System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4337
- **State**: PUBLISHED
- **Published Date**: December 17, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Diocese of Portsmouth Calendar (pd_calendar) extension 0.4.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors, a different issue than CVE-2008-6691.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [typo3-dpc-sql-injection(54779)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54779)
2. [ADV-2009-3550](http://www.vupen.com/english/advisories/2009/3550)
3. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34546
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 11:33 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 06, 2024 at 19:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HabibCoder Sticky Social Link allows Stored XSS.This issue affects Sticky Social Link: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**HabibCoder - Sticky Social Link**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/sticky-social-link/wordpress-sticky-social-link-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- t0y4 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20406
- **State**: PUBLISHED
- **Published Date**: February 06, 2020 at 03:10 UTC
- **Last Updated**: September 16, 2024 at 23:21 UTC
- **Reserved Date**: January 23, 2020 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.
### Affected Products
**Atlassian - Confluence Data Center**
Affected versions:
- unspecified (Status: affected)
- 7.1.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/CONFSERVER-59428) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5491
- **State**: PUBLISHED
- **Published Date**: January 15, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 15:04 UTC
- **Reserved Date**: January 14, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95406](http://www.securityfocus.com/bid/95406)
2. [](https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a)
3. [DSA-3779](http://www.debian.org/security/2017/dsa-3779)
4. [](https://wpvulndb.com/vulnerabilities/8719)
5. [](https://codex.wordpress.org/Version_4.7.1)
6. [[oss-security] 20170114 Re: CVE Request: Wordpress: 8 security issues in 4.7](http://www.openwall.com/lists/oss-security/2017/01/14/6)
7. [1037591](http://www.securitytracker.com/id/1037591)
8. [](https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12026
- **State**: PUBLISHED
- **Published Date**: June 17, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.phusion.nl/passenger-5-3-2)
2. [GLSA-201807-02](https://security.gentoo.org/glsa/201807-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16867
- **State**: PUBLISHED
- **Published Date**: September 25, 2019 at 11:56 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HongCMS 3.0.0 allows arbitrary file deletion via a ../ in the file parameter to admin/index.php/database/ajax?action=delete, a similar issue to CVE-2018-16774. (If the attacker deletes config.php and visits install/index.php, they can reinstall the product.)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Neeke/HongCMS/issues/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27250
- **State**: PUBLISHED
- **Published Date**: February 10, 2021 at 21:39 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 19, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
In SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014), a specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow at Version/Instance 0x0005 and 0x0016. An attacker can entice the victim to open a document to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**n/a - SoftMaker**
Affected versions:
- SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014) (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6592
- **State**: PUBLISHED
- **Published Date**: April 03, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:34 UTC
- **Reserved Date**: April 03, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28801](http://www.securityfocus.com/bid/28801)
2. [20080418 LightNEasy v.1.2.2 flat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/491064/100/0/threaded)
3. [44674](http://www.osvdb.org/44674)
4. [29833](http://secunia.com/advisories/29833)
5. [5452](https://www.exploit-db.com/exploits/5452)
6. [lightneasy-thumbsup-file-manipulation(49851)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49851) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2354
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 05, 2024 at 13:48 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95736](http://www.securityfocus.com/bid/95736)
2. [](https://support.apple.com/HT207486)
3. [](https://support.apple.com/HT207485)
4. [GLSA-201706-15](https://security.gentoo.org/glsa/201706-15)
5. [](https://support.apple.com/HT207481)
6. [](https://support.apple.com/HT207484)
7. [](https://support.apple.com/HT207482)
8. [1037668](http://www.securitytracker.com/id/1037668) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6276
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 12:30 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Business Objects Business Intelligence Platform (bipodata), version 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability.
### Affected Products
**SAP SE - SAP Business Objects Business Intelligence Platform (bipodata)**
Affected versions:
- < 4.2 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2849967)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7234
- **State**: PUBLISHED
- **Published Date**: November 10, 2016 at 06:16 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Excel for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-133](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-133)
2. [94020](http://www.securityfocus.com/bid/94020)
3. [1037246](http://www.securitytracker.com/id/1037246)
4. [20161108 Microsoft Word Memory Corrpution Code Execution Vulnerability](https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1233) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43010
- **State**: PUBLISHED
- **Published Date**: May 10, 2022 at 18:29 UTC
- **Last Updated**: August 04, 2024 at 03:47 UTC
- **Reserved Date**: October 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Safedog Apache v4.0.30255, attackers can bypass this product for SQL injection. Attackers can bypass access to sensitive data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/crow821/crowsec/tree/master/bypass_safedog1025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8194
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 13, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0955
- **State**: PUBLISHED
- **Published Date**: November 21, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: November 19, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20031104 010: RELIABILITY FIX: November 4, 2003](http://www.openbsd.org/errata33.html)
2. [](http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2)
3. [8978](http://www.securityfocus.com/bid/8978)
4. [](http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2)
5. [20031104 OpenBSD kernel overflow, yet still *BSD much better than windows](http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html)
6. [20031105 005: RELIABILITY FIX: November 4, 2003](ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch)
7. [](http://www.guninski.com/msuxobsd2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14160
- **State**: PUBLISHED
- **Published Date**: August 26, 2021 at 10:57 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An SSRF vulnerability in Gotenberg through 6.2.1 exists in the remote URL to PDF conversion, which results in a remote attacker being able to read local files or fetch intranet resources.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/thecodingmachine/gotenberg/releases)
2. [](https://github.com/gotenberg/gotenberg/pull/319)
3. [](https://github.com/gotenberg/gotenberg/issues/215) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6129
- **State**: PUBLISHED
- **Published Date**: October 19, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 18:17 UTC
- **Reserved Date**: October 15, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/3991423-potential-vbulletin-exploit-vbulletin-4-1-vbulletin-5)
2. [](http://www.net-security.org/secworld.php?id=15743) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6524
- **State**: PUBLISHED
- **Published Date**: December 14, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in vdateUsr.asp in EzHRS HR Assist 1.05 and earlier allows remote attackers to execute arbitrary SQL commands via the Uname (UserName) parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2909](https://www.exploit-db.com/exploits/2909)
2. [23304](http://secunia.com/advisories/23304)
3. [ADV-2006-4934](http://www.vupen.com/english/advisories/2006/4934)
4. [hrassist-vdateusr-sql-injection(30847)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30847) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3444
- **State**: PUBLISHED
- **Published Date**: June 27, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Research in Motion BlackBerry 7270 with 4.0 SP1 Bundle 83 allows remote attackers to cause a denial of service (blocked call reception) via a malformed SIP invite message, possibly related to multiple format string specifiers in the From field, a spoofed source IP address, and limitations of the function stack frame.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [blackberry-sipinvite-dos(35074)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35074)
2. [24548](http://www.securityfocus.com/bid/24548)
3. [VU#785257](http://www.kb.cert.org/vuls/id/785257)
4. [25824](http://secunia.com/advisories/25824)
5. [](http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=211&)
6. [37648](http://osvdb.org/37648)
7. [](http://www.blackberry.com/btsc/articles/225/KB12700_f.SAL_Public.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7282
- **State**: PUBLISHED
- **Published Date**: December 06, 2019 at 16:56 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The username parameter of the TITool PrintMonitor solution during the login request is vulnerable to and/or time-based blind SQLi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ti-tool.com)
2. [](http://print.com)
3. [](https://fenceposterror.github.io/cve-2018-7282.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49717
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:43 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
irqchip/apple-aic: Fix refcount leak in build_fiq_affinity
of_find_node_by_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
### Affected Products
**Linux - Linux**
Affected versions:
- a5e8801202b318622ea526aa5625e5f7eceb4d26 (Status: affected)
- a5e8801202b318622ea526aa5625e5f7eceb4d26 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 5.18.6 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2dc14cebe5dc053434b507bb24e6821cb795050f)
2. [](https://git.kernel.org/stable/c/b1ac803f47cb1615468f35cf1ccb553c52087301) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26540
- **State**: PUBLISHED
- **Published Date**: February 08, 2021 at 16:16 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: February 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26)
2. [](https://github.com/apostrophecms/sanitize-html/pull/460)
3. [](https://advisory.checkmarx.net/advisory/CX-2021-4309) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11698
- **State**: PUBLISHED
- **Published Date**: September 17, 2020 at 16:28 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Titan SpamTitan 7.07. Improper input sanitization of the parameter community on the page snmp-x.php would allow a remote attacker to inject commands into the file snmpd.conf that would allow executing commands on the target server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.spamtitan.com/)
2. [](https://github.com/felmoltor)
3. [](https://twitter.com/felmoltor)
4. [](https://sensepost.com/blog/2020/clash-of-the-spamtitan/)
5. [](http://packetstormsecurity.com/files/159470/SpamTitan-7.07-Remote-Code-Execution.html)
6. [](http://packetstormsecurity.com/files/160809/SpamTitan-7.07-Command-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32593
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:30 UTC
- **Reserved Date**: April 09, 2025 at 11:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Bytes Technolab Add Product Frontend for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Add Product Frontend for WooCommerce: from n/a through 1.0.6.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Bytes Technolab - Add Product Frontend for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/add-product-frontend-for-woocommerce/vulnerability/wordpress-add-product-frontend-for-woocommerce-plugin-1-0-6-arbitrary-content-deletion-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34227
- **State**: PUBLISHED
- **Published Date**: September 11, 2023 at 13:22 UTC
- **Last Updated**: August 03, 2024 at 09:07 UTC
- **Reserved Date**: June 21, 2022 at 20:02 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-32.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13736
- **State**: PUBLISHED
- **Published Date**: December 10, 2019 at 21:01 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1020899)
3. [RHSA-2019:4238](https://access.redhat.com/errata/RHSA-2019:4238)
4. [openSUSE-SU-2019:2692](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html)
5. [FEDORA-2019-1a10c04281](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/)
6. [openSUSE-SU-2019:2694](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html)
7. [FEDORA-2020-4355ea258e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/)
8. [20200120 [SECURITY] [DSA 4606-1] chromium security update](https://seclists.org/bugtraq/2020/Jan/27)
9. [DSA-4606](https://www.debian.org/security/2020/dsa-4606)
10. [GLSA-202003-08](https://security.gentoo.org/glsa/202003-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4381
- **State**: PUBLISHED
- **Published Date**: August 17, 2007 at 21:12 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2008:0132](http://www.redhat.com/support/errata/RHSA-2008-0132.html)
2. [26933](http://secunia.com/advisories/26933)
3. [](http://docs.info.apple.com/article.html?artnum=307177)
4. [26402](http://secunia.com/advisories/26402)
5. [BEA07-177.00](http://dev2dev.bea.com/pub/advisory/248)
6. [](http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.html)
7. [29897](http://secunia.com/advisories/29897)
8. [103024](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1)
9. [28056](http://secunia.com/advisories/28056)
10. [APPLE-SA-2007-12-14](http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html)
11. [RHSA-2008:0100](http://www.redhat.com/support/errata/RHSA-2008-0100.html)
12. [oval:org.mitre.oval:def:10290](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10290)
13. [ADV-2007-2910](http://www.vupen.com/english/advisories/2007/2910)
14. [SUSE-SA:2008:025](http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html)
15. [RHSA-2007:0956](http://www.redhat.com/support/errata/RHSA-2007-0956.html)
16. [sun-java-font-privilege-escalation(36061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36061)
17. [1018576](http://www.securitytracker.com/id?1018576)
18. [28777](http://secunia.com/advisories/28777)
19. [ADV-2007-4224](http://www.vupen.com/english/advisories/2007/4224)
20. [ADV-2007-3009](http://www.vupen.com/english/advisories/2007/3009)
21. [28880](http://secunia.com/advisories/28880)
22. [27716](http://secunia.com/advisories/27716)
23. [GLSA-200709-15](http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml)
24. [28115](http://secunia.com/advisories/28115)
25. [29340](http://secunia.com/advisories/29340)
26. [25340](http://www.securityfocus.com/bid/25340)
27. [RHSA-2007:1086](http://www.redhat.com/support/errata/RHSA-2007-1086.html)
28. [27203](http://secunia.com/advisories/27203)
29. [26631](http://secunia.com/advisories/26631) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51016
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 00:00 UTC
- **Last Updated**: November 05, 2024 at 15:53 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the addName%d parameter in usb_approve.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.netgear.com/about/security/)
2. [](https://github.com/wudipjq/my_vuln/blob/main/Netgear5/vuln_58/58.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4114
- **State**: PUBLISHED
- **Published Date**: August 16, 2013 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:44 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130711 Re: CVE Request -- Nagstamon (prior 0.9.10): Monitor server user credentials exposure in automated requests to get update information](http://www.openwall.com/lists/oss-security/2013/07/11/7)
2. [54072](http://secunia.com/advisories/54072)
3. [](https://bugs.gentoo.org/show_bug.cgi?id=476538)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=983673)
5. [](http://nagstamon.ifw-dresden.de/docs/security/)
6. [openSUSE-SU-2013:1235](http://lists.opensuse.org/opensuse-updates/2013-07/msg00072.html)
7. [54276](http://secunia.com/advisories/54276) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5427
- **State**: PUBLISHED
- **Published Date**: April 22, 2019 at 20:52 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.
### Weakness Classification (CWE)
- CWE-776: Security Weakness
### Affected Products
**n/a - c3p0**
Affected versions:
- before 0.9.5.4 (Status: affected)
### References
1. [FEDORA-2019-cb14e234fc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/)
2. [FEDORA-2019-063672154a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/)
3. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
4. [](https://www.oracle.com/security-alerts/cpujul2020.html)
5. [](https://hackerone.com/reports/509315)
6. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
7. [](https://www.oracle.com/security-alerts/cpujan2021.html)
8. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21285
- **State**: PUBLISHED
- **Published Date**: February 02, 2021 at 17:55 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**moby - moby**
Affected versions:
- < 19.03.15 (Status: affected)
- >= 20.0.0, < 20.10.3 (Status: affected)
### References
1. [](https://github.com/moby/moby/security/advisories/GHSA-6fj5-m822-rqx8)
2. [](https://docs.docker.com/engine/release-notes/#20103)
3. [](https://github.com/moby/moby/releases/tag/v20.10.3)
4. [](https://github.com/moby/moby/releases/tag/v19.03.15)
5. [](https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30)
6. [](https://security.netapp.com/advisory/ntap-20210226-0005/)
7. [DSA-4865](https://www.debian.org/security/2021/dsa-4865)
8. [GLSA-202107-23](https://security.gentoo.org/glsa/202107-23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4519
- **State**: PUBLISHED
- **Published Date**: July 10, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: August 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26132](http://secunia.com/advisories/26132)
2. [ADV-2007-2471](http://www.vupen.com/english/advisories/2007/2471)
3. [20070801 FLEA-2007-0038-1 gimp](http://www.securityfocus.com/archive/1/475257/100/0/threaded)
4. [gimp-plugins-code-execution(35308)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35308)
5. [42139](http://osvdb.org/42139)
6. [GLSA-200707-09](http://security.gentoo.org/glsa/glsa-200707-09.xml)
7. [oval:org.mitre.oval:def:10842](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842)
8. [26240](http://secunia.com/advisories/26240)
9. [26575](http://secunia.com/advisories/26575)
10. [42140](http://osvdb.org/42140)
11. [USN-494-1](http://www.ubuntu.com/usn/usn-494-1)
12. [](http://bugzilla.gnome.org/show_bug.cgi?id=451379)
13. [](http://developer.gimp.org/NEWS-2.2)
14. [RHSA-2007:0513](http://www.redhat.com/support/errata/RHSA-2007-0513.html)
15. [20070709 Multiple Vendor GIMP Multiple Integer Overflow Vulnerabilities](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551)
16. [42143](http://osvdb.org/42143)
17. [42145](http://osvdb.org/42145)
18. [24835](http://www.securityfocus.com/bid/24835)
19. [26215](http://secunia.com/advisories/26215)
20. [1018349](http://www.securitytracker.com/id?1018349)
21. [42144](http://osvdb.org/42144)
22. [MDKSA-2007:170](http://www.mandriva.com/security/advisories?name=MDKSA-2007:170)
23. [42141](http://osvdb.org/42141)
24. [DSA-1335](http://www.debian.org/security/2007/dsa-1335)
25. [26939](http://secunia.com/advisories/26939)
26. [42142](http://osvdb.org/42142)
27. [](http://issues.foresightlinux.org/browse/FL-457) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0036
- **State**: PUBLISHED
- **Published Date**: February 16, 2024 at 00:08 UTC
- **Last Updated**: August 21, 2024 at 20:12 UTC
- **Reserved Date**: November 16, 2023 at 22:59 UTC
- **Assigned By**: google_android
### Vulnerability Description
In startNextMatchingActivity of ActivityTaskManagerService.java, there is a possible way to bypass the restrictions on starting activities from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/3eaaa9687e90c65f51762deb343f18bef95d4e8e)
2. [](https://source.android.com/security/bulletin/2024-02-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1074
- **State**: PUBLISHED
- **Published Date**: February 14, 2012 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the White Papers (mm_whtppr) extension 0.0.4 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/)
2. [51837](http://www.securityfocus.com/bid/51837)
3. [typo3-whitepapers-unspecified-sql-injection(72959)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72959)
4. [78786](http://osvdb.org/78786) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0547
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in WP All Import plugin prior to version 3.4.7 for WordPress allows an attacker to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**Soflyy - WP All Import**
Affected versions:
- prior to version 3.4.7 (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-all-import/#developers)
2. [JVN#60032768](https://jvn.jp/en/jp/JVN60032768/index.html)
3. [](https://plugins.trac.wordpress.org/changeset/1827741/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1479
- **State**: PUBLISHED
- **Published Date**: March 16, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Guestbook.php in Creative Guestbook 1.0 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24536](http://secunia.com/advisories/24536)
2. [creative-schreiben-xss(33015)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33015)
3. [3489](https://www.exploit-db.com/exploits/3489)
4. [34233](http://osvdb.org/34233) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5156
- **State**: PUBLISHED
- **Published Date**: May 25, 2025 at 22:00 UTC
- **Last Updated**: May 28, 2025 at 17:38 UTC
- **Reserved Date**: May 25, 2025 at 06:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in H3C GR-5400AX up to 100R008 and classified as critical. Affected by this issue is the function EditWlanMacList of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**H3C - GR-5400AX**
Affected versions:
- 100R008 (Status: affected)
### References
1. [VDB-310244 | H3C GR-5400AX aspForm EditWlanMacList buffer overflow](https://vuldb.com/?id.310244)
2. [VDB-310244 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.310244)
3. [Submit #574080 | New H3C Technologies Co., Ltd. H3C GR-5400AX <=100R008 Buffer Overflow](https://vuldb.com/?submit.574080)
4. [](https://github.com/CH13hh/tmp_store_cc/blob/main/H3C%20GB5400AX/6.md)
### Credits
- DaddyShark (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14058
- **State**: PUBLISHED
- **Published Date**: August 17, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 14, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pimcore before 5.3.0 allows SQL Injection via the REST web service API.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180816 SEC Consult SA-20180813-0 :: SQL Injection, XSS & CSRF vulnerabilities in Pimcore](http://seclists.org/fulldisclosure/2018/Aug/13)
2. [](http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html)
3. [](https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/)
4. [45208](https://www.exploit-db.com/exploits/45208/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47053
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 08:13 UTC
- **Last Updated**: May 04, 2025 at 07:03 UTC
- **Reserved Date**: February 27, 2024 at 18:42 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: sun8i-ss - Fix memory leak of pad
It appears there are several failure return paths that don't seem
to be free'ing pad. Fix these.
Addresses-Coverity: ("Resource leak")
### Affected Products
**Linux - Linux**
Affected versions:
- d9b45418a91773b7672e4c60037a28074b495c6d (Status: affected)
- d9b45418a91773b7672e4c60037a28074b495c6d (Status: affected)
- d9b45418a91773b7672e4c60037a28074b495c6d (Status: affected)
- d9b45418a91773b7672e4c60037a28074b495c6d (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 5.10.37 (Status: unaffected)
- 5.11.21 (Status: unaffected)
- 5.12.4 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2c67a9333da9d0a3b87310e0d116b7c9070c7b00)
2. [](https://git.kernel.org/stable/c/c633e025bd04f54d7b33331cfcdb71354b08ce59)
3. [](https://git.kernel.org/stable/c/d3d702084d125689edb2b9395c707e09b471352e)
4. [](https://git.kernel.org/stable/c/50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32538
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 08:35 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 15, 2024 at 09:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Joshua Eldridge Easy CountDowner allows Stored XSS.This issue affects Easy CountDowner: from n/a through 1.0.8.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Joshua Eldridge - Easy CountDowner**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/easy-countdowner/wordpress-easy-countdowner-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28204
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 20:48 UTC
- **Last Updated**: May 29, 2025 at 15:39 UTC
- **Reserved Date**: March 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere&target=Property%3AP31&namespace=1&invert=1 can take more than thirty seconds. There is a DDoS risk.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T297754) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6317
- **State**: PUBLISHED
- **Published Date**: March 15, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: February 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in the add_shader_program function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via vectors involving the sprog variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201707-06](https://security.gentoo.org/glsa/201707-06)
2. [[virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0](https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html)
3. [[oss-security] 20170225 CVE-2017-6317 Virglrenderer: memory leakage issue in add_shader_program](http://www.openwall.com/lists/oss-security/2017/02/24/5)
4. [](https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1426756)
6. [96450](http://www.securityfocus.com/bid/96450) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7229
- **State**: PUBLISHED
- **Published Date**: September 14, 2009 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 18:04 UTC
- **Reserved Date**: September 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GreenSQL Firewall (greensql-fw) before 0.9.2 allows remote attackers to bypass SQL injection protection via a crafted string, possibly involving an encoded space character (%20).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.greensql.net/node/41)
2. [](http://www.greensql.net/security)
3. [48906](http://osvdb.org/48906) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2235
- **State**: PUBLISHED
- **Published Date**: August 12, 2020 at 13:25 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows attackers to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
### Affected Products
**Jenkins project - Jenkins Pipeline Maven Integration Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20%282%29)
2. [[oss-security] 20200812 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/08/12/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3277
- **State**: PUBLISHED
- **Published Date**: July 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [91596](http://www.securityfocus.com/bid/91596)
2. [1036283](http://www.securitytracker.com/id/1036283)
3. [MS16-084](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084)
4. [MS16-085](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-085) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30505
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 14:12 UTC
- **Last Updated**: August 02, 2024 at 01:38 UTC
- **Reserved Date**: March 27, 2024 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 4.1.18.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Andy Moyle - Church Admin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-1-18-broken-access-control-vulnerability?_s_id=cve)
### Credits
- CatFather (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0208
- **State**: PUBLISHED
- **Published Date**: June 11, 2020 at 14:20 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In multiple functions of AccountManager.java, there is a possible permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145207098
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5214
- **State**: PUBLISHED
- **Published Date**: November 24, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: November 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in service/calendrier.php in ClanLite 2.2006.05.20 allows remote attackers to inject arbitrary web script or HTML via the annee parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4628](http://securityreason.com/securityalert/4628)
2. [clanlite-calendrier-xss(42331)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42331)
3. [29156](http://www.securityfocus.com/bid/29156)
4. [5595](https://www.exploit-db.com/exploits/5595) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0374
- **State**: PUBLISHED
- **Published Date**: January 30, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: January 30, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome 1.0.154.43 allows remote attackers to trick a user into visiting an arbitrary URL via an onclick action that moves a crafted element to the current mouse position, related to a "Clickjacking" vulnerability. NOTE: a third party disputes the relevance of this issue, stating that "every sufficiently featured browser is and likely will remain susceptible to the behavior known as clickjacking," and adding that the exploit code "is not a valid demonstration of the issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.secniche.org/gcr_clkj/)
2. [7903](https://www.exploit-db.com/exploits/7903)
3. [20090128 Re: Advisory: Google Chrome 1.0.154.43 ClickJacking Vulnerability.](http://www.securityfocus.com/archive/1/500533/100/0/threaded)
4. [20090128 Advisory: Google Chrome 1.0.154.43 ClickJacking Vulnerability.](http://www.securityfocus.com/archive/1/500499/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0490
- **State**: PUBLISHED
- **Published Date**: June 11, 2021 at 16:42 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In memory management driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183464868
### Affected Products
**n/a - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16065
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 10:10 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
A Javascript reentrancy issues that caused a use-after-free in V8 in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [105215](http://www.securityfocus.com/bid/105215)
2. [DSA-4289](https://www.debian.org/security/2018/dsa-4289)
3. [RHSA-2018:2666](https://access.redhat.com/errata/RHSA-2018:2666)
4. [](https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html)
5. [GLSA-201811-10](https://security.gentoo.org/glsa/201811-10)
6. [](https://crbug.com/867776) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40796
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:03 UTC
- **Last Updated**: April 23, 2025 at 18:49 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Adobe - Premiere**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48805
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 11:43 UTC
- **Last Updated**: May 04, 2025 at 08:23 UTC
- **Reserved Date**: July 16, 2024 at 11:38 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
ax88179_rx_fixup() contains several out-of-bounds accesses that can be
triggered by a malicious (or defective) USB device, in particular:
- The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,
causing OOB reads and (on big-endian systems) OOB endianness flips.
- A packet can overlap the metadata array, causing a later OOB
endianness flip to corrupt data used by a cloned SKB that has already
been handed off into the network stack.
- A packet SKB can be constructed whose tail is far beyond its end,
causing out-of-bounds heap data to be considered part of the SKB's
data.
I have tested that this can be used by a malicious USB device to send a
bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response
that contains random kernel heap data.
It's probably also possible to get OOB writes from this on a
little-endian system somehow - maybe by triggering skb_cow() via IP
options processing -, but I haven't tested that.
### Affected Products
**Linux - Linux**
Affected versions:
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
- e2ca90c276e1fc410d7cd3c1a4eee245ec902a20 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.9 (Status: affected)
- 0 (Status: unaffected)
- 4.9.303 (Status: unaffected)
- 4.14.268 (Status: unaffected)
- 4.19.231 (Status: unaffected)
- 5.4.180 (Status: unaffected)
- 5.10.101 (Status: unaffected)
- 5.15.24 (Status: unaffected)
- 5.16.10 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382)
2. [](https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740)
3. [](https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930)
4. [](https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d)
5. [](https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d)
6. [](https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb)
7. [](https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274)
8. [](https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3981
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 18:31 UTC
- **Last Updated**: April 28, 2025 at 13:44 UTC
- **Reserved Date**: April 26, 2025 at 07:52 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in wowjoy 浙江湖州华卓信息科技有限公司 Internet Doctor Workstation System 1.0. This issue affects some unknown processing of the file /v1/prescription/details/. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
- CWE-266: Security Weakness
### Affected Products
**wowjoy 浙江湖州华卓信息科技有限公司 - Internet Doctor Workstation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306317 | wowjoy 浙江湖州华卓信息科技有限公司 Internet Doctor Workstation System details improper authorization](https://vuldb.com/?id.306317)
2. [VDB-306317 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306317)
3. [](https://github.com/38279/3/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22609
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 17:59 UTC
- **Last Updated**: August 03, 2024 at 03:21 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with additional permissions checks. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to read other applications' settings.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213182)
2. [](https://support.apple.com/en-us/HT213193)
3. [](https://support.apple.com/en-us/HT213183)
4. [](https://support.apple.com/en-us/HT213186) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38135
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 17:30 UTC
- **Last Updated**: May 21, 2025 at 21:06 UTC
- **Reserved Date**: June 11, 2024 at 22:36 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
### References
1. [Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38135) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45405
- **State**: PUBLISHED
- **Published Date**: September 06, 2024 at 13:10 UTC
- **Last Updated**: September 06, 2024 at 14:10 UTC
- **Reserved Date**: August 28, 2024 at 20:21 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
`gix-path` is a crate of the `gitoxide` project (an implementation of `git` written in Rust) dealing paths and their conversions. Prior to version 0.10.11, `gix-path` runs `git` to find the path of a configuration file associated with the `git` installation, but improperly resolves paths containing unusual or non-ASCII characters, in rare cases enabling a local attacker to inject configuration leading to code execution. Version 0.10.11 contains a patch for the issue.
In `gix_path::env`, the underlying implementation of the `installation_config` and `installation_config_prefix` functions calls `git config -l --show-origin` to find the path of a file to treat as belonging to the `git` installation. Affected versions of `gix-path` do not pass `-z`/`--null` to cause `git` to report literal paths. Instead, to cover the occasional case that `git` outputs a quoted path, they attempt to parse the path by stripping the quotation marks. The problem is that, when a path is quoted, it may change in substantial ways beyond the concatenation of quotation marks. If not reversed, these changes can result in another valid path that is not equivalent to the original.
On a single-user system, it is not possible to exploit this, unless `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_GLOBAL` have been set to unusual values or Git has been installed in an unusual way. Such a scenario is not expected. Exploitation is unlikely even on a multi-user system, though it is plausible in some uncommon configurations or use cases. In general, exploitation is more likely to succeed if users are expected to install `git` themselves, and are likely to do so in predictable locations; locations where `git` is installed, whether due to usernames in their paths or otherwise, contain characters that `git` quotes by default in paths, such as non-English letters and accented letters; a custom `system`-scope configuration file is specified with the `GIT_CONFIG_SYSTEM` environment variable, and its path is in an unusual location or has strangely named components; or a `system`-scope configuration file is absent, empty, or suppressed by means other than `GIT_CONFIG_NOSYSTEM`. Currently, `gix-path` can treat a `global`-scope configuration file as belonging to the installation if no higher scope configuration file is available. This increases the likelihood of exploitation even on a system where `git` is installed system-wide in an ordinary way. However, exploitation is expected to be very difficult even under any combination of those factors.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-41: Security Weakness
- CWE-427: Security Weakness
### Affected Products
**Byron - gitoxide**
Affected versions:
- < 0.10.11 (Status: affected)
### References
1. [https://github.com/Byron/gitoxide/security/advisories/GHSA-m8rp-vv92-46c7](https://github.com/Byron/gitoxide/security/advisories/GHSA-m8rp-vv92-46c7)
2. [https://github.com/Byron/gitoxide/commit/650a1b5cf25e086197cc55a68525a411e1c28031](https://github.com/Byron/gitoxide/commit/650a1b5cf25e086197cc55a68525a411e1c28031)
3. [https://github.com/Byron/gitoxide/blob/1cfe577d461293879e91538dbc4bbfe01722e1e8/gix-path/src/env/git/mod.rs#L138-L142](https://github.com/Byron/gitoxide/blob/1cfe577d461293879e91538dbc4bbfe01722e1e8/gix-path/src/env/git/mod.rs#L138-L142) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13265
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 19:16 UTC
- **Last Updated**: January 14, 2025 at 16:28 UTC
- **Reserved Date**: January 09, 2025 at 18:28 UTC
- **Assigned By**: drupal
### Vulnerability Description
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno Learning path allows PHP Local File Inclusion.This issue affects Opigno Learning path: from 0.0.0 before 3.1.2.
### Weakness Classification (CWE)
- CWE-96: Security Weakness
### Affected Products
**Drupal - Opigno Learning path**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2024-029)
### Credits
- Marcin Grabias
- catch
- Axel Minck
- Yuriy Korzhov
- Andrii Aleksandrov
- Yurii Boichenko
- Greg Knaddison |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8638
- **State**: PUBLISHED
- **Published Date**: April 03, 2020 at 18:36 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: February 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ackcent.com/blog/testlink-1.9.20-unrestricted-file-upload-and-sql-injection/)
2. [](https://github.com/TestLinkOpenSourceTRMS/testlink-code/commit/58f3cc03d5f81cd5cc2ad8c7ba645cc486cebc05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46449
- **State**: PUBLISHED
- **Published Date**: October 26, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 20:43 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sajaljat/CVE-2023-46449/tree/main)
2. [](https://www.youtube.com/watch?v=H5QnsOKjs3s) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3222
- **State**: PUBLISHED
- **Published Date**: September 07, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
syscheck/seechanges.c in OSSEC 2.7 through 2.8.1 on NIX systems allows local users to execute arbitrary code as root.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/132281/OSSEC-2.8.1-Local-Root-Escalation.html)
2. [[oss-security] 20150611 CVE-2015-3222 - OSSEC root escalation](http://www.openwall.com/lists/oss-security/2015/06/11/1)
3. [](https://github.com/ossec/ossec-hids/releases/tag/2.8.2)
4. [75148](http://www.securityfocus.com/bid/75148) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6342
- **State**: PUBLISHED
- **Published Date**: November 11, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 11, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6348.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1031185](http://www.securitytracker.com/id/1031185)
2. [MS14-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065)
3. [70341](http://www.securityfocus.com/bid/70341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2260
- **State**: PUBLISHED
- **Published Date**: April 24, 2023 at 00:00 UTC
- **Last Updated**: February 04, 2025 at 16:26 UTC
- **Reserved Date**: April 24, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Authorization Bypass Through User-Controlled Key in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304.
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**alfio-event - alfio-event/alf.io**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/649badc8-c935-4a84-8aa8-d3269ac54377)
2. [](https://github.com/alfio-event/alf.io/commit/c9a16ab93d42b2beb06d529b57890121f85be6ef) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21645
- **State**: PUBLISHED
- **Published Date**: January 19, 2025 at 10:18 UTC
- **Last Updated**: May 22, 2025 at 12:40 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it
Wakeup for IRQ1 should be disabled only in cases where i8042 had
actually enabled it, otherwise "wake_depth" for this IRQ will try to
drop below zero and there will be an unpleasant WARN() logged:
kernel: atkbd serio0: Disabling IRQ1 wakeup source to avoid platform firmware bug
kernel: ------------[ cut here ]------------
kernel: Unbalanced IRQ 1 wake disable
kernel: WARNING: CPU: 10 PID: 6431 at kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0
The PMC driver uses DEFINE_SIMPLE_DEV_PM_OPS() to define its dev_pm_ops
which sets amd_pmc_suspend_handler() to the .suspend, .freeze, and
.poweroff handlers. i8042_pm_suspend(), however, is only set as
the .suspend handler.
Fix the issue by call PMC suspend handler only from the same set of
dev_pm_ops handlers as i8042_pm_suspend(), which currently means just
the .suspend handler.
To reproduce this issue try hibernating (S4) the machine after a fresh boot
without putting it into s2idle first.
[ij: edited the commit message.]
### Affected Products
**Linux - Linux**
Affected versions:
- 72e5a83b7c8401856cc3732150af24e43726717a (Status: affected)
- 8e60615e8932167057b363c11a7835da7f007106 (Status: affected)
- 8e60615e8932167057b363c11a7835da7f007106 (Status: affected)
- 8e60615e8932167057b363c11a7835da7f007106 (Status: affected)
- 3fc9dc0340e0b5df8059313537b55f82c1e84e94 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 6.1.140 (Status: unaffected)
- 6.6.72 (Status: unaffected)
- 6.12.10 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ab47d72b736e78d3c2370b26e0bfc46eb0918391)
2. [](https://git.kernel.org/stable/c/5cc621085e2b7a9b1905a98f8e5a86bb4aea2016)
3. [](https://git.kernel.org/stable/c/b25778c87a6bce40c31e92364f08aa6240309e25)
4. [](https://git.kernel.org/stable/c/dd410d784402c5775f66faf8b624e85e41c38aaf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44474
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 08:53 UTC
- **Last Updated**: September 20, 2024 at 15:28 UTC
- **Reserved Date**: September 29, 2023 at 14:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MD Jakir Hosen Tiger Forms – Drag and Drop Form Builder plugin <= 2.0.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**MD Jakir Hosen - Tiger Forms – Drag and Drop Form Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tiger-form/wordpress-tiger-forms-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SeungYongLee (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39144
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 00:00 UTC
- **Last Updated**: October 17, 2024 at 15:20 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Element55 KnowMore appliances version 21 and older was discovered to store passwords in plaintext.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://getknowmore.com/)
2. [](https://github.com/cduram/CVE-2023-39144) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11677
- **State**: PUBLISHED
- **Published Date**: July 27, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 18:19 UTC
- **Reserved Date**: July 26, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Hashtopus 1.5g allows remote attackers to inject arbitrary web script or HTML via the query string to admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [99974](http://www.securityfocus.com/bid/99974)
2. [](https://github.com/curlyboi/hashtopus/issues/63) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23678
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:29 UTC
- **Last Updated**: January 23, 2025 at 17:02 UTC
- **Reserved Date**: January 16, 2025 at 11:28 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LocalGrid allows Reflected XSS. This issue affects LocalGrid: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - LocalGrid**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/localgrid/vulnerability/wordpress-localgrid-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1487
- **State**: PUBLISHED
- **Published Date**: February 06, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 16, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2119-1](http://www.ubuntu.com/usn/USN-2119-1)
2. [](http://download.novell.com/Download?buildid=Y2fux-JW1Qc)
3. [1029721](http://www.securitytracker.com/id/1029721)
4. [openSUSE-SU-2014:0212](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=947592)
6. [1029717](http://www.securitytracker.com/id/1029717)
7. [65330](http://www.securityfocus.com/bid/65330)
8. [mozilla-cve20141487-info-disc(90889)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90889)
9. [](https://8pecxstudios.com/?page_id=44080)
10. [RHSA-2014:0132](http://rhn.redhat.com/errata/RHSA-2014-0132.html)
11. [56922](http://secunia.com/advisories/56922)
12. [56787](http://secunia.com/advisories/56787)
13. [1029720](http://www.securitytracker.com/id/1029720)
14. [56858](http://secunia.com/advisories/56858)
15. [DSA-2858](http://www.debian.org/security/2014/dsa-2858)
16. [56763](http://secunia.com/advisories/56763)
17. [USN-2102-2](http://www.ubuntu.com/usn/USN-2102-2)
18. [102873](http://osvdb.org/102873)
19. [RHSA-2014:0133](http://rhn.redhat.com/errata/RHSA-2014-0133.html)
20. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
21. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
22. [](http://download.novell.com/Download?buildid=VYQsgaFpQ2k)
23. [56888](http://secunia.com/advisories/56888)
24. [FEDORA-2014-2083](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html)
25. [openSUSE-SU-2014:0419](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html)
26. [56761](http://secunia.com/advisories/56761)
27. [FEDORA-2014-2041](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html)
28. [SUSE-SU-2014:0248](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html)
29. [openSUSE-SU-2014:0213](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html)
30. [USN-2102-1](http://www.ubuntu.com/usn/USN-2102-1)
31. [56767](http://secunia.com/advisories/56767)
32. [56706](http://secunia.com/advisories/56706)
33. [](http://www.mozilla.org/security/announce/2014/mfsa2014-09.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20634
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 16:02 UTC
- **Last Updated**: November 15, 2024 at 16:28 UTC
- **Reserved Date**: November 02, 2021 at 13:28 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to redirect a user to an undesired web page.
This vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N`
### Affected Products
**Cisco - Cisco Enterprise Chat and Email**
Affected versions:
- 11.6(1)_ES3 (Status: affected)
- 11.6(1)_ES4 (Status: affected)
- 12.0(1)_ES6 (Status: affected)
- 11.6(1)_ES8 (Status: affected)
- 12.0(1)_ES5a (Status: affected)
- 11.6(1)_ES9 (Status: affected)
- 12.0(1)_ES6_ET1 (Status: affected)
- 11.6(1)_ES6 (Status: affected)
- 11.6(1)_ES5 (Status: affected)
- 12.5(1)_ET1 (Status: affected)
- 12.5(1) (Status: affected)
- 12.5(1)_ES3_ET1 (Status: affected)
- 12.0(1)_ES3 (Status: affected)
- 11.6(1)_ES11 (Status: affected)
- 12.0(1)_ES4 (Status: affected)
- 12.0(1)_ES5 (Status: affected)
- 11.6(1)_ES2 (Status: affected)
- 11.6(1)_ES9a (Status: affected)
- 11.6(1)_ES10 (Status: affected)
- 12.0(1)_ES1 (Status: affected)
- 12.0(1) (Status: affected)
- 12.5(1)_ES3 (Status: affected)
- 12.6(1) (Status: affected)
- 11.5(1) (Status: affected)
- 12.0(1)_ES2 (Status: affected)
- 11.6(1)_ES7 (Status: affected)
- 12.5(1)_ES2 (Status: affected)
- 12.6(1)_ET1 (Status: affected)
- 11.6(1) (Status: affected)
- 12.5(1)_ES1 (Status: affected)
### References
1. [cisco-sa-ece-multivulns-kbK2yVhR](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47438
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 20:02 UTC
- **Last Updated**: November 12, 2024 at 20:25 UTC
- **Reserved Date**: September 24, 2024 at 17:40 UTC
- **Assigned By**: adobe
### Vulnerability Description
Substance3D - Painter versions 10.1.0 and earlier are affected by a Write-what-where Condition vulnerability that could lead to a memory leak. This vulnerability allows an attacker to write a controlled value at a controlled memory location, which could result in the disclosure of sensitive memory content. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-123: Security Weakness
### Affected Products
**Adobe - Substance3D - Painter**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2996
- **State**: PUBLISHED
- **Published Date**: August 30, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 13, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Array index error in RealNetworks RealPlayer 11.0 through 11.1 on Windows allows remote attackers to execute arbitrary code via a malformed header in a RealMedia .IVR file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-2216](http://www.vupen.com/english/advisories/2010/2216)
2. [oval:org.mitre.oval:def:6703](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6703)
3. [realplayer-ivr-code-exec(61425)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61425)
4. [20100826 ZDI-10-166: RealNetworks RealPlayer Malformed IVR Object Index Code Execution Vulnerability](http://www.securityfocus.com/archive/1/513381/100/0/threaded)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-10-166)
6. [](http://service.real.com/realplayer/security/08262010_player/en/)
7. [1024370](http://www.securitytracker.com/id?1024370)
8. [41154](http://secunia.com/advisories/41154) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19390
- **State**: PUBLISHED
- **Published Date**: November 20, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (Break instruction exception and application crash) via TIFF data because of a ConvertToPDF_x86!ConnectedPDF::ConnectedPDFSDK::FCP_SendEmailNotification issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/20/2018/11/2018-11-20/index.html)
2. [](https://yan-1-20.github.io/2018/11/20/2018/11/2018-11-20/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11258
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 20:00 UTC
- **Last Updated**: November 19, 2024 at 16:22 UTC
- **Reserved Date**: November 15, 2024 at 14:21 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**1000 Projects - Beauty Parlour Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-284716 | 1000 Projects Beauty Parlour Management System index.php sql injection](https://vuldb.com/?id.284716)
2. [VDB-284716 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.284716)
3. [Submit #443386 | 1000 Projects Beauty Parlour Management System PHP SQLite Project V1.0 SQL Injection](https://vuldb.com/?submit.443386)
4. [](https://github.com/Hacker0xone/CVE/issues/11)
5. [](https://1000projects.org/)
### Credits
- polaris0x1 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10965
- **State**: PUBLISHED
- **Published Date**: July 07, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 17:57 UTC
- **Reserved Date**: July 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Irssi before 1.0.4. When receiving messages with invalid time stamps, Irssi would try to dereference a NULL pointer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4016](https://www.debian.org/security/2017/dsa-4016)
2. [](https://irssi.org/security/irssi_sa_2017_07.txt)
3. [](https://github.com/irssi/irssi/commit/5e26325317c72a04c1610ad952974e206384d291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0900
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: November 24, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in ssi CGI program in thttpd 2.19 and earlier allows remote attackers to read arbitrary files via a "%2e%2e" string, a variation of the .. (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1737](http://www.securityfocus.com/bid/1737)
2. [FreeBSD-SA-00:73](ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:73.thttpd.asc)
3. [acme-thttpd-ssi(5313)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5313)
4. [20001002 thttpd ssi: retrieval of arbitrary world-readable files](http://archives.neohapsis.com/archives/bugtraq/2000-10/0025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24116
- **State**: PUBLISHED
- **Published Date**: October 02, 2024 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 22:50 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) allows a remote attacker to gain privileges via the system/config_menu.htm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/zty-1995/RG-NBS2009G-P-switch/tree/main/Unauthorized%20Access%20Vulnerability)
2. [](https://gist.github.com/zty-1995/7a5e3ad0eb3b6c44db1a6eb4092893d3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3684
- **State**: PUBLISHED
- **Published Date**: September 29, 2010 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: September 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The FTP authentication module in Synology Disk Station 2.x logs passwords to the web application interface in cases of incorrect login attempts, which allows local users to obtain sensitive information by reading a log, a different vulnerability than CVE-2010-2453.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100926 Web commands injection through FTP Login in Synology Disk Station - CVE-2010-2453](http://www.securityfocus.com/archive/1/513970/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3289
- **State**: PUBLISHED
- **Published Date**: October 23, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:10 UTC
- **Reserved Date**: October 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LSCFG in IBM AIX 5.2 and 5.3 does not create temporary files securely, which allows local users to corrupt /etc/passwd and possibly other system files via the trace file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IY77624](http://www-1.ibm.com/support/docview.wss?uid=isg1IY77624)
2. [1015061](http://securitytracker.com/id?1015061)
3. [17202](http://secunia.com/advisories/17202)
4. [IY77638](http://www-1.ibm.com/support/docview.wss?uid=isg1IY77638)
5. [15105](http://www.securityfocus.com/bid/15105) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8177
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 06:46 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8145.
### Affected Products
**Microsoft - ChakraCore**
Affected versions:
- ChakraCore (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8177)
2. [104090](http://www.securityfocus.com/bid/104090) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21926
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 16:36 UTC
- **Last Updated**: January 02, 2025 at 18:28 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
HEVC Video Extensions Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - HEVC Video Extension**
Affected versions:
- 1.0.0.0 (Status: affected)
**Microsoft - HEVC Video Extensions**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [HEVC Video Extensions Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21926) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25167
- **State**: PUBLISHED
- **Published Date**: February 08, 2023 at 19:31 UTC
- **Last Updated**: March 10, 2025 at 21:14 UTC
- **Reserved Date**: February 03, 2023 at 16:59 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Discourse is an open source discussion platform. In affected versions a malicious user can cause a regular expression denial of service using a carefully crafted git URL. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**discourse - discourse**
Affected versions:
- < 3.0.1 (Status: affected)
- >= 3.1.0.beta, < 3.1.0.beta2 (Status: affected)
### References
1. [https://github.com/discourse/discourse/security/advisories/GHSA-4w55-w26q-r35w](https://github.com/discourse/discourse/security/advisories/GHSA-4w55-w26q-r35w)
2. [https://github.com/discourse/discourse/commit/ec4c30270887366dc28788bc4ab8a22a098573cd](https://github.com/discourse/discourse/commit/ec4c30270887366dc28788bc4ab8a22a098573cd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8968
- **State**: PUBLISHED
- **Published Date**: February 15, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 25, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Foundation is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998515.
### Affected Products
**IBM Corporation - Rational Collaborative Lifecycle Management**
Affected versions:
- 3.0.1 (Status: affected)
- 4.0 (Status: affected)
- 3.0.1.6 (Status: affected)
- 4.0.1 (Status: affected)
- 4.0.2 (Status: affected)
- 4.0.3 (Status: affected)
- 4.0.4 (Status: affected)
- 4.0.5 (Status: affected)
- 4.0.6 (Status: affected)
- 5.0 (Status: affected)
- 4.0.7 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21998515)
2. [1037821](http://www.securitytracker.com/id/1037821)
3. [1037820](http://www.securitytracker.com/id/1037820)
4. [96282](http://www.securityfocus.com/bid/96282)
5. [1037822](http://www.securitytracker.com/id/1037822)
6. [1037823](http://www.securitytracker.com/id/1037823) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20957
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 08:24 UTC
- **Last Updated**: May 07, 2025 at 19:24 UTC
- **Reserved Date**: November 06, 2024 at 02:30 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Improper access control in SmartManagerCN prior to SMR May-2025 Release 1 allows local attackers to launch arbitrary activities with SmartManagerCN privilege.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR May-2025 Release in Android 13, 14, 15 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12958
- **State**: PUBLISHED
- **Published Date**: August 18, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is an illegal address access in the function output_hex() in data/data-out.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://savannah.gnu.org/forum/forum.php?forum_id=8936)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1482429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41327
- **State**: PUBLISHED
- **Published Date**: June 13, 2023 at 08:41 UTC
- **Last Updated**: October 23, 2024 at 14:27 UTC
- **Reserved Date**: September 23, 2022 at 15:07 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A cleartext transmission of sensitive information vulnerability [CWE-319] in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.8, FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.8 allows an authenticated attacker with readonly superadmin privileges to intercept traffic in order to obtain other adminstrators cookies via diagnose CLI commands.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**Fortinet - FortiOS**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
**Fortinet - FortiProxy**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-22-380](https://fortiguard.com/psirt/FG-IR-22-380) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47493
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:19 UTC
- **Last Updated**: May 07, 2025 at 16:35 UTC
- **Reserved Date**: May 07, 2025 at 09:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ultimate Blocks Ultimate Blocks allows DOM-Based XSS. This issue affects Ultimate Blocks: from n/a through 3.2.9.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ultimate Blocks - Ultimate Blocks**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ultimate-blocks/vulnerability/wordpress-ultimate-blocks-3-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- zaim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1021
- **State**: PUBLISHED
- **Published Date**: June 21, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: February 14, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
drivers/acpi/debugfs.c in the Linux kernel before 3.0 allows local users to modify arbitrary kernel memory locations by leveraging root privileges to write to the /sys/kernel/debug/acpi/custom_method file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4347.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110225 Re: CVE request: kernel: /sys/kernel/debug/acpi/custom_method can bypass module restrictions](http://www.openwall.com/lists/oss-security/2011/02/25/5)
2. [](https://github.com/torvalds/linux/commit/526b4af47f44148c9d665e57723ed9f86634c6e3)
3. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=526b4af47f44148c9d665e57723ed9f86634c6e3)
4. [](http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=680841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4141
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 29, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34984
- **State**: PUBLISHED
- **Published Date**: January 13, 2022 at 21:44 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley ContextCapture 10.18.0.232. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14784.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Bentley - ContextCapture**
Affected versions:
- 10.18.0.232 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1367/)
2. [](https://www.bentley.com/en/common-vulnerability-exposure/be-2021-0001)
### Credits
- Francis Provencher {PRL} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18978
- **State**: PUBLISHED
- **Published Date**: May 06, 2019 at 19:18 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: November 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Ascensia Contour NEXT ONE application for Android before 2019-01-15. It has a statically coded encryption key. Extraction of the encryption key is necessary for deciphering communications between this application and the backend server. This, in combination with retrieving any user's encrypted data from the Ascensia cloud through another vulnerability, allows an attacker to obtain and modify any patient's medical information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://depthsecurity.com/blog/medical-exploitation-you-are-now-diabetic) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3773
- **State**: PUBLISHED
- **Published Date**: November 23, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 22, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Joomla! before 1.0.4 has unknown impact and attack vectors, related to "Potential misuse of Media component file management functions."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2526](http://www.vupen.com/english/advisories/2005/2526)
2. [15526](http://www.securityfocus.com/bid/15526)
3. [](http://www.joomla.org/content/view/499/66/)
4. [17675](http://secunia.com/advisories/17675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21314
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 17:57 UTC
- **Last Updated**: May 03, 2025 at 01:46 UTC
- **Reserved Date**: December 08, 2023 at 22:45 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Message Queuing Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Message Queuing Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46118
- **State**: PUBLISHED
- **Published Date**: December 14, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 13:51 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/?page=product_per_brand&bid=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/HMHYHM/bug_report/blob/main/vendors/oretnom23/helmet-store-showroom-site/SQLi-2.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8215
- **State**: PUBLISHED
- **Published Date**: October 17, 2019 at 20:25 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-49.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5997
- **State**: PUBLISHED
- **Published Date**: September 22, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Auto Trader (aka za.co.autotrader.android.app) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#319465](http://www.kb.cert.org/vuls/id/319465) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22358
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 17:54 UTC
- **Last Updated**: March 26, 2025 at 18:02 UTC
- **Reserved Date**: January 13, 2023 at 06:43 UTC
- **Assigned By**: f5
### Vulnerability Description
In versions beginning with 7.2.2 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**F5 - APM Clients**
Affected versions:
- 7.2.2 (Status: affected)
- 7.2.4 (Status: unaffected)
### References
1. [](https://my.f5.com/manage/s/article/K76964818) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43928
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:17 UTC
- **Last Updated**: November 04, 2024 at 18:01 UTC
- **Reserved Date**: August 18, 2024 at 21:56 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in eyecix JobSearch allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JobSearch: from n/a through 2.5.4.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**eyecix - JobSearch**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-wp-job-board-wordpress-plugin-plugin-2-5-4-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3888
- **State**: PUBLISHED
- **Published Date**: July 25, 2023 at 08:00 UTC
- **Last Updated**: October 15, 2024 at 19:06 UTC
- **Reserved Date**: July 24, 2023 at 16:56 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235250 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Campcodes - Beauty Salon Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.235250)
2. [](https://vuldb.com/?ctiid.235250)
3. [](https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2020.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47169
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 17:02 UTC
- **Last Updated**: June 10, 2025 at 19:01 UTC
- **Reserved Date**: May 01, 2025 at 17:10 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- N/A (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Word 2016**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [Microsoft Word Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19752
- **State**: PUBLISHED
- **Published Date**: September 07, 2021 at 19:42 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kohler/gifsicle/issues/140)
2. [FEDORA-2021-c351011066](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7H3ASG2BD4D4SAUUI6TOLUZYP2QYYHXY/)
3. [FEDORA-2021-b349650e52](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DH7X7PGUN5BYXKW533DAX4KAEM4HPMJC/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.