System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46778
- **State**: REJECTED
- **Last Updated**: April 30, 2025 at 02:55 UTC
- **Reserved Date**: April 29, 2025 at 08:42 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3843
- **State**: PUBLISHED
- **Published Date**: May 22, 2014 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 16:18 UTC
- **Reserved Date**: May 22, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Search Everything plugin before 8.1.1 for WordPress allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wordpress.org/plugins/search-everything/changelog)
2. [58502](http://secunia.com/advisories/58502) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6923
- **State**: PUBLISHED
- **Published Date**: September 21, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 12, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ndvbs module in VBox Communications Satellite Express Protocol 2.3.17.3 allows local users to write to arbitrary physical memory locations and gain privileges via a 0x00000ffd ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150917 KL-001-2015-005 : VBox Satellite Express Arbitrary Write Privilege Escalation](http://seclists.org/fulldisclosure/2015/Sep/72)
2. [](http://packetstormsecurity.com/files/133620/VBox-Satellite-Express-Arbitrary-Write-Privilege-Escalation.html)
3. [38225](https://www.exploit-db.com/exploits/38225/)
4. [20150917 KL-001-2015-005 : VBox Satellite Express Arbitrary Write Privilege Escalation](http://www.securityfocus.com/archive/1/536491/100/0/threaded)
5. [](https://www.korelogic.com/Resources/Advisories/KL-001-2015-005.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2801
- **State**: PUBLISHED
- **Published Date**: August 12, 2022 at 19:45 UTC
- **Last Updated**: April 15, 2025 at 13:50 UTC
- **Reserved Date**: August 12, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Automated Beer Parlour Billing System. This affects an unknown part of the component Login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-206247.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Automated Beer Parlour Billing System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.206247) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10537
- **State**: PUBLISHED
- **Published Date**: May 31, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 04:14 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
backbone is a module that adds in structure to a JavaScript heavy application through key-value pairs and custom events connecting to your RESTful API through JSON There exists a potential Cross Site Scripting vulnerability in the `Model#Escape` function of backbone 0.3.3 and earlier, if a user is able to supply input. This is due to the regex that's replacing things to miss the conversion of things such as `<` to `<`.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**HackerOne - backbone node module**
Affected versions:
- <= 0.3.3 (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/108)
2. [](https://github.com/jashkenas/backbone/compare/0.3.3...0.5.0#diff-0d56d0d310de7ff18b3cef9c2f8f75dcL1008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38204
- **State**: PUBLISHED
- **Published Date**: December 30, 2022 at 05:13 UTC
- **Last Updated**: April 10, 2025 at 14:54 UTC
- **Reserved Date**: August 12, 2022 at 00:00 UTC
- **Assigned By**: Esri
### Vulnerability Description
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Esri - ArcGIS Enterprise**
Affected versions:
- Portal for ArcGIS 10.7.1 and 10.8.1 (Status: affected)
### References
1. [](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2022-update-2-patch-is-now-available) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0552
- **State**: PUBLISHED
- **Published Date**: February 04, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:52 UTC
- **Reserved Date**: February 04, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Geo++ GNCASTER 1.4.0.7 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via multiple requests for a non-existent file using a long URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100127 [RT-SA-2010-001] Geo++(R) GNCASTER: Insecure handling of long URLs](http://www.securityfocus.com/archive/1/509194/100/0/threaded)
2. [](http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-001/-geo-r-gncaster-insecure-handling-of-long-urls)
3. [62011](http://osvdb.org/62011)
4. [gncaster-httpget-code-execution(55974)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55974)
5. [38323](http://secunia.com/advisories/38323) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20505
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 21:23 UTC
- **Last Updated**: March 25, 2025 at 16:00 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to an out of bounds read. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. An exploit could allow the attacker to terminate the scanning process.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Cisco - ClamAV**
Affected versions:
- 1.4.0 (Status: affected)
- 1.3.2 (Status: affected)
- 1.0.6 (Status: affected)
- 1.0.5 (Status: affected)
- 1.0.4 (Status: affected)
- 1.0.3 (Status: affected)
- 1.0.2 (Status: affected)
- 1.0.1 (Status: affected)
- 1.0.0 (Status: affected)
- 1.2.x (Status: affected)
- 0.105.x (Status: affected)
- 0.104.x (Status: affected)
- 0.103.11 (Status: affected)
- 0.103.10 (Status: affected)
- 0.103.9 (Status: affected)
- 0.103.8 (Status: affected)
- 0.103.7 (Status: affected)
- 0.103.6 (Status: affected)
- 0.103.5 (Status: affected)
- 0.103.4 (Status: affected)
- 0.103.3 (Status: affected)
- 0.103.2 (Status: affected)
- 0.103.1 (Status: affected)
- 0.103.0 (Status: affected)
### References
1. [](https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2162
- **State**: PUBLISHED
- **Published Date**: July 06, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: July 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in form.inc.php3 in MyGuestbook 0.6.1 allows remote attackers to execute arbitrary PHP code via the lang parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050705 MyGuestbook Remote File Inclusion.](http://marc.info/?l=bugtraq&m=112059876828730&w=2)
2. [](http://www.soulblack.com.ar/repo/papers/advisory/myguestbook_advisory.txt)
3. [15927](http://secunia.com/advisories/15927)
4. [1014387](http://securitytracker.com/id?1014387) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23549
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 11:07 UTC
- **Last Updated**: August 28, 2024 at 20:25 UTC
- **Reserved Date**: January 18, 2023 at 15:32 UTC
- **Assigned By**: Checkmk
### Vulnerability Description
Improper Input Validation in Checkmk <2.2.0p15, <2.1.0p37, <=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-1284: Security Weakness
### Affected Products
**Checkmk GmbH - Checkmk**
Affected versions:
- 2.2.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
### References
1. [](https://checkmk.com/werk/16219) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9404
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Bluetooth, there is possible controlled termination due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112923309
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40067
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 13:45 UTC
- **Last Updated**: September 06, 2024 at 17:58 UTC
- **Reserved Date**: October 05, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Unchecked return value in firmware for some Intel(R) CSME may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-252: Security Weakness
### Affected Products
**n/a - Intel(R) CSME**
Affected versions:
- See references (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0361
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2344](http://www.securityfocus.com/bid/2344)
2. [2116](http://www.osvdb.org/2116)
3. [DSA-027](http://www.debian.org/security/2001/dsa-027)
4. [DSA-023](http://www.debian.org/security/2001/dsa-023)
5. [ssh-session-key-recovery(6082)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6082)
6. [L-047](http://www.ciac.org/ciac/bulletins/l-047.shtml)
7. [DSA-086](http://www.debian.org/security/2001/dsa-086)
8. [FreeBSD-SA-01:24](ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc)
9. [20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability](http://marc.info/?l=bugtraq&m=98158450021686&w=2)
10. [SuSE-SA:2001:04](http://www.novell.com/linux/security/advisories/adv004_ssh.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15264
- **State**: PUBLISHED
- **Published Date**: October 11, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 19:50 UTC
- **Reserved Date**: October 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView version 4.44 (32bit) allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .tif file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at image00000000_00400000+0x00000000000236e4."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15264) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22593
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 14:57 UTC
- **Last Updated**: January 07, 2025 at 16:56 UTC
- **Reserved Date**: January 07, 2025 at 10:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Burria Laika Pedigree Tree allows Stored XSS.This issue affects Laika Pedigree Tree: from n/a through 1.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Burria - Laika Pedigree Tree**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/laika-pedigree-tree/vulnerability/wordpress-laika-pedigree-tree-plugin-1-4-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24227
- **State**: PUBLISHED
- **Published Date**: February 15, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:24 UTC
- **Reserved Date**: January 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in BoltWire v7.10 and v 8.00 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Nguyen-Trung-Kien/CVE)
2. [](https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24227/CVE-2022-24227.pdf)
3. [](https://github.com/Cyber-Wo0dy/report/blob/main/boltwire/v8.00/boltwire_xss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5094
- **State**: PUBLISHED
- **Published Date**: October 20, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 11:34 UTC
- **Reserved Date**: July 24, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Status2k allows remote attackers to obtain configuration information via a phpinfo action in a request to status/index.php, which calls the phpinfo function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html)
2. [status2k-cve20145094-info-disc(95114)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95114) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-45857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-45857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-45857
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 00:00 UTC
- **Last Updated**: May 14, 2025 at 13:44 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EDIMAX CV7428NS v1.20 was discovered to contain a remote code execution (RCE) vulnerability via the command parameter in the mp function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.edimax.com/)
2. [](https://github.com/Jiangxiazhe/IOT_hack/blob/main/EDIMAX/CV7428NS/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8309
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: April 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html)
2. [GLSA-201706-03](https://security.gentoo.org/glsa/201706-03)
3. [98302](http://www.securityfocus.com/bid/98302)
4. [RHSA-2017:2408](https://access.redhat.com/errata/RHSA-2017:2408)
5. [[qemu-devel] 20170428 [PATCH] audio: release capture buffers](https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05587.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41016
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 06:37 UTC
- **Last Updated**: May 04, 2025 at 09:20 UTC
- **Reserved Date**: July 12, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested. It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.323 (Status: unaffected)
- 5.4.285 (Status: unaffected)
- 5.10.227 (Status: unaffected)
- 5.15.168 (Status: unaffected)
- 6.1.112 (Status: unaffected)
- 6.6.53 (Status: unaffected)
- 6.10.12 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e2b3d7a9d019d4d1a0da6c3ea64a1ff79c99c090)
2. [](https://git.kernel.org/stable/c/e8f9c4af7af7e9e4cd09c0251c7936593147419f)
3. [](https://git.kernel.org/stable/c/57a3d89831fcaa2cdbe024b47c7c36d5a56c3637)
4. [](https://git.kernel.org/stable/c/c031d286eceb82f72f8623b7f4abd2aa491bfb5e)
5. [](https://git.kernel.org/stable/c/cfb926051fab19b10d1e65976211f364aa820180)
6. [](https://git.kernel.org/stable/c/c726dea9d0c806d64c26fcef483b1fb9474d8c5e)
7. [](https://git.kernel.org/stable/c/e4ffea01adf3323c821b6f37e9577d2d400adbaa)
8. [](https://git.kernel.org/stable/c/af77c4fc1871847b528d58b7fdafb4aa1f6a9262) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8591
- **State**: PUBLISHED
- **Published Date**: April 28, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 10, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
log_query.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [98343](http://www.securityfocus.com/bid/98343)
2. [](http://packetstormsecurity.com/files/142217/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-log_query.cgi-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3713
- **State**: PUBLISHED
- **Published Date**: December 01, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 20:14 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: Sophos
### Vulnerability Description
A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall releases older than version 19.5 GA.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Sophos - Sophos Firewall**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.sophos.com/en-us/security-advisories/sophos-sa-20221201-sfos-19-5-0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7631
- **State**: PUBLISHED
- **Published Date**: October 14, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 01, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-513)
2. [RHSA-2015:2024](http://rhn.redhat.com/errata/RHSA-2015-2024.html)
3. [openSUSE-SU-2015:1744](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html)
4. [77061](http://www.securityfocus.com/bid/77061)
5. [SUSE-SU-2015:1742](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html)
6. [RHSA-2015:1893](http://rhn.redhat.com/errata/RHSA-2015-1893.html)
7. [GLSA-201511-02](https://security.gentoo.org/glsa/201511-02)
8. [1033797](http://www.securitytracker.com/id/1033797)
9. [](https://helpx.adobe.com/security/products/flash-player/apsb15-25.html)
10. [SUSE-SU-2015:1740](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html)
11. [openSUSE-SU-2015:1781](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6673
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 12:50 UTC
- **Last Updated**: August 02, 2024 at 08:35 UTC
- **Reserved Date**: December 11, 2023 at 08:49 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Reflected XSS.This issue affects CyberMath: from v.1.4 before v.1.5.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**National Keep Cyber Security Services - CyberMath**
Affected versions:
- v1.4 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-0080)
### Credits
- Serhat YAPICI |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2751
- **State**: PUBLISHED
- **Published Date**: April 10, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SAP Print and Output Management has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57737](http://secunia.com/advisories/57737)
2. [](http://www.onapsis.com/get.php?resid=adv_onapsis-2014-004)
3. [](http://www.onapsis.com/research-advisories.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17259
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34116
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 11:26 UTC
- **Last Updated**: August 07, 2024 at 14:55 UTC
- **Reserved Date**: April 30, 2024 at 19:50 UTC
- **Assigned By**: adobe
### Vulnerability Description
Creative Cloud Desktop versions 6.1.0.587 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to load and execute malicious libraries, leading to arbitrary file delete. Exploitation of this issue requires user interaction.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Adobe - Creative Cloud Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/creative-cloud/apsb24-44.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20056
- **State**: PUBLISHED
- **Published Date**: December 29, 2019 at 18:10 UTC
- **Last Updated**: August 05, 2024 at 02:32 UTC
- **Reserved Date**: December 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/saitoha/libsixel/issues/126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0334
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
xtell (xtelld) 1.91.1 and earlier, and 2.x before 2.7, allows local users to modify files via a symlink attack on the .xtell-log file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4197](http://www.securityfocus.com/bid/4197)
2. [20020227 Remote exploit against xtelld and other fun](http://marc.info/?l=bugtraq&m=101494896516467&w=2)
3. [xtell-log-symlink(8314)](http://www.iss.net/security_center/static/8314.php)
4. [DSA-121](http://www.debian.org/security/2002/dsa-121) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1607
- **State**: PUBLISHED
- **Published Date**: April 01, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: April 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in haberoku.php in Serbay Arslanhan Bomba Haber 2.0 allows remote attackers to execute arbitrary SQL commands via the haber parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28435](http://www.securityfocus.com/bid/28435)
2. [bombahaber-haberoku-sql-injection(41422)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41422) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0739
- **State**: PUBLISHED
- **Published Date**: August 09, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:45 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A information disclosure vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37712181.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 5.0.2 (Status: affected)
- 5.1.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
### References
1. [100204](http://www.securityfocus.com/bid/100204)
2. [](https://source.android.com/security/bulletin/2017-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4767
- **State**: PUBLISHED
- **Published Date**: April 20, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: April 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in index.php in Plohni Shoutbox 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) input_name and (2) input_text parameters. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37418](http://secunia.com/advisories/37418)
2. [60310](http://osvdb.org/60310)
3. [shoutbox-name-xss(54321)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54321)
4. [10168](http://www.exploit-db.com/exploits/10168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4083
- **State**: PUBLISHED
- **Published Date**: January 18, 2022 at 16:51 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: December 09, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.16-rc4 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2029923)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9)
3. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html)
4. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html)
5. [DSA-5096](https://www.debian.org/security/2022/dsa-5096)
6. [](https://www.oracle.com/security-alerts/cpujul2022.html)
7. [](https://security.netapp.com/advisory/ntap-20220217-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12476
- **State**: PUBLISHED
- **Published Date**: January 27, 2020 at 08:30 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: June 15, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**SUSE - SUSE Linux Enterprise Server 15**
Affected versions:
- obs-service-tar_scm (Status: affected)
**openSUSE - Factory**
Affected versions:
- obs-service-tar_scm (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1107944)
### Credits
- Matthias Gerstner of SUSE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44385
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 21:42 UTC
- **Last Updated**: April 15, 2025 at 19:16 UTC
- **Reserved Date**: November 29, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzSerial param is not object. An attacker can send an HTTP request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27600
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 20:11 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HNAP1/control/SetMasterWLanSettings.php in D-Link D-Link Router DIR-846 DIR-846 A1_100.26 allows remote attackers to execute arbitrary commands via shell metacharacters in the ssid0 or ssid1 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://www.dlink.com)
3. [](https://github.com/pwnninja/dlink/blob/main/DIR-846_SetMasterWLanSettingsCI.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48457
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:17 UTC
- **Last Updated**: October 07, 2024 at 14:13 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35167
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 19:03 UTC
- **Last Updated**: November 07, 2024 at 19:04 UTC
- **Reserved Date**: June 14, 2023 at 14:17 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Remult is a CRUD framework for full-stack TypeScript. If you used the apiPrefilter option of the `@Entity` decorator, by setting it to a function that returns a filter that prevents unauthorized access to data, an attacker who knows the `id` of an entity instance is not authorized to access, can gain read, update and delete access to it. The issue is fixed in version 0.20.6. As a workaround, set the `apiPrefilter` option to a filter object instead of a function.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**remult - remult**
Affected versions:
- < 0.20.6 (Status: affected)
### References
1. [https://github.com/remult/remult/security/advisories/GHSA-7hh3-3x64-v2g9](https://github.com/remult/remult/security/advisories/GHSA-7hh3-3x64-v2g9)
2. [https://github.com/remult/remult/commit/6892ae97134126d8710ef7302bb2fc37730994c5](https://github.com/remult/remult/commit/6892ae97134126d8710ef7302bb2fc37730994c5)
3. [https://github.com/remult/remult/releases/tag/v0.20.6](https://github.com/remult/remult/releases/tag/v0.20.6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1880
- **State**: PUBLISHED
- **Published Date**: April 06, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the _NtSetValueKey function in klif.sys in Kaspersky Anti-Virus, Anti-Virus for Workstations, Anti-Virus for File Server 6.0, and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows context-dependent attackers to execute arbitrary code via a large, unsigned "data size argument," which results in a heap overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33851](http://www.osvdb.org/33851)
2. [23326](http://www.securityfocus.com/bid/23326)
3. [24778](http://secunia.com/advisories/24778)
4. [20070404 Kaspersky Internet Security Suite klif.sys Heap Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=505)
5. [](http://www.kaspersky.com/technews?id=203038694)
6. [ADV-2007-1268](http://www.vupen.com/english/advisories/2007/1268)
7. [1017873](http://www.securitytracker.com/id?1017873)
8. [kaspersky-klif-bo(33460)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33460)
9. [1017872](http://www.securitytracker.com/id?1017872)
10. [](http://www.kaspersky.com/technews?id=203038693) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43440
- **State**: PUBLISHED
- **Published Date**: December 20, 2021 at 19:06 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MartDevelopers-Inc/Order_Processing_MIS)
2. [](https://medium.com/%40mayhem7999/cve-2021-43439-d04781bca6ce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24984
- **State**: PUBLISHED
- **Published Date**: December 27, 2021 at 10:33 UTC
- **Last Updated**: August 03, 2024 at 19:49 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPFront User Role Editor WordPress plugin before 3.2.1.11184 does not sanitise and escape the changes-saved parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - WPFront User Role Editor**
Affected versions:
- 3.2.1.11184 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/96bb2fba-4b18-4c29-8344-3ba4d2f06a19)
### Credits
- JrXnm |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2309
- **State**: PUBLISHED
- **Published Date**: October 26, 2007 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: October 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020721 PHP Resource Exhaustion Denial of Service](http://online.securityfocus.com/archive/1/283586)
2. [20020720 PHP Resource Exhaustion Denial of Service](http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000605.html)
3. [php-no-argument-dos(9646)](http://www.iss.net/security_center/static/9646.php)
4. [5280](http://www.securityfocus.com/bid/5280) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2704
- **State**: PUBLISHED
- **Published Date**: November 22, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Smarthome 1.0.2.364 and earlier versions,HiAPP 7.3.0.303 and earlier versions,HwParentControl 2.0.0 and earlier versions,HwParentControlParent 5.1.0.12 and earlier versions,Crowdtest 1.5.3 and earlier versions,HiWallet 8.0.0.301 and earlier versions,Huawei Pay 8.0.0.300 and earlier versions,Skytone 8.1.2.300 and earlier versions,HwCloudDrive(EMUI6.0) 8.0.0.307 and earlier versions,HwPhoneFinder(EMUI6.0) 9.3.0.310 and earlier versions,HwPhoneFinder(EMUI5.1) 9.2.2.303 and earlier versions,HiCinema 8.0.2.300 and earlier versions,HuaweiWear 21.0.0.360 and earlier versions,HiHealthApp 3.0.3.300 and earlier versions have an information exposure vulnerability. Encryption keys are stored in the system. The attacker can implement reverse engineering to obtain the encryption keys, causing information exposure.
### Affected Products
**Huawei Technologies Co., Ltd. - Smarthome,HiAPP,HwParentControl,HwParentControlParent,Crowdtest,HiWallet,Huawei Pay,Skytone,HwCloudDrive(EMUI6.0),HwPhoneFinder?¡§EMUI6.0??,HwPhoneFinder?¡§EMUI5.1??,HiCinema,HuaweiWear,HiHealthApp,**
Affected versions:
- Smarthome 1.0.2.364 and earlier versions,HiAPP 7.3.0.303 and earlier versions,HwParentControl 2.0.0 and earlier versions,HwParentControlParent 5.1.0.12 and earlier versions,Crowdtest 1.5.3 and earlier versions,HiWallet 8.0.0.301 and earlier versions,Huawei Pay 8.0.0.300 and earlier versions,Skytone 8.1.2.300 and earlier versions,HwCloudDrive(EMUI6.0) 8.0.0.307 and earlier versions,HwPhoneFinder EMUI6.0 9.3.0.310 and earlier versions,HwPhoneFinder EMUI5.1 9.2.2.303 and earlier versions,HiCinema 8.0.2.300 and earlier versions,HuaweiWear 21.0.0.360 and earlier versions,HiHealthApp 3.0.3.300 and earlier versions, (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170920-01-encryption-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30957
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:54 UTC
- **Last Updated**: June 06, 2025 at 15:11 UTC
- **Reserved Date**: March 26, 2025 at 09:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in BuddyDev Activity Plus Reloaded for BuddyPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Activity Plus Reloaded for BuddyPress: from n/a through 1.1.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**BuddyDev - Activity Plus Reloaded for BuddyPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/bp-activity-plus-reloaded/vulnerability/wordpress-activity-plus-reloaded-for-buddypress-1-1-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Nguyen Tran Tuan Dung (domiee13) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3746
- **State**: PUBLISHED
- **Published Date**: October 19, 2021 at 14:07 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: August 27, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - libtpms**
Affected versions:
- libtpms 0.8.5, libtpms 0.7.9, libtpms 0.6.6 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1998588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7664
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Accessibility" component. which allows physically proximate attackers to obtain sensitive photo and contact information by leveraging the availability of excessive options during lockscreen access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207422)
2. [1037429](http://www.securitytracker.com/id/1037429)
3. [94850](http://www.securityfocus.com/bid/94850) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0792
- **State**: PUBLISHED
- **Published Date**: February 06, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mod_perl initialization script in Bugzilla 2.23.3 does not set the Bugzilla Apache configuration to allow .htaccess permissions to override file permissions, which allows remote attackers to obtain the database username and password via a direct request for the localconfig file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35862](http://osvdb.org/35862)
2. [2222](http://securityreason.com/securityalert/2222)
3. [22380](http://www.securityfocus.com/bid/22380)
4. [1017585](http://securitytracker.com/id?1017585)
5. [20070203 Security Advisory for Bugzilla 2.20.3, 2.22.1, and 2.23.3](http://www.securityfocus.com/archive/1/459025/100/0/threaded)
6. [](http://www.bugzilla.org/security/2.20.3/)
7. [ADV-2007-0477](http://www.vupen.com/english/advisories/2007/0477)
8. [bugzilla-htaccess-information-disclosure(32252)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32252) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17325
- **State**: PUBLISHED
- **Published Date**: October 30, 2019 at 20:55 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 07, 2019 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
ClipSoft REXPERT 1.0.0.527 and earlier version allows remote attacker to upload arbitrary local file via the ActiveX method in RexViewerCtrl30.ocx. That could lead to disclosure of sensitive information. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**ClipSoft - REXPERT**
Affected versions:
- 1.0.0.527 and earlier (Status: affected)
### References
1. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35184) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32609
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 02, 2025 at 18:21 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In vcu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203410; Issue ID: ALPS07203410.
### Affected Products
**MediaTek, Inc. - MT6762, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8185, MT8365, MT8696, MT8768, MT8786, MT8789, MT8791, MT8797, MT8798**
Affected versions:
- Android 11.0, 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/November-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26912
- **State**: PUBLISHED
- **Published Date**: October 09, 2020 at 06:31 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 09, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:N/C:H/I:H/PR:N/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000062341/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Routers-PSV-2019-0018) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28135
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 08:09 UTC
- **Last Updated**: January 24, 2025 at 06:35 UTC
- **Reserved Date**: March 05, 2024 at 08:10 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
A low privileged remote attacker can use a command injection vulnerability in the API which performs
remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**PHOENIX CONTACT - CHARX SEC-3000**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - CHARX SEC-3050**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - CHARX SEC-3100**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - CHARX SEC-3150**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2024-019)
### Credits
- Trend Micro's Zero Day Initiative
- Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6976
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036986](http://www.securitytracker.com/id/1036986)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb16-33.html)
3. [93496](http://www.securityfocus.com/bid/93496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7934
- **State**: PUBLISHED
- **Published Date**: January 28, 2020 at 13:03 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and Last Name fields for user accounts in MyAccountPortlet are all vulnerable to a persistent XSS issue. Any user can modify these fields with a particular XSS payload, and it will be stored in the database. The payload will then be rendered when a user utilizes the search feature to search for other users (i.e., if a user with modified fields occurs in the search results). This issue was fixed in Liferay Portal CE version 7.3.0 GA1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://semanticbits.com/liferay-portal-authenticated-xss-disclosure/)
2. [](https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934)
3. [](http://packetstormsecurity.com/files/160168/LifeRay-7.2.1-GA2-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2928
- **State**: PUBLISHED
- **Published Date**: August 29, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: June 30, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted Accept-Language HTTP header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=453916)
2. [1020771](http://securitytracker.com/id?1020771)
3. [SSRT080113](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861)
4. [](http://www.redhat.com/docs/manuals/dir-server/release-notes/7.1SP7/index.html)
5. [31702](http://secunia.com/advisories/31702)
6. [RHSA-2008:0596](https://rhn.redhat.com/errata/RHSA-2008-0596.html)
7. [HPSBUX02354](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01532861)
8. [30869](http://www.securityfocus.com/bid/30869)
9. [ADV-2008-2480](http://www.vupen.com/english/advisories/2008/2480)
10. [FEDORA-2008-7642](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html)
11. [FEDORA-2008-7339](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html)
12. [31777](http://secunia.com/advisories/31777)
13. [oval:org.mitre.oval:def:5865](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5865)
14. [rhds-acceptlanguage-bo(44738)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44738)
15. [31565](http://secunia.com/advisories/31565) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4425
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 09:37 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 02, 2024 at 11:55 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
The access control in CemiPark software stores integration (e.g. FTP or SIP) credentials in plain-text. An attacker who gained unauthorized access to the device can retrieve clear text passwords used by the system.This issue affects CemiPark software: 4.5, 4.7, 5.03 and potentially others. The vendor refused to provide the specific range of affected products.
### Weakness Classification (CWE)
- CWE-256: Security Weakness
### Affected Products
**CEMI Tomasz Pawełek - CemiPark**
Affected versions:
- 4.5 (Status: affected)
- 4.7 (Status: affected)
- 5.03 (Status: affected)
### References
1. [](https://cert.pl/en/posts/2024/05/CVE-2024-4423/)
2. [](https://cert.pl/posts/2024/05/CVE-2024-4423/)
3. [](http://cemi.pl/)
### Credits
- Dariusz Gońda |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0507
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 15:26 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 8.1, 8.5, 8.7, 9.1 has a Session Fixation Vulnerability
### Affected Products
**IBM - IBM InfoSphere Information Server**
Affected versions:
- 8.1 (Status: affected)
- 8.5 (Status: affected)
- 8.7 (Status: affected)
- 9.1 (Status: affected)
### References
1. [](http://www.securityfocus.com/bid/59815) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1034
- **State**: PUBLISHED
- **Published Date**: June 12, 2019 at 13:49 UTC
- **Last Updated**: May 20, 2025 at 17:50 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.
To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.
The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory.
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Enterprise Server 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Office 365 ProPlus**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Word 2016**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2016 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Office Web Apps 2010 Service Pack 2**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Word 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Word 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Microsoft Word 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
### References
1. [Microsoft Word Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4154
- **State**: PUBLISHED
- **Published Date**: April 03, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. The issue involves the "Storage" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT208692)
2. [1040604](http://www.securitytracker.com/id/1040604)
3. [103581](http://www.securityfocus.com/bid/103581)
4. [](https://support.apple.com/HT208693)
5. [105273](http://www.securityfocus.com/bid/105273)
6. [1040608](http://www.securitytracker.com/id/1040608) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0869
- **State**: PUBLISHED
- **Published Date**: September 21, 2021 at 12:11 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In GetTimeStampAndPkt of DumpstateDevice.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-179620905 References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0915
- **State**: PUBLISHED
- **Published Date**: February 22, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Mediation server in IPdiva SSL VPN Server 2.2 before 2.2.8.84 and 2.3 before 2.3.2.14 stores the number of remaining allowed login attempts in a cookie, which makes it easier for remote attackers to conduct brute force attacks by manipulating this cookie's value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28963](http://secunia.com/advisories/28963)
2. [20080214 DOINGSOFT-2008-02-11 - IPDiva VPN SSL Brute force attack](http://www.securityfocus.com/archive/1/488133/100/100/threaded)
3. [27800](http://www.securityfocus.com/bid/27800)
4. [3692](http://securityreason.com/securityalert/3692)
5. [20080214 DOINGSOFT-2008-02-11 - IPDiva VPN SSL Brute force attack](http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060314.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5909
- **State**: PUBLISHED
- **Published Date**: July 02, 2020 at 12:26 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
### Affected Products
**n/a - NGINX Controller**
Affected versions:
- 3.0.0-3.5.0, 2.0.0-2.9.0, 1.0.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K31150658) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10573
- **State**: PUBLISHED
- **Published Date**: March 14, 2020 at 19:07 UTC
- **Last Updated**: August 04, 2024 at 11:06 UTC
- **Reserved Date**: March 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Janus through 0.9.1. janus_audiobridge.c has a double mutex unlock when listing private rooms in AudioBridge.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/meetecho/janus-gateway/pull/1988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6418
- **State**: PUBLISHED
- **Published Date**: June 30, 2024 at 23:00 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: June 30, 2024 at 14:51 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in SourceCodester Medicine Tracker System 1.0. This affects an unknown part of the file /classes/Users.php?f=register_user. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-270009 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Medicine Tracker System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-270009 | SourceCodester Medicine Tracker System sql injection](https://vuldb.com/?id.270009)
2. [VDB-270009 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.270009)
3. [Submit #365240 | SourceCodester Medicine Tracker System 1.0 SQL Injection](https://vuldb.com/?submit.365240)
4. [](https://github.com/jadu101/CVE/blob/main/SourceCodester_Medicine_Tracker_System_Users_php_sqli.md)
### Credits
- jadu101 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2137
- **State**: PUBLISHED
- **Published Date**: May 02, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: May 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in master.php in OpenPHPNuke and 2.3.3 earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.openphpnuke.com/system/article/index.php?opnparams=B3YBZAI3BWgEbFU0)
2. [openphpnuke-master-file-include(26183)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26183)
3. [ADV-2006-1575](http://www.vupen.com/english/advisories/2006/1575)
4. [25140](http://www.osvdb.org/25140)
5. [19893](http://secunia.com/advisories/19893)
6. [17772](http://www.securityfocus.com/bid/17772)
7. [1727](https://www.exploit-db.com/exploits/1727) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3009
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 01, 2024 at 16:22 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection). Supported versions that are affected are 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.17 and prior (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
2. [](https://security.netapp.com/advisory/ntap-20191017-0002/)
3. [FEDORA-2019-c1fab3f139](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/)
4. [FEDORA-2019-d40df38271](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/)
5. [FEDORA-2019-48a0a07033](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/)
6. [USN-4195-1](https://usn.ubuntu.com/4195-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3578
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 08:42 UTC
- **Last Updated**: April 15, 2025 at 13:57 UTC
- **Reserved Date**: April 14, 2025 at 10:21 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A malicious, authenticated user in Aidex, versions prior to 1.7, could list credentials of other users, create or modify existing users in the application, list credentials of users in production or development environments. In addition, it would be possible to cause bugs that would result in the exfiltration of sensitive information, such as details about the software or internal system paths. These actions could be carried out through the misuse of LLM Prompt (chatbot) technology, via the /api/<string-chat>/message endpoint, by manipulating the contents of the ‘content’ parameter.
### Weakness Classification (CWE)
- CWE-1039: Security Weakness
### Affected Products
**AiDex - AiDex**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-aidex)
### Credits
- David Utón Amaya (m3n0sd0n4ld) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6169
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 23, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html)
2. [RHSA-2018:2282](https://access.redhat.com/errata/RHSA-2018:2282)
3. [GLSA-201808-01](https://security.gentoo.org/glsa/201808-01)
4. [DSA-4256](https://www.debian.org/security/2018/dsa-4256)
5. [](https://crbug.com/394518)
6. [104887](http://www.securityfocus.com/bid/104887) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15318
- **State**: PUBLISHED
- **Published Date**: August 22, 2019 at 12:43 UTC
- **Last Updated**: August 05, 2024 at 00:42 UTC
- **Reserved Date**: August 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The yikes-inc-easy-mailchimp-extender plugin before 6.5.3 for WordPress has code injection via the admin input field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/yikes-inc-easy-mailchimp-extender/#developers)
2. [](https://wpvulndb.com/vulnerabilities/9583) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3691
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 20:01 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Some implementations in Intel Integrated Performance Primitives Cryptography Library before version 2018 U3.1 do not properly ensure constant execution time.
### Affected Products
**Intel Corporation - Integrated Performance Primitives Cryptography Library**
Affected versions:
- before 2018 U3.1 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00106.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57438
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 00:00 UTC
- **Last Updated**: February 06, 2025 at 15:33 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure permissions in RuoYi v4.8.0 allows authenticated attackers to escalate privileges by assigning themselves higher level roles.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yangzongzhuan/RuoYi)
2. [](https://gitee.com/y_project/RuoYi)
3. [](https://ruoyi.vip/)
4. [](https://github.com/peccc/restful_vul/blob/main/ruoyi_insecure_role_assignments/ruoyi_insecure_role_assignments.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22153
- **State**: PUBLISHED
- **Published Date**: May 13, 2021 at 10:43 UTC
- **Last Updated**: August 03, 2024 at 18:37 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: blackberry
### Vulnerability Description
A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim’s local machine with the authority of the user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.blackberry.com/kb/articleDetail?articleNumber=000078971) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30634
- **State**: PUBLISHED
- **Published Date**: July 15, 2022 at 19:36 UTC
- **Last Updated**: August 03, 2024 at 06:56 UTC
- **Reserved Date**: May 12, 2022 at 00:00 UTC
- **Assigned By**: Go
### Vulnerability Description
Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.
### Affected Products
**Go standard library - crypto/rand**
Affected versions:
- 0 (Status: affected)
- 1.18.0-0 (Status: affected)
### References
1. [](https://go.dev/cl/402257)
2. [](https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863)
3. [](https://go.dev/issue/52561)
4. [](https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ)
5. [](https://pkg.go.dev/vuln/GO-2022-0477)
### Credits
- Davis Goodin
- Quim Muntal of Microsoft |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6877
- **State**: PUBLISHED
- **Published Date**: January 05, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 20:42 UTC
- **Reserved Date**: January 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in Matteo Lucarelli 3editor CMS 0.42 and earlier, when register_globals is enabled, allows remote attackers to include arbitrary files via a .. (dot dot) in the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23478](http://secunia.com/advisories/23478)
2. [ADV-2006-5144](http://www.vupen.com/english/advisories/2006/5144)
3. [2982](https://www.exploit-db.com/exploits/2982) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3917
- **State**: PUBLISHED
- **Published Date**: October 11, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The multiplayer engine in Wesnoth 1.2.x before 1.2.7 and 1.3.x before 1.3.9 allows remote servers to cause a denial of service (crash) via a long message with multibyte characters that can produce an invalid UTF-8 string after it is truncated, which triggers an uncaught exception, involving the truncate_message function in server/server.cpp. NOTE: this issue affects both clients and servers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.wesnoth.org/forum/viewtopic.php?p=256618)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=324841)
3. [](http://www.wesnoth.org/forum/viewtopic.php?t=18188)
4. [41711](http://osvdb.org/41711)
5. [25995](http://www.securityfocus.com/bid/25995)
6. [](http://svn.gna.org/viewcvs/wesnoth/tags/1.2.7/changelog?rev=20982&view=download)
7. [27218](http://secunia.com/advisories/27218)
8. [FEDORA-2007-2496](https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00194.html)
9. [wesnoth-utf8-dos(37047)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37047)
10. [27241](http://secunia.com/advisories/27241)
11. [DSA-1386](http://www.debian.org/security/2007/dsa-1386)
12. [ADV-2007-3449](http://www.vupen.com/english/advisories/2007/3449)
13. [27137](http://secunia.com/advisories/27137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31744
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Jasper 4.2.2, the jpc_streamlist_remove function in src/libjasper/jpc/jpc_dec.c:2407 has an assertion failure vulnerability, allowing attackers to cause a denial of service attack through a specific image file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jasper-software/jasper/issues/381)
2. [](https://github.com/jasper-software/jasper/commit/6d084c53a77762f41bb5310713a5f1872fef55f5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2829
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:15 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Enterprise Management Console). The supported version that is affected is 2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Simphony accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Simphony. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).
### Affected Products
**Oracle Corporation - Hospitality Simphony**
Affected versions:
- 2.10 (Status: affected)
### References
1. [103884](http://www.securityfocus.com/bid/103884)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0406
- **State**: PUBLISHED
- **Published Date**: June 11, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 10, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PalmVNC 1.40 and earlier stores passwords in plaintext in the PalmVNCDB, which is backed up to PCs that the Palm is synchronized with, which could allow attackers to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7696](http://www.securityfocus.com/bid/7696)
2. [20030526 PalmVNC 1.40 Insecure Records](http://marc.info/?l=bugtraq&m=105405691423389&w=2)
3. [palmvnc-plaintext-passwords(12083)](http://www.iss.net/security_center/static/12083.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1135
- **State**: PUBLISHED
- **Published Date**: July 15, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: March 25, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Security and Acceleration (ISA) Server 2006 Gold and SP1, when Radius OTP is enabled, uses the HTTP-Basic authentication method, which allows remote attackers to gain the privileges of an arbitrary account, and access published web pages, via vectors involving attempted access to a network resource behind the ISA Server, aka "Radius OTP Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1022547](http://www.securitytracker.com/id?1022547)
2. [oval:org.mitre.oval:def:5649](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5649)
3. [MS09-031](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-031)
4. [ADV-2009-1889](http://www.vupen.com/english/advisories/2009/1889)
5. [TA09-195A](http://www.us-cert.gov/cas/techalerts/TA09-195A.html)
6. [35784](http://secunia.com/advisories/35784) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25797
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 17:06 UTC
- **Last Updated**: August 04, 2024 at 15:40 UTC
- **Reserved Date**: September 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LimeSurvey 3.21.1 is affected by cross-site scripting (XSS) in the Add Participants Function (First and last name parameters). When the survey participant being edited, e.g. by an administrative user, the JavaScript code will be executed in the browser.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.limesurvey.org/view.php?id=15680)
2. [](https://github.com/LimeSurvey/LimeSurvey/commit/0a7bdfa1c166f734d11a1528c8d9a7d61b670ad7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4129
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 15:56 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 95, Firefox ESR < 91.4.0, and Thunderbird < 91.4.0.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-53/)
2. [](https://www.mozilla.org/security/advisories/mfsa2021-54/)
3. [](https://www.mozilla.org/security/advisories/mfsa2021-52/)
4. [](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1393362%2C1736046%2C1736751%2C1737009%2C1739372%2C1739421) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4055
- **State**: PUBLISHED
- **Published Date**: September 11, 2008 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 19:09 UTC
- **Reserved Date**: September 11, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in tops_top.php in Million Pixel Ad Script (Million Pixel Script) allows remote attackers to execute arbitrary SQL commands via the id_cat parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstorm.linuxsecurity.com/0808-exploits/millionpixel-sql.txt)
2. [31626](http://secunia.com/advisories/31626) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1049
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka 'Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability'. This CVE ID is unique from CVE-2020-1050.
### Affected Products
**Microsoft - Dynamics 365 Server, version 9.0 (on-premises)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0693
- **State**: PUBLISHED
- **Published Date**: July 06, 2017 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:39 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36993291.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-07-01)
2. [99478](http://www.securityfocus.com/bid/99478) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32708
- **State**: PUBLISHED
- **Published Date**: June 01, 2023 at 16:34 UTC
- **Last Updated**: February 28, 2025 at 11:03 UTC
- **Reserved Date**: May 11, 2023 at 20:55 UTC
- **Assigned By**: Splunk
### Vulnerability Description
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially access other REST endpoints in the system arbitrarily.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Splunk - Splunk Enterprise**
Affected versions:
- 8.1 (Status: affected)
- 8.2 (Status: affected)
- 9.0 (Status: affected)
**Splunk - Splunk Cloud Platform**
Affected versions:
- - (Status: affected)
### References
1. [](https://advisory.splunk.com/advisories/SVD-2023-0603)
2. [](https://research.splunk.com/application/e615a0e1-a1b2-4196-9865-8aa646e1708c/)
### Credits
- Danylo Dmytriiev (DDV_UA) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26813
- **State**: PUBLISHED
- **Published Date**: March 03, 2021 at 15:17 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/trentm/python-markdown2/pull/387)
2. [FEDORA-2021-77191478ad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/)
3. [FEDORA-2021-0337384e41](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/)
4. [FEDORA-2021-e235a0da4a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28034
- **State**: PUBLISHED
- **Published Date**: April 22, 2025 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 15:01 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth remote command execution vulnerability in the NTPSyncWithHost function through the hostTime parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://locrian-lightning-dc7.notion.site/RCE2-1a98e5e2b1a280bebf53d868f1b1a711?pvs=74) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3790
- **State**: PUBLISHED
- **Published Date**: August 27, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 09:52 UTC
- **Reserved Date**: August 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-651-1](https://usn.ubuntu.com/651-1/)
2. [33185](http://secunia.com/advisories/33185)
3. [oval:org.mitre.oval:def:10393](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10393)
4. [](http://support.apple.com/kb/HT3549)
5. [](http://www.ruby-lang.org/security/20080823rexml/rexml-expansion-fix.rb)
6. [1020735](http://www.securitytracker.com/id?1020735)
7. [DSA-1652](http://www.debian.org/security/2008/dsa-1652)
8. [FEDORA-2008-8736](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html)
9. [ADV-2008-2428](http://www.vupen.com/english/advisories/2008/2428)
10. [ruby-rexml-dos(44628)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44628)
11. [35074](http://secunia.com/advisories/35074)
12. [[oss-security] 20080826 Re: CVE Request (ruby)](http://www.openwall.com/lists/oss-security/2008/08/26/4)
13. [](http://weblog.rubyonrails.org/2008/9/3/rails-2-0-4-maintenance-release)
14. [](http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm)
15. [DSA-1651](http://www.debian.org/security/2008/dsa-1651)
16. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html)
17. [](http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/)
18. [RHSA-2008:0897](http://www.redhat.com/support/errata/RHSA-2008-0897.html)
19. [](http://groups.google.com/group/comp.lang.ruby/browse_thread/thread/19f69e8a081fc0d1/e138e014b74352ca)
20. [[oss-security] 20080825 CVE Request (ruby)](http://www.openwall.com/lists/oss-security/2008/08/25/4)
21. [32219](http://secunia.com/advisories/32219)
22. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html)
23. [32255](http://secunia.com/advisories/32255)
24. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297)
25. [30802](http://www.securityfocus.com/bid/30802)
26. [USN-691-1](https://usn.ubuntu.com/691-1/)
27. [[oss-security] 20080826 Re: CVE Request (ruby)](http://www.openwall.com/lists/oss-security/2008/08/26/1)
28. [32371](http://secunia.com/advisories/32371)
29. [32165](http://secunia.com/advisories/32165)
30. [GLSA-200812-17](http://security.gentoo.org/glsa/glsa-200812-17.xml)
31. [33178](http://secunia.com/advisories/33178)
32. [FEDORA-2008-8738](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html)
33. [32256](http://secunia.com/advisories/32256)
34. [31602](http://secunia.com/advisories/31602)
35. [ADV-2008-2483](http://www.vupen.com/english/advisories/2008/2483) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36081
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 20:05 UTC
- **Last Updated**: February 13, 2025 at 15:59 UTC
- **Reserved Date**: May 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Westermo EDW-100 devices through 2024-05-03 allow an unauthenticated user to download a configuration file containing a cleartext password. NOTE: this is a serial-to-Ethernet converter that should not be placed at the edge of the network.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30735
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 03:02 UTC
- **Last Updated**: September 19, 2024 at 19:34 UTC
- **Reserved Date**: April 14, 2023 at 01:59 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper Preservation of Permissions vulnerability in SAssistant prior to version 8.7 allows local attackers to access backup data in SAssistant.
### CVSS Metrics
- **CVSS Base Score**: 5.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - SAssistant**
Affected versions:
- 8.7 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18006
- **State**: PUBLISHED
- **Published Date**: January 01, 2018 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 03:27 UTC
- **Reserved Date**: December 31, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
netpub/server.np in Extensis Portfolio NetPublish has XSS in the quickfind parameter, aka Open Bug Bounty ID OBB-290447.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.openbugbounty.org/reports/290447/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5974
- **State**: PUBLISHED
- **Published Date**: July 05, 2019 at 13:20 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Contest Gallery versions prior to 10.4.5 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
### Affected Products
**Contest-Gallery - Contest Gallery**
Affected versions:
- versions prior to 10.4.5 (Status: affected)
### References
1. [](https://wordpress.org/plugins/contest-gallery/)
2. [](https://jvn.jp/en/jp/JVN80925867/index.html)
3. [](https://wpvulndb.com/vulnerabilities/9436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29045
- **State**: PUBLISHED
- **Published Date**: April 12, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 06:10 UTC
- **Reserved Date**: April 11, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
### Affected Products
**Jenkins project - Jenkins promoted builds Plugin**
Affected versions:
- 3.10.1 (Status: unaffected)
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0814
- **State**: PUBLISHED
- **Published Date**: March 14, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 00:50 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0901 and CVE-2018-0926.
### Affected Products
**Microsoft Corporation - Windows kernel**
Affected versions:
- Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 (Status: affected)
### References
1. [103251](http://www.securityfocus.com/bid/103251)
2. [1040517](http://www.securitytracker.com/id/1040517)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0814) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2036
- **State**: PUBLISHED
- **Published Date**: April 13, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 23:17 UTC
- **Reserved Date**: January 22, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The getURL function in drivers/secfilter/urlparser.c in secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to trigger a NULL pointer dereference via a "GET HTTP/1.1" request, aka SVE-2016-5036.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3108
- **State**: PUBLISHED
- **Published Date**: September 08, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Aclient GUI in Symantec Altiris Deployment Solution 6.9.x before 6.9 SP3 Build 430 installs a client executable with insecure permissions (Everyone:Full Control), which allows local users to gain privileges by replacing the executable with a Trojan horse program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36111](http://www.securityfocus.com/bid/36111)
2. [36502](http://secunia.com/advisories/36502)
3. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090826_00)
4. [1022779](http://www.securitytracker.com/id?1022779) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7156
- **State**: PUBLISHED
- **Published Date**: December 25, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 15:56 UTC
- **Reserved Date**: March 17, 2017 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [102181](http://www.securityfocus.com/bid/102181)
2. [1040013](http://www.securitytracker.com/id/1040013)
3. [](https://support.apple.com/HT208327)
4. [1040012](http://www.securitytracker.com/id/1040012)
5. [](https://support.apple.com/HT208334)
6. [](https://support.apple.com/HT208324)
7. [](https://support.apple.com/HT208326)
8. [GLSA-201801-09](https://security.gentoo.org/glsa/201801-09)
9. [](https://support.apple.com/HT208328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6068
- **State**: PUBLISHED
- **Published Date**: February 06, 2009 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the JoomlaDate (com_joomladate) component 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the user parameter in a viewProfile action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5748](https://www.exploit-db.com/exploits/5748)
2. [joomladate-index-sql-injection(42873)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42873)
3. [30441](http://secunia.com/advisories/30441) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50257
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 10:15 UTC
- **Last Updated**: May 04, 2025 at 09:50 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: Fix use-after-free in get_info()
ip6table_nat module unload has refcnt warning for UAF. call trace is:
WARNING: CPU: 1 PID: 379 at kernel/module/main.c:853 module_put+0x6f/0x80
Modules linked in: ip6table_nat(-)
CPU: 1 UID: 0 PID: 379 Comm: ip6tables Not tainted 6.12.0-rc4-00047-gc2ee9f594da8-dirty #205
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:module_put+0x6f/0x80
Call Trace:
<TASK>
get_info+0x128/0x180
do_ip6t_get_ctl+0x6a/0x430
nf_getsockopt+0x46/0x80
ipv6_getsockopt+0xb9/0x100
rawv6_getsockopt+0x42/0x190
do_sock_getsockopt+0xaa/0x180
__sys_getsockopt+0x70/0xc0
__x64_sys_getsockopt+0x20/0x30
do_syscall_64+0xa2/0x1a0
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Concurrent execution of module unload and get_info() trigered the warning.
The root cause is as follows:
cpu0 cpu1
module_exit
//mod->state = MODULE_STATE_GOING
ip6table_nat_exit
xt_unregister_template
kfree(t)
//removed from templ_list
getinfo()
t = xt_find_table_lock
list_for_each_entry(tmpl, &xt_templates[af]...)
if (strcmp(tmpl->name, name))
continue; //table not found
try_module_get
list_for_each_entry(t, &xt_net->tables[af]...)
return t; //not get refcnt
module_put(t->me) //uaf
unregister_pernet_subsys
//remove table from xt_net list
While xt_table module was going away and has been removed from
xt_templates list, we couldnt get refcnt of xt_table->me. Check
module in xt_net->tables list re-traversal to fix it.
### Affected Products
**Linux - Linux**
Affected versions:
- fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 (Status: affected)
- fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 (Status: affected)
- fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 (Status: affected)
- fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 (Status: affected)
- fdacd57c79b79a03c7ca88f706ad9fb7b46831c1 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.171 (Status: unaffected)
- 6.1.116 (Status: unaffected)
- 6.6.60 (Status: unaffected)
- 6.11.7 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ba22ea01348384df19cc1fabc7964be6e7189749)
2. [](https://git.kernel.org/stable/c/cb7c388b5967946f097afdb759b7c860305f2d96)
3. [](https://git.kernel.org/stable/c/6a1f088f9807f5166f58902d26246d0b88da03a8)
4. [](https://git.kernel.org/stable/c/bab3bb35c03b263c486833d50d50c081d9e9832b)
5. [](https://git.kernel.org/stable/c/f48d258f0ac540f00fa617dac496c4c18b5dc2fa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12577
- **State**: PUBLISHED
- **Published Date**: July 11, 2019 at 19:27 UTC
- **Last Updated**: August 04, 2024 at 23:24 UTC
- **Reserved Date**: June 02, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The macOS binary openvpn_launcher.64 is setuid root. This binary creates /tmp/pia_upscript.sh when executed. Because the file creation mask (umask) is not reset, the umask value is inherited from the calling process. This value can be manipulated to cause the privileged binary to create files with world writable permissions. A local unprivileged user can modify /tmp/pia_upscript.sh during the connect process to execute arbitrary code as the root user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12577.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2882
- **State**: PUBLISHED
- **Published Date**: June 26, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: June 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
upgrade.asp in sHibby sHop 2.2 and earlier does not require administrative authentication, which allows remote attackers to update a file or have unspecified other impact via a direct request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30787](http://secunia.com/advisories/30787)
2. [5895](https://www.exploit-db.com/exploits/5895)
3. [shibbyshop-upgrade-urun-unauth-access(43296)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43296)
4. [3962](http://securityreason.com/securityalert/3962) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.