Published Date**: June 30, 2024 at 18:12 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 16, 2023 at 19:35 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 276102.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**IBM - InfoSphere Information Server**
Affected versions:
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7159060)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/276102) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2908
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 26, 2024 at 13:31 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Call Now Button WordPress plugin before 1.4.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Call Now Button **
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/)
### Credits
- Dikshita Trivedi (Cybersecdexter)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31314
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 20:09 UTC
- **Last Updated**: November 05, 2024 at 22:02 UTC
- **Reserved Date**: March 29, 2024 at 20:11 UTC
- **Assigned By**: google_android
### Vulnerability Description
In multiple functions of ShortcutService.java, there is a possible persistent DOS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/c0d5f75e01308fb7d6d86639a0a6e2ff81b30be6)
2. [](https://source.android.com/security/bulletin/2024-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32358
- **State**: PUBLISHED
- **Published Date**: August 14, 2023 at 22:40 UTC
- **Last Updated**: October 09, 2024 at 14:08 UTC
- **Reserved Date**: May 08, 2023 at 22:31 UTC
- **Assigned By**: apple
### Vulnerability Description
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213670)
2. [](https://support.apple.com/en-us/HT213676) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41187
- **State**: PUBLISHED
- **Published Date**: November 01, 2021 at 21:20 UTC
- **Last Updated**: August 04, 2024 at 03:08 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL injection security vulnerability has been found in specific versions of DHIS2. This vulnerability affects the API endpoints for /api/trackedEntityInstances and api/events in DHIS2. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. However, we strongly recommend that all DHIS2 implementations using versions 2.32, 2.33, 2.34, 2.35 and 2.36 install these patches as soon as possible. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the /api/trackedEntityInstance and /api/events endpoints as a temporary workaround while waiting to upgrade.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**dhis2 - dhis2-core**
Affected versions:
- >= 2.32.0, < 2.32-EOS (Status: affected)
- >= 2.33.0, < 2.33-EOS (Status: affected)
- >= 2.34.0, < 2.34.7 (Status: affected)
- >= 2.35.0, < 2.35.8 (Status: affected)
- >= 2.36.0, < 2.36.4 (Status: affected)
### References
1. [](https://github.com/dhis2/dhis2-core/security/advisories/GHSA-fvm5-gp3j-c7c6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17674
- **State**: PUBLISHED
- **Published Date**: January 24, 2019 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6845.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Reader**
Affected versions:
- 9.2.0.9297 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1165/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1281
- **State**: PUBLISHED
- **Published Date**: March 24, 2021 at 20:16 UTC
- **Last Updated**: November 08, 2024 at 23:31 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in CLI management in Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system as the root user. This vulnerability is due to the way the software handles concurrent CLI sessions. An attacker could exploit this vulnerability by authenticating to the device as an administrative user and executing a sequence of commands. A successful exploit could allow the attacker to obtain access to the underlying operating system as the root user.
### CVSS Metrics
- **CVSS Base Score**: 5.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20210324 Cisco IOS XE SD-WAN Software Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-clipriv-9TO2QGVp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18456
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 16:29 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 62.0.17 allows self XSS in the WHM cPAddons showsecurity interface (SEC-217).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/62+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15649
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: August 21, 2018 at 00:00 UTC
- **Assigned By**: odoo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22402
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 00:00 UTC
- **Last Updated**: January 03, 2025 at 17:03 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in SOGo Web Mail before 4.3.1 allows attackers to obtain user sensitive information when a user reads an email containing malicious code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sogo.nu/bugs/view.php?id=4979) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3558
- **State**: PUBLISHED
- **Published Date**: November 23, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: October 05, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20091120 Re: CVE request: php 5.3.1 update](http://www.openwall.com/lists/oss-security/2009/11/20/3)
2. [6600](http://securityreason.com/securityalert/6600)
3. [](http://www.php.net/releases/5_2_12.php)
4. [[php-announce] 20091119 5.3.1 Release announcement](http://news.php.net/php.announce/79)
5. [](http://svn.php.net/viewvc?view=revision&revision=288943)
6. [MDVSA-2009:285](http://www.mandriva.com/security/advisories?name=MDVSA-2009:285)
7. [37821](http://secunia.com/advisories/37821)
8. [](http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/posix/posix.c?view=log)
9. [APPLE-SA-2010-03-29-1](http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html)
10. [](http://www.php.net/ChangeLog-5.php)
11. [](http://support.apple.com/kb/HT4077)
12. [[oss-security] 20091120 CVE request: php 5.3.1 update](http://www.openwall.com/lists/oss-security/2009/11/20/2)
13. [](http://www.php.net/releases/5_3_1.php)
14. [ADV-2009-3593](http://www.vupen.com/english/advisories/2009/3593)
15. [[oss-security] 20091120 Re: CVE request: php 5.3.1 update](http://www.openwall.com/lists/oss-security/2009/11/20/5)
16. [37412](http://secunia.com/advisories/37412)
17. [](http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/posix/posix.c?view=log)
18. [MDVSA-2009:302](http://www.mandriva.com/security/advisories?name=MDVSA-2009:302)
19. [MDVSA-2009:303](http://www.mandriva.com/security/advisories?name=MDVSA-2009:303) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2466
- **State**: PUBLISHED
- **Published Date**: June 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The Qualcomm sound driver in Android before 2016-06-01 on Nexus 6 devices allows attackers to gain privileges via a crafted application, aka internal bug 27947307.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-06-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6438
- **State**: PUBLISHED
- **Published Date**: March 06, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:27 UTC
- **Reserved Date**: March 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in macgurublog_menu/macgurublog.php in the MacGuru BLOG Engine plugin 2.2 for e107 allows remote attackers to execute arbitrary SQL commands via the uid parameter, a different vector than CVE-2008-2455. NOTE: it was later reported that 2.1.4 is also affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-2468](http://www.vupen.com/english/advisories/2008/2468)
2. [30212](http://secunia.com/advisories/30212)
3. [5666](https://www.exploit-db.com/exploits/5666)
4. [20080523 e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability](http://www.securityfocus.com/archive/1/492506/100/0/threaded)
5. [6346](https://www.exploit-db.com/exploits/6346)
6. [6856](https://www.exploit-db.com/exploits/6856)
7. [blogengine-macgurublog-sql-injection(42715)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42715)
8. [29344](http://www.securityfocus.com/bid/29344)
9. [51408](http://osvdb.org/51408) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7506
- **State**: PUBLISHED
- **Published Date**: July 18, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 16:04 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**The SPICE Project - spice**
Affected versions:
- all versions through 0.13 (Status: affected)
### References
1. [RHSA-2018:3522](https://access.redhat.com/errata/RHSA-2018:3522)
2. [[oss-security] 20170714 CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations](http://www.openwall.com/lists/oss-security/2017/07/14/1)
3. [RHSA-2017:2471](https://access.redhat.com/errata/RHSA-2017:2471)
4. [DSA-3907](http://www.debian.org/security/2017/dsa-3907)
5. [99583](http://www.securityfocus.com/bid/99583)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1452606) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4817
- **State**: PUBLISHED
- **Published Date**: September 23, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:52 UTC
- **Reserved Date**: July 12, 2013 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP IceWall SSO Agent Option 8.0 through 10.0 allows remote attackers to obtain sensitive information via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632)
2. [HPSBGN02925](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03918632)
3. [SSRT101310](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03918632) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29415
- **State**: PUBLISHED
- **Published Date**: April 28, 2022 at 15:34 UTC
- **Last Updated**: February 20, 2025 at 20:24 UTC
- **Reserved Date**: April 18, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in Mati Skiba @ Rav Messer's Ravpage plugin <= 2.16 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Mati Skiba @ Rav Messer - Ravpage (WordPress plugin)**
Affected versions:
- <= 2.16 (Status: affected)
### References
1. [](https://wordpress.org/plugins/ravpage/)
2. [](https://patchstack.com/database/vulnerability/ravpage/wordpress-ravpage-plugin-2-16-unauthenticated-reflected-cross-site-scripting-xss-vulnerability)
### Credits
- Vulnerability discovered by Tien Nguyen Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0935
- **State**: PUBLISHED
- **Published Date**: February 01, 2024 at 13:33 UTC
- **Last Updated**: August 01, 2024 at 18:18 UTC
- **Reserved Date**: January 26, 2024 at 09:51 UTC
- **Assigned By**: 3DS
### Vulnerability Description
Insertion of Sensitive Information into Log File vulnerabilities are affecting DELMIA Apriso Release 2019 through Release 2024
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**Dassault Systèmes - DELMIA Apriso**
Affected versions:
- Apriso 2019 Golden (Status: affected)
- Apriso 2020 Golden (Status: affected)
- Apriso 2021 Golden (Status: affected)
- Apriso 2022 Golden (Status: affected)
- Apriso 2023 Golden (Status: affected)
- Apriso 2024 Golden (Status: affected)
### References
1. [](https://www.3ds.com/vulnerability/advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1977
- **State**: PUBLISHED
- **Published Date**: May 09, 2012 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: March 30, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://dsecrg.com/pages/vul/show.php?id=405)
2. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46642
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:46 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15514.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Bentley - View**
Affected versions:
- 10.15.0.75 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-229/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33329
- **State**: PUBLISHED
- **Published Date**: June 26, 2024 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 16:12 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A hardcoded privileged ID within Lumisxp v15.0.x to v16.1.x allows attackers to bypass authentication and access internal pages and other sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/rodnt/f6b3a2ac875b8f13656063eefbfd9812)
2. [20240710 CVE-2024-33329](http://seclists.org/fulldisclosure/2024/Jul/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5855
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 01:31 UTC
- **Last Updated**: June 09, 2025 at 03:01 UTC
- **Reserved Date**: June 08, 2025 at 09:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Tenda AC6 15.03.05.16. This affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
- CWE-119: Security Weakness
### Affected Products
**Tenda - AC6**
Affected versions:
- 15.03.05.16 (Status: affected)
### References
1. [VDB-311601 | Tenda AC6 SetRebootTimer formSetRebootTimer stack-based overflow](https://vuldb.com/?id.311601)
2. [VDB-311601 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.311601)
3. [Submit #591422 | Tenda AC6 V1.0 V15.03.05.16 Buffer Overflow](https://vuldb.com/?submit.591422)
4. [](https://lavender-bicycle-a5a.notion.site/Tenda-AC6-formsetreboottimer-20a53a41781f80c5b6cac51008556c7e?source=copy_link)
5. [](https://www.tenda.com.cn/)
### Credits
- yhryhryhr_backup (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22069
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 14:12 UTC
- **Last Updated**: May 26, 2025 at 05:17 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
riscv: fgraph: Fix stack layout to match __arch_ftrace_regs argument of ftrace_return_to_handler
Naresh Kamboju reported a "Bad frame pointer" kernel warning while
running LTP trace ftrace_stress_test.sh in riscv. We can reproduce the
same issue with the following command:
```
$ cd /sys/kernel/debug/tracing
$ echo 'f:myprobe do_nanosleep%return args1=$retval' > dynamic_events
$ echo 1 > events/fprobes/enable
$ echo 1 > tracing_on
$ sleep 1
```
And we can get the following kernel warning:
[ 127.692888] ------------[ cut here ]------------
[ 127.693755] Bad frame pointer: expected ff2000000065be50, received ba34c141e9594000
[ 127.693755] from func do_nanosleep return to ffffffff800ccb16
[ 127.698699] WARNING: CPU: 1 PID: 129 at kernel/trace/fgraph.c:755 ftrace_return_to_handler+0x1b2/0x1be
[ 127.699894] Modules linked in:
[ 127.700908] CPU: 1 UID: 0 PID: 129 Comm: sleep Not tainted 6.14.0-rc3-g0ab191c74642 #32
[ 127.701453] Hardware name: riscv-virtio,qemu (DT)
[ 127.701859] epc : ftrace_return_to_handler+0x1b2/0x1be
[ 127.702032] ra : ftrace_return_to_handler+0x1b2/0x1be
[ 127.702151] epc : ffffffff8013b5e0 ra : ffffffff8013b5e0 sp : ff2000000065bd10
[ 127.702221] gp : ffffffff819c12f8 tp : ff60000080853100 t0 : 6e00000000000000
[ 127.702284] t1 : 0000000000000020 t2 : 6e7566206d6f7266 s0 : ff2000000065bd80
[ 127.702346] s1 : ff60000081262000 a0 : 000000000000007b a1 : ffffffff81894f20
[ 127.702408] a2 : 0000000000000010 a3 : fffffffffffffffe a4 : 0000000000000000
[ 127.702470] a5 : 0000000000000000 a6 : 0000000000000008 a7 : 0000000000000038
[ 127.702530] s2 : ba34c141e9594000 s3 : 0000000000000000 s4 : ff2000000065bdd0
[ 127.702591] s5 : 00007fff8adcf400 s6 : 000055556dc1d8c0 s7 : 0000000000000068
[ 127.702651] s8 : 00007fff8adf5d10 s9 : 000000000000006d s10: 0000000000000001
[ 127.702710] s11: 00005555737377c8 t3 : ffffffff819d899e t4 : ffffffff819d899e
[ 127.702769] t5 : ffffffff819d89a0 t6 : ff2000000065bb18
[ 127.702826] status: 0000000200000120 badaddr: 0000000000000000 cause: 0000000000000003
[ 127.703292] [<ffffffff8013b5e0>] ftrace_return_to_handler+0x1b2/0x1be
[ 127.703760] [<ffffffff80017bce>] return_to_handler+0x16/0x26
[ 127.704009] [<ffffffff80017bb8>] return_to_handler+0x0/0x26
[ 127.704057] [<ffffffff800d3352>] common_nsleep+0x42/0x54
[ 127.704117] [<ffffffff800d44a2>] __riscv_sys_clock_nanosleep+0xba/0x10a
[ 127.704176] [<ffffffff80901c56>] do_trap_ecall_u+0x188/0x218
[ 127.704295] [<ffffffff8090cc3e>] handle_exception+0x14a/0x156
[ 127.705436] ---[ end trace 0000000000000000 ]---
The reason is that the stack layout for constructing argument for the
ftrace_return_to_handler in the return_to_handler does not match the
__arch_ftrace_regs structure of riscv, leading to unexpected results.
### Affected Products
**Linux - Linux**
Affected versions:
- a3ed4157b7d89800a0008de0c9e46a438a5c3745 (Status: affected)
- a3ed4157b7d89800a0008de0c9e46a438a5c3745 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.14 (Status: affected)
- 0 (Status: unaffected)
- 6.14.2 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/78b39c587b8f6c69140177108f9c08a75b1c7c37)
2. [](https://git.kernel.org/stable/c/67a5ba8f742f247bc83e46dd2313c142b1383276) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10066
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:59 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Applications Technology Stack component of Oracle E-Business Suite (subcomponent: Oracle Forms). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Technology Stack. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
### Affected Products
**Oracle Corporation - E-Business Suite Technology Stack**
Affected versions:
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
- 12.2.7 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
2. [101398](http://www.securityfocus.com/bid/101398)
3. [1039592](http://www.securitytracker.com/id/1039592) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0003
- **State**: PUBLISHED
- **Published Date**: March 22, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:58 UTC
- **Reserved Date**: January 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in UnixWare rtpm program allows local users to gain privileges via a long environmental variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000127 New SCO patches...](http://marc.info/?l=bugtraq&m=94908470928258&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24815
- **State**: PUBLISHED
- **Published Date**: February 07, 2024 at 15:14 UTC
- **Last Updated**: February 13, 2025 at 17:40 UTC
- **Reserved Date**: January 31, 2024 at 16:28 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered in the core HTML parsing module in versions of CKEditor4 prior to 4.24.0-lts. It may affect all editor instances that enabled full-page editing mode or enabled CDATA elements in Advanced Content Filtering configuration (defaults to `script` and `style` elements). The vulnerability allows attackers to inject malformed HTML content bypassing Advanced Content Filtering mechanism, which could result in executing JavaScript code. An attacker could abuse faulty CDATA content detection and use it to prepare an intentional attack on the editor. A fix is available in version 4.24.0-lts.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ckeditor - ckeditor4**
Affected versions:
- < 4.24.0-lts (Status: affected)
### References
1. [https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-fq6h-4g8v-qqvm](https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-fq6h-4g8v-qqvm)
2. [https://github.com/ckeditor/ckeditor4/commit/8ed1a3c93d0ae5f49f4ecff5738ab8a2972194cb](https://github.com/ckeditor/ckeditor4/commit/8ed1a3c93d0ae5f49f4ecff5738ab8a2972194cb)
3. [https://ckeditor.com/docs/ckeditor4/latest/api/CKEDITOR_dtd.html#property-S-cdata](https://ckeditor.com/docs/ckeditor4/latest/api/CKEDITOR_dtd.html#property-S-cdata)
4. [https://ckeditor.com/docs/ckeditor4/latest/features/fullpage.html](https://ckeditor.com/docs/ckeditor4/latest/features/fullpage.html)
5. [https://ckeditor.com/docs/ckeditor4/latest/guide/dev_advanced_content_filter.html](https://ckeditor.com/docs/ckeditor4/latest/guide/dev_advanced_content_filter.html)
6. [](https://www.drupal.org/sa-contrib-2024-009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10449
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 14:31 UTC
- **Last Updated**: October 28, 2024 at 14:53 UTC
- **Reserved Date**: October 28, 2024 at 06:21 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Codezips - Hospital Appointment System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-282009 | Codezips Hospital Appointment System loginAction.php sql injection](https://vuldb.com/?id.282009)
2. [VDB-282009 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282009)
3. [Submit #432564 | Codezips Hospital Appointment System In PHP With Source Code V1.0 SQL Injection](https://vuldb.com/?submit.432564)
4. [](https://github.com/ppp-src/CVE/issues/25)
### Credits
- XU RONGDA (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18581
- **State**: PUBLISHED
- **Published Date**: October 22, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:15 UTC
- **Reserved Date**: October 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue has been found in LuPng through 2017-03-10. It is a heap-based buffer over-read in internalPrintf in miniz/lupng.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jansol/LuPng/issues/7)
2. [](https://github.com/grandnew/software-vulnerabilities/tree/master/LuPng#heap-buffer-overflow-in-function-internalprintf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33742
- **State**: PUBLISHED
- **Published Date**: June 08, 2021 at 22:46 UTC
- **Last Updated**: February 04, 2025 at 18:08 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows MSHTML Platform Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27859
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 20:02 UTC
- **Last Updated**: February 13, 2025 at 16:45 UTC
- **Reserved Date**: March 06, 2023 at 20:01 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Db2 10.1, 10.5, and 11.1 could allow a remote user to execute arbitrary code caused by installing like named jar files across multiple databases. A user could exploit this by installing a malicious jar file that overwrites the existing like named jar file in another database. IBM X-Force ID: 249205.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**IBM - Db2 for Linux, UNIX and Windows**
Affected versions:
- 10.5, 11.1 ,11.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7105503)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/249205)
3. [](https://security.netapp.com/advisory/ntap-20240307-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8874
- **State**: PUBLISHED
- **Published Date**: March 20, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 20:47 UTC
- **Reserved Date**: March 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In 2345 Security Guard 3.6, the driver file (2345Wrath.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00222054.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222054) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27791
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 19:09 UTC
- **Last Updated**: April 15, 2025 at 20:27 UTC
- **Reserved Date**: March 06, 2025 at 18:06 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Collabora Online is a collaborative online office suite based on LibreOffice technology. In versions prior to 24.04.12.4, 23.05.19, and 22.05.25, there is a path traversal flaw in handling the CheckFileInfo BaseFileName field returned from WOPI servers. This allows for a file to be written anywhere the uid running Collabora Online can write, if such a response was supplied by a malicious WOPI server. By combining this flaw with a Time of Check, Time of Use DNS lookup issue with a WOPI server address under attacker control, it is possible to present such a response to be processed by a Collabora Online instance. This issue has been patched in versions 24.04.13.1, 23.05.19, and 22.05.25.
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**CollaboraOnline - online**
Affected versions:
- >= 24.04.1.1, < 24.04.13.1 (Status: affected)
- >= 23.05.0, < 23.05.19 (Status: affected)
- < 22.05.25 (Status: affected)
### References
1. [https://github.com/CollaboraOnline/online/security/advisories/GHSA-9j32-gg3j-8w25](https://github.com/CollaboraOnline/online/security/advisories/GHSA-9j32-gg3j-8w25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0296
- **State**: PUBLISHED
- **Published Date**: June 11, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-030](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-030)
2. [58524](http://secunia.com/advisories/58524)
3. [67865](http://www.securityfocus.com/bid/67865)
4. [](http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12474
- **State**: PUBLISHED
- **Published Date**: December 14, 2024 at 05:34 UTC
- **Last Updated**: December 16, 2024 at 17:48 UTC
- **Reserved Date**: December 10, 2024 at 23:12 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The GeoDataSource Country Region DropDown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gds-country-dropdown' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**geodatasource - GeoDataSource Country Region DropDown**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c974726e-9371-40e5-8664-c12c8c06e5b9?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207322%40geodatasource-country-region-dropdown&new=3207322%40geodatasource-country-region-dropdown&sfp_email=&sfph_mail=)
### Credits
- zakaria |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9029
- **State**: PUBLISHED
- **Published Date**: February 17, 2020 at 03:02 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 17, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to messagelog.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25864
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:21 UTC
- **Reserved Date**: February 15, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Adobe - Substance3D - Stager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6389
- **State**: PUBLISHED
- **Published Date**: January 29, 2024 at 14:44 UTC
- **Last Updated**: August 02, 2024 at 08:28 UTC
- **Reserved Date**: November 29, 2023 at 20:04 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WordPress Toolbar WordPress plugin through 2.2.6 redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
### Weakness Classification (CWE)
- CWE-601 URL Redirection to Untrusted Site ('Open Redirect'): URL Redirection to Untrusted Site
### Affected Products
**Unknown - WordPress Toolbar**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/04dafc55-3a8d-4dd2-96da-7a8b100e5a81/)
2. [](https://magos-securitas.com/txt/CVE-2023-6389.txt)
### Credits
- Daniel Ruf
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23018
- **State**: PUBLISHED
- **Published Date**: January 25, 2022 at 19:11 UTC
- **Last Updated**: August 03, 2024 at 03:28 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP AFM version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and 13.1.x beginning in 13.1.3.4, when a virtual server is configured with both HTTP protocol security and HTTP Proxy Connect profiles, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**n/a - BIG-IP AFM**
Affected versions:
- 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and 13.1.x beginning in 13.1.3.4 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K24358905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3471
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 04:04 UTC
- **Last Updated**: September 26, 2024 at 20:23 UTC
- **Reserved Date**: June 30, 2023 at 05:37 UTC
- **Assigned By**: Panasonic_Holdings_Corporation
### Vulnerability Description
Buffer overflow vulnerability in Panasonic KW Watcher versions 1.00 through 2.82 may allow attackers to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Panasonic - KW Watcher**
Affected versions:
- 1.00 (Status: affected)
### References
1. [](https://www3.panasonic.biz/ac/e/fasys/software_info/eco/kwwatcher_versioninfo.jsp)
2. [](https://www3.panasonic.biz/ac/j/fasys/software_info/eco/tol_kwwatcher.jsp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20054
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 21:01 UTC
- **Last Updated**: May 14, 2025 at 15:49 UTC
- **Reserved Date**: October 11, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**n/a - Intel(R) Processors**
Affected versions:
- See references (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7553
- **State**: PUBLISHED
- **Published Date**: October 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The GET NYCE Lightworks (aka com.wGETNYCE) application 0.84.13506.98953 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#438441](http://www.kb.cert.org/vuls/id/438441)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2433
- **State**: PUBLISHED
- **Published Date**: August 15, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to bypass the ASLR protection mechanism via a crafted application, aka "Kernel ASLR Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-080](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-080)
2. [76213](http://www.securityfocus.com/bid/76213)
3. [1033238](http://www.securitytracker.com/id/1033238)
4. [38222](https://www.exploit-db.com/exploits/38222/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1922, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1922 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1922
- **State**: PUBLISHED
- **Published Date**: May 31, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 22:46 UTC
- **Reserved Date**: May 09, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
daemon/worker.c in Unbound 1.x before 1.4.10, when debugging functionality and the interface-automatic option are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DNS request that triggers improper error handling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2011-7555](http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061243.html)
2. [47986](http://www.securityfocus.com/bid/47986)
3. [44865](http://secunia.com/advisories/44865)
4. [72750](http://osvdb.org/72750)
5. [VU#531342](http://www.kb.cert.org/vuls/id/531342)
6. [unbound-dns-dos(67645)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67645)
7. [](http://unbound.nlnetlabs.nl/downloads/CVE-2011-1922.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26828
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 09:43 UTC
- **Last Updated**: May 04, 2025 at 08:57 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix underflow in parse_server_interfaces()
In this loop, we step through the buffer and after each item we check
if the size_left is greater than the minimum size we need. However,
the problem is that "bytes_left" is type ssize_t while sizeof() is type
size_t. That means that because of type promotion, the comparison is
done as an unsigned and if we have negative bytes left the loop
continues instead of ending.
### Affected Products
**Linux - Linux**
Affected versions:
- fe856be475f7cf5ffcde57341d175ce9fd09434b (Status: affected)
- fe856be475f7cf5ffcde57341d175ce9fd09434b (Status: affected)
- fe856be475f7cf5ffcde57341d175ce9fd09434b (Status: affected)
- fe856be475f7cf5ffcde57341d175ce9fd09434b (Status: affected)
**Linux - Linux**
Affected versions:
- 4.18 (Status: affected)
- 0 (Status: unaffected)
- 6.1.79 (Status: unaffected)
- 6.6.18 (Status: unaffected)
- 6.7.6 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7190353835b4a219abb70f90b06cdcae97f11512)
2. [](https://git.kernel.org/stable/c/f7ff1c89fb6e9610d2b01c1821727729e6609308)
3. [](https://git.kernel.org/stable/c/df2af9fdbc4ddde18a3371c4ca1a86596e8be301)
4. [](https://git.kernel.org/stable/c/cffe487026be13eaf37ea28b783d9638ab147204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4842
- **State**: PUBLISHED
- **Published Date**: September 27, 2011 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 00:35 UTC
- **Reserved Date**: September 26, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/login.php in MHP DownloadScript (aka MH Products Download Center) 2.2 allows remote attackers to execute arbitrary SQL commands via the Name parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45494](http://www.securityfocus.com/bid/45494)
2. [42714](http://secunia.com/advisories/42714)
3. [15770](http://www.exploit-db.com/exploits/15770) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34087
- **State**: PUBLISHED
- **Published Date**: January 10, 2022 at 01:10 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Ultimaker S3 3D printer, Ultimaker S5 3D printer, Ultimaker 3 3D printer S-line through 6.3 and Ultimaker 3 through 5.2.16, the local webserver can be used for clickjacking. This includes the settings page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ultimaker.com/3d-printers/ultimaker-s3)
2. [](https://ultimaker.com/3d-printers/ultimaker-s5)
3. [](https://kth.diva-portal.org/smash/get/diva2:1623489/FULLTEXT01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47258
- **State**: PUBLISHED
- **Published Date**: November 05, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 14:21 UTC
- **Reserved Date**: November 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Redmine before 4.2.11 and 5.0.x before 5.0.6 allows XSS in a Markdown formatter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.redmine.org/projects/redmine/wiki/Security_Advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36011
- **State**: PUBLISHED
- **Published Date**: January 26, 2021 at 06:53 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) issue in Add Patient Form in QDOCS Smart Hospital Management System 3.1 allows a remote attacker to inject arbitrary code via the Name, Guardian Name, Email, Address, Remarks, or Any Known Allergies field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://qdocs.com)
2. [](https://www.exploit-db.com/exploits/49290) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24776
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 15:25 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \controller\Addon.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/funadmin/funadmin/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40536
- **State**: PUBLISHED
- **Published Date**: June 06, 2023 at 07:39 UTC
- **Last Updated**: August 03, 2024 at 12:21 UTC
- **Reserved Date**: September 12, 2022 at 09:37 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Transient DOS due to improper authentication in modem while receiving plain TLB OTA request message from network.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 315 5G IoT Modem (Status: affected)
- AR8035 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- QCA6391 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCM4490 (Status: affected)
- QCM6490 (Status: affected)
- QCN6024 (Status: affected)
- QCN9024 (Status: affected)
- QCS4490 (Status: affected)
- QCS6490 (Status: affected)
- QCS8550 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SM4450 (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 690 5G Mobile Platform (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 750G 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X70 Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SXR2130 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3950 (Status: affected)
- WCN3988 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2200
- **State**: PUBLISHED
- **Published Date**: July 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: July 11, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in DUware DUforum 3.0 through 3.1 allows remote attackers to inject arbitrary web script or HTML via via the message text.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11363](http://www.securityfocus.com/bid/11363)
2. [1011595](http://www.securitytracker.com/alerts/2004/Oct/1011595.html)
3. [duforum-xss(17681)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17681)
4. [10667](http://www.osvdb.org/10667) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25707
- **State**: PUBLISHED
- **Published Date**: October 04, 2024 at 17:16 UTC
- **Last Updated**: April 10, 2025 at 19:14 UTC
- **Reserved Date**: February 09, 2024 at 19:08 UTC
- **Assigned By**: Esri
### Vulnerability Description
There is a reflected cross site scripting in Esri Portal for ArcGIS 11.1 and below on Windows and Linux x64 allows a remote authenticated attacker with administrative access to supply a crafted string which could potentially execute arbitrary JavaScript code in the their own browser (Self XSS). A user cannot be phished into clicking a link to execute code.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Esri - Portal for ArcGIS**
Affected versions:
- all (Status: affected)
### References
1. [](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58237
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 14:53 UTC
- **Last Updated**: May 09, 2025 at 08:06 UTC
- **Reserved Date**: April 16, 2025 at 07:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: consider that tail calls invalidate packet pointers
Tail-called programs could execute any of the helpers that invalidate
packet pointers. Hence, conservatively assume that each tail call
invalidates packet pointers.
Making the change in bpf_helper_changes_pkt_data() automatically makes
use of check_cfg() logic that computes 'changes_pkt_data' effect for
global sub-programs, such that the following program could be
rejected:
int tail_call(struct __sk_buff *sk)
{
bpf_tail_call_static(sk, &jmp_table, 0);
return 0;
}
SEC("tc")
int not_safe(struct __sk_buff *sk)
{
int *p = (void *)(long)sk->data;
... make p valid ...
tail_call(sk);
*p = 42; /* this is unsafe */
...
}
The tc_bpf2bpf.c:subprog_tc() needs change: mark it as a function that
can invalidate packet pointers. Otherwise, it can't be freplaced with
tailcall_freplace.c:entry_freplace() that does a tail call.
### Affected Products
**Linux - Linux**
Affected versions:
- 51c39bb1d5d105a02e29aa7960f0a395086e6342 (Status: affected)
- 51c39bb1d5d105a02e29aa7960f0a395086e6342 (Status: affected)
- 51c39bb1d5d105a02e29aa7960f0a395086e6342 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.6 (Status: affected)
- 0 (Status: unaffected)
- 6.6.90 (Status: unaffected)
- 6.12.9 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f1692ee23dcaaddc24ba407b269707ee5df1301f)
2. [](https://git.kernel.org/stable/c/1c2244437f9ad3dd91215f920401a14f2542dbfc)
3. [](https://git.kernel.org/stable/c/1a4607ffba35bf2a630aab299e34dd3f6e658d70) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9217
- **State**: PUBLISHED
- **Published Date**: March 01, 2025 at 04:21 UTC
- **Last Updated**: March 03, 2025 at 17:39 UTC
- **Reserved Date**: September 26, 2024 at 16:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Currency Switcher for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.16.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**wpwham - Currency Switcher for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3357892e-c047-406b-8914-018ea966e799?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/currency-switcher-woocommerce/trunk/includes/functions/alg-switcher-selector-functions.php#L139)
### Credits
- Colin Xu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26883
- **State**: PUBLISHED
- **Published Date**: February 24, 2025 at 14:49 UTC
- **Last Updated**: February 24, 2025 at 16:54 UTC
- **Reserved Date**: February 17, 2025 at 11:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in bPlugins Animated Text Block allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Animated Text Block: from n/a through 1.0.7.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**bPlugins - Animated Text Block**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/animated-text-block/vulnerability/wordpress-animated-text-block-plugin-1-0-7-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Peter Thaleikis (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32850
- **State**: PUBLISHED
- **Published Date**: February 20, 2023 at 00:00 UTC
- **Last Updated**: March 10, 2025 at 21:09 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
jQuery MiniColors is a color picker built on jQuery. Prior to version 2.3.6, jQuery MiniColors is prone to cross-site scripting when handling untrusted color names. This issue is patched in version 2.3.6.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**npm - @claviska/jquery-minicolors**
Affected versions:
- 2.3.6 (Status: affected)
### References
1. [](https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3)
2. [](https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6)
3. [](https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/)
4. [FEDORA-2023-419ca55dd3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MC5HV4ESLV2E23YGHNJ542QEZBH6YE2F/)
5. [FEDORA-2023-271b912b2b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDXBWA54A7D6HMR2TN5BAYNCU7HO2PUO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2498
- **State**: PUBLISHED
- **Published Date**: August 15, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 08, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-789](http://www.debian.org/security/2005/dsa-789)
2. [17066](http://secunia.com/advisories/17066)
3. [16441](http://secunia.com/advisories/16441)
4. [20050817 [PHPADSNEW-SA-2005-001] phpAdsNew and phpPgAds 2.0.6 fix multiple vulnerabilities](http://marc.info/?l=bugtraq&m=112431497300344&w=2)
5. [16491](http://secunia.com/advisories/16491)
6. [16619](http://secunia.com/advisories/16619)
7. [20050815 [DRUPAL-SA-2005-004] Drupal 4.6.3 / 4.5.5 fixes critical XML-RPC issue](http://marc.info/?l=bugtraq&m=112412415822890&w=2)
8. [SUSE-SA:2005:051](http://marc.info/?l=bugtraq&m=112605112027335&w=2)
9. [16460](http://secunia.com/advisories/16460)
10. [RHSA-2005:748](http://www.redhat.com/support/errata/RHSA-2005-748.html)
11. [14560](http://www.securityfocus.com/bid/14560)
12. [16558](http://secunia.com/advisories/16558)
13. [DSA-840](http://www.debian.org/security/2005/dsa-840)
14. [16431](http://secunia.com/advisories/16431)
15. [16693](http://secunia.com/advisories/16693)
16. [FLSA:166943](http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html)
17. [SUSE-SA:2005:049](http://www.novell.com/linux/security/advisories/2005_49_php.html)
18. [17440](http://secunia.com/advisories/17440)
19. [20050815 Advisory 15/2005: PHPXMLRPC Remote PHP Code Injection Vulnerability](http://www.securityfocus.com/archive/1/408125)
20. [16976](http://secunia.com/advisories/16976)
21. [GLSA-200509-19](http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml)
22. [16469](http://secunia.com/advisories/16469)
23. [16563](http://secunia.com/advisories/16563)
24. [17053](http://secunia.com/advisories/17053)
25. [DSA-798](http://www.debian.org/security/2005/dsa-798)
26. [16468](http://secunia.com/advisories/16468)
27. [DSA-842](http://www.debian.org/security/2005/dsa-842)
28. [16465](http://secunia.com/advisories/16465)
29. [16635](http://secunia.com/advisories/16635)
30. [](http://www.hardened-php.net/advisory_152005.67.html)
31. [16432](http://secunia.com/advisories/16432)
32. [oval:org.mitre.oval:def:9569](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569)
33. [16550](http://secunia.com/advisories/16550) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2095
- **State**: PUBLISHED
- **Published Date**: May 27, 2010 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 19:14 UTC
- **Reserved Date**: May 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in CMSQlite 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the c parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://php-security.org/2010/05/15/mops-2010-029-cmsqlite-c-parameter-sql-injection-vulnerability/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21574
- **State**: PUBLISHED
- **Published Date**: February 17, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 09:44 UTC
- **Reserved Date**: December 01, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Adobe - Photoshop**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb23-11.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.