System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8113
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 14:18 UTC
- **Last Updated**: August 30, 2024 at 18:40 UTC
- **Reserved Date**: August 23, 2024 at 08:52 UTC
- **Assigned By**: rami.io
### Vulnerability Description
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious event organizers to inject HTML tags into e-mail previews on settings page. The default Content Security Policy of pretix prevents execution of attacker-provided scripts, making exploitation unlikely. However, combined with a CSP bypass (which is not currently known) the vulnerability could be used to impersonate other organizers or staff users.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**pretix - pretix**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://pretix.eu/about/en/blog/20240823-release-2024-7-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44161
- **State**: PUBLISHED
- **Published Date**: September 27, 2023 at 12:01 UTC
- **Last Updated**: September 23, 2024 at 18:07 UTC
- **Reserved Date**: September 26, 2023 at 13:09 UTC
- **Assigned By**: Acronis
### Vulnerability Description
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Acronis - Acronis Cyber Protect 15**
Affected versions:
- unspecified (Status: affected)
### References
1. [SEC-4084](https://security-advisory.acronis.com/advisories/SEC-4084)
### Credits
- @laz0rde (https://hackerone.com/laz0rde) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11362
- **State**: PUBLISHED
- **Published Date**: July 17, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 18:05 UTC
- **Reserved Date**: July 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C++ via a long first argument to the msgfmt_parse_message function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.php.net/bug.php?id=73473)
2. [RHSA-2018:1296](https://access.redhat.com/errata/RHSA-2018:1296)
3. [](https://security.netapp.com/advisory/ntap-20180112-0001/)
4. [GLSA-201709-21](https://security.gentoo.org/glsa/201709-21)
5. [USN-3566-2](https://usn.ubuntu.com/3566-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0748
- **State**: PUBLISHED
- **Published Date**: February 08, 2023 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 14:00 UTC
- **Reserved Date**: February 08, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Open Redirect in GitHub repository btcpayserver/btcpayserver prior to 1.7.6.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**btcpayserver - btcpayserver/btcpayserver**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86)
2. [](https://github.com/btcpayserver/btcpayserver/pull/4575/commits/c2cfa17e9619046b43987627b8429541d2834109) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20321
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 15:26 UTC
- **Last Updated**: August 03, 2024 at 02:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Settings, there is a possible way for an application without permissions to read content of WiFi QR codes due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-187176859
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26495
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:56 UTC
- **Last Updated**: March 04, 2025 at 20:15 UTC
- **Reserved Date**: February 11, 2025 at 17:18 UTC
- **Assigned By**: Salesforce
### Vulnerability Description
Cleartext Storage of Sensitive Information vulnerability in Salesforce Tableau Server can record the Personal Access Token (PAT) into logging repositories.This issue affects Tableau Server: before 2022.1.3, before 2021.4.8, before 2021.3.13, before 2021.2.14, before 2021.1.16, before 2020.4.19.
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**Salesforce - Tableau Server**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://help.salesforce.com/s/articleView?id=000390611&type=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41699
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 19:54 UTC
- **Last Updated**: August 29, 2024 at 17:37 UTC
- **Reserved Date**: August 30, 2023 at 16:08 UTC
- **Assigned By**: Payara
### Vulnerability Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server, Micro and Embedded (Servlet Implementation modules) allows Redirect Access to Libraries.This issue affects Payara Server, Micro and Embedded: from 5.0.0 before 5.57.0, from 4.1.2.191 before 4.1.2.191.46, from 6.0.0 before 6.8.0, from 6.2023.1 before 6.2023.11.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Payara Platform - Payara Server, Micro and Embedded**
Affected versions:
- 5.0.0 (Status: affected)
- 4.1.2.191 (Status: affected)
- 6.0.0 (Status: affected)
- 6.2023.1 (Status: affected)
### References
1. [](https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.8.0.html)
2. [](https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%206.2023.11.html)
### Credits
- Hiroki Sawamura from Fujitsu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38420
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 16:51 UTC
- **Last Updated**: February 03, 2025 at 17:36 UTC
- **Reserved Date**: June 16, 2024 at 00:50 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while configuring a Hypervisor based input virtual device.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- AR8035 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCC710 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN9274 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- QCS8550 (Status: affected)
- QCS9100 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8380XP (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SDX80M (Status: affected)
- SM7250P (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR1 Gen 1 Platform (Status: affected)
- Snapdragon AR1 Gen 1 Platform "Luna1" (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2330P (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3990 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13770
- **State**: PUBLISHED
- **Published Date**: February 13, 2025 at 04:21 UTC
- **Last Updated**: February 13, 2025 at 14:36 UTC
- **Reserved Date**: January 28, 2025 at 15:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.2.4 via deserialization of untrusted input 'view_more_posts' AJAX action. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. The developer opted to remove the software from the repository, so an update is not available and it is recommended to find a replacement software.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**ThemeREX - Puzzles | WP Magazine / Review with Store WordPress Theme + RTL**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/950d1c8f-6715-4b0d-bf3d-af978a146838?source=cve)
2. [](https://themeforest.net/item/puzzles-wordpress-magazinereview-with-wooc/5690583)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3737
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205221)
2. [1033274](http://www.securitytracker.com/id/1033274)
3. [](https://support.apple.com/kb/HT205030)
4. [APPLE-SA-2015-09-16-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html)
5. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html)
6. [76338](http://www.securityfocus.com/bid/76338)
7. [APPLE-SA-2015-08-13-1](http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html)
8. [](https://support.apple.com/kb/HT205033) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6657
- **State**: PUBLISHED
- **Published Date**: September 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Leadership Newspapers (aka com.LeadershipNewspapers) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#655009](http://www.kb.cert.org/vuls/id/655009)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2775
- **State**: PUBLISHED
- **Published Date**: May 17, 2023 at 20:00 UTC
- **Last Updated**: August 02, 2024 at 06:33 UTC
- **Reserved Date**: May 17, 2023 at 16:58 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Bus Dispatch and Information System 1.0. It has been classified as critical. This affects an unknown part of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229281 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Bus Dispatch and Information System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.229281)
2. [](https://vuldb.com/?ctiid.229281)
3. [](https://github.com/mrwwrrhh/Bus_Dispatch_and_Information_System/blob/main/Bus%20Dispatch%20and%20Information%20System%20in%20login_info%20has%20Sql%20injection%20vulnerabilities.pdf)
### Credits
- RonghanWu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21350, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21350
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:58 UTC
- **Last Updated**: March 12, 2025 at 01:42 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kerberos Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Kerberos Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21350) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20440
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 16:28 UTC
- **Last Updated**: April 01, 2025 at 21:47 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information.
This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Cisco - Cisco Smart License Utility**
Affected versions:
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
- 2.2.0 (Status: affected)
### References
1. [cisco-sa-cslu-7gHMzWmw](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47984
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:15 UTC
- **Last Updated**: December 13, 2024 at 20:38 UTC
- **Reserved Date**: October 08, 2024 at 04:36 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell RecoverPoint for Virtual Machines 6.0.x contains Denial of Service vulnerability. A User with Remote access could potentially exploit this vulnerability, leading to the disruption of most functionalities of the RPA persistent after reboot, resulting in need of technical support intervention in getting system back to stable state.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-790: Cross-site Scripting (XSS)
### Affected Products
**Dell - RecoverPoint for Virtual Machines**
Affected versions:
- 6.0 SP1 (Status: affected)
- 6.0 SP1 P1 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2027
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 00:25 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Enterasys Vertical Horizon VH-2402S before firmware 2.05.05.09 does not properly restrict certain debugging commands to the ADMIN account, which could allow attackers to obtain sensitive information or modify the registry.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15757](http://secunia.com/advisories/15757)
2. [](http://www.enterasys.com/support/relnotes/VH-4802-2050509-patch-rel.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5819
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 19:31 UTC
- **Last Updated**: August 02, 2024 at 08:14 UTC
- **Reserved Date**: October 26, 2023 at 22:42 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Amazonify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. However, please note that this can also be combined with CVE-2023-5818 for CSRF to XSS.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**garykeorkunian - Amazonify**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/41adfb58-d79f-40a3-8a7e-f3f08f64659f?source=cve)
2. [](https://wordpress.org/plugins/amazonify/)
3. [](https://plugins.trac.wordpress.org/browser/amazonify/trunk/amazonify.php#L142)
### Credits
- Ala Arfaoui |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0979
- **State**: PUBLISHED
- **Published Date**: July 21, 2022 at 21:06 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Safe Browsing in Google Chrome on Android prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_15.html)
2. [](https://crbug.com/1302644)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1000118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1000118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1000118
- **State**: PUBLISHED
- **Published Date**: October 21, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: July 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XSS & SQLi in HugeIT slideshow v1.0.4
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://extensions.joomla.org/extensions/extension/photos-a-images/slideshow/slideshow)
2. [93822](http://www.securityfocus.com/bid/93822)
3. [](http://www.vapidlabs.com/advisory.php?v=166) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9541
- **State**: PUBLISHED
- **Published Date**: January 03, 2020 at 21:55 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 01, 2019 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
: Information Exposure vulnerability in itemlookup.asp of Telos Automated Message Handling System allows a remote attacker to inject arbitrary script into an AMHS session. This issue affects: Telos Automated Message Handling System versions prior to 4.1.5.5.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Telos - Automated Message Handling System**
Affected versions:
- unspecified (Status: affected)
### References
1. [VU#873161](https://www.kb.cert.org/vuls/id/873161/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18195
- **State**: PUBLISHED
- **Published Date**: October 28, 2019 at 13:55 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 18, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on TerraMaster FS-210 4.0.19 devices. Normal users can use 1.user.php for privilege elevation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gusrmsdlrh/CVE-2019-18195) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40189
- **State**: PUBLISHED
- **Published Date**: November 22, 2022 at 00:00 UTC
- **Last Updated**: April 29, 2025 at 04:25 UTC
- **Reserved Date**: September 08, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pig Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Pig Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Pig Provider is installed (Pig Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Pig Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Apache Software Foundation - Apache Airlfow Pig Provider**
Affected versions:
- unspecified (Status: affected)
**Apache Software Foundation - Apache Airflow **
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/27644)
2. [](https://lists.apache.org/thread/yxnfzfw2w9pj5s785k3rlyly4y44sd15)
### Credits
- Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for reporting the issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27385
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 00:34 UTC
- **Reserved Date**: February 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability was discovered in the slsi_handle_nan_rx_event_log_ind function in Samsung Mobile Processor Exynos 1380 and Exynos 1480 related to no input validation check on tag_len for rx coming from userspace, which can lead to heap overwrite.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/)
2. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27385/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21431
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 18:56 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper input validation in Bixby Vision prior to version 3.7.70.17 allows attacker to access data of Bixby Vision.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Samsung Mobile - Bixby Vision**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0682
- **State**: PUBLISHED
- **Published Date**: July 13, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: July 12, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
comersus_gatewayPayPal.asp in Comersus Cart 5.09, and possibly other versions before 5.098, allows remote attackers to change the prices of items by directly modifying them in the URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10674](http://www.securityfocus.com/bid/10674)
2. [20040707 Comersus Cart Improper Request Handling](http://marc.info/?l=bugtraq&m=108922336529987&w=2)
3. [comersus-cart-price-modification(16645)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16645) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10472
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 18:12 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, and SDX20, address and size passed to SCM command 'TZ_INFO_GET_SECURE_STATE_LEGACY_ID' from HLOS Kernel were not being checked, so access outside DDR would occur.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0417
- **State**: PUBLISHED
- **Published Date**: February 18, 2010 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 00:45 UTC
- **Reserved Date**: January 27, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in common/util/rlstate.cpp in Helix Player 1.0.6 and RealPlayer allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a RuleBook structure with a large number of rule-separator characters that trigger heap memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2010:0094](http://www.redhat.com/support/errata/RHSA-2010-0094.html)
2. [oval:org.mitre.oval:def:11364](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11364)
3. [38450](http://secunia.com/advisories/38450)
4. [[common-cvs] 20080114 util rlstate.cpp,1.9,1.10](http://lists.helixcommunity.org/pipermail/common-cvs/2008-January/015484.html)
5. [](https://helixcommunity.org/viewcvs/common/util/rlstate.cpp?view=log#rev1.10)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=561860) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38341
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 10:54 UTC
- **Reserved Date**: August 15, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safe Software FME Server v2021.2.5 and below does not employ server-side validation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.safe.com/s/article/Known-Issue-Lack-of-server-side-validation-when-creating-a-new-user-in-FME-Server)
2. [](https://www.cycura.com/blog/safe-software-inc-fme-server-vulnerability-disclosure/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3906
- **State**: PUBLISHED
- **Published Date**: August 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 27, 2014 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
SQL injection vulnerability in OSK Advance-Flow 4.41 and earlier and Advance-Flow Forms 4.41 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVNDB-2014-000099](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000099)
2. [JVN#20812625](http://jvn.jp/en/jp/JVN20812625/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6866
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 10, 2015 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45671
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:33 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the appData parameter in the formSetAppFilterRule function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1990
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aldo's Web Server (aweb) 1.5 allows remote attackers to gain sensitive information via an arbitrary character, which reveals the full path and the user running the aweb process, possibly due to a malformed request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10262](http://www.securityfocus.com/bid/10262)
2. [20040503 Multible_Vulnerabilites_in_Aldos_Webserver](http://marc.info/?l=bugtraq&m=108360629031227&w=2)
3. [11542](http://secunia.com/advisories/11542)
4. [5880](http://www.osvdb.org/5880)
5. [aweb-path-disclosure(16047)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16047)
6. [](http://www.oliverkarow.de/research/AldosWebserverMultipleVulns.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34438
- **State**: PUBLISHED
- **Published Date**: July 16, 2021 at 20:19 UTC
- **Last Updated**: October 01, 2024 at 15:53 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Font Driver Host Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34438) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41153
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 12:30 UTC
- **Last Updated**: October 29, 2024 at 13:57 UTC
- **Reserved Date**: July 16, 2024 at 16:02 UTC
- **Assigned By**: Hitachi Energy
### Vulnerability Description
Command injection vulnerability in the Edge Computing UI for the
TRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an attacker with write access to the
web UI can execute commands on the device with root privileges,
far more extensive than what the write privilege intends.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Hitachi Energy - TRO600**
Affected versions:
- 9.1.0.0 (Status: affected)
### References
1. [](https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7774
- **State**: PUBLISHED
- **Published Date**: November 14, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 09, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
PC-EGG pWebManager before 3.3.10, and before 2.2.2 for PHP 4.x, allows remote authenticated users to execute arbitrary OS commands by leveraging the editor role.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVNDB-2015-000180](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000180)
2. [](http://www.pwebmanager.org/)
3. [JVN#25323093](http://jvn.jp/en/jp/JVN25323093/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3656
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: November 12, 2024 at 16:12 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html)
2. [](https://crbug.com/1345275) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2614
- **State**: PUBLISHED
- **Published Date**: July 07, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: March 24, 2014 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP SiteScope 11.1x through 11.13 and 11.2x through 11.24 allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-2140.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68361](http://www.securityfocus.com/bid/68361)
2. [HPSBMU03059](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04355129)
3. [SSRT101473](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04355129)
4. [1030519](http://www.securitytracker.com/id/1030519) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6736
- **State**: PUBLISHED
- **Published Date**: February 07, 2024 at 22:02 UTC
- **Last Updated**: May 22, 2025 at 04:10 UTC
- **Reserved Date**: December 12, 2023 at 15:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab EE affecting all versions starting from 11.3 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted content in the CODEOWNERS file.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**GitLab - GitLab**
Affected versions:
- 11.3 (Status: affected)
- 16.8 (Status: affected)
- 16.9 (Status: affected)
### References
1. [GitLab Issue #435036](https://gitlab.com/gitlab-org/gitlab/-/issues/435036)
2. [HackerOne Bug Bounty Report #2269023](https://hackerone.com/reports/2269023)
### Credits
- Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9496
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 15:39 UTC
- **Last Updated**: August 04, 2024 at 10:34 UTC
- **Reserved Date**: March 01, 2020 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
### Affected Products
**n/a - Apache OFBiz**
Affected versions:
- Apache OFBiz 17.12.03 (Status: affected)
### References
1. [](https://s.apache.org/l0994)
2. [[announce] 20200715 [CVE-2020-9496] Apache OFBiz XML-RPC requests vulnerable without authentication](https://lists.apache.org/thread.html/raf6020f765f12711e817ce13df63ecd7d677eebea8001e0473ee7c84%40%3Cannounce.apache.org%3E)
3. [[ofbiz-notifications] 20200716 [jira] [Updated] (OFBIZ-11716) Apache OFBiz unsafe deserialization of XMLRPC arguments (CVE-2020-9496)](https://lists.apache.org/thread.html/rde93e1c91620335b72b798f78ab4459d3f7b06f96031d8ce86a18825%40%3Cnotifications.ofbiz.apache.org%3E)
4. [](http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html)
5. [[ofbiz-user] 20201116 [CVE-2020-9496] Apache OFBiz unsafe deserialization of XMLRPC arguments](https://lists.apache.org/thread.html/r8fb319dc1f196563955fbf5e9cf454fb9d6c27c2058066445af7f8cb%40%3Cuser.ofbiz.apache.org%3E)
6. [[ofbiz-user] 20201117 Re: [CVE-2020-9496] Apache OFBiz unsafe deserialization of XMLRPC arguments](https://lists.apache.org/thread.html/ra43cfe80226c3b23cd775f3543da10c035ad9c9943cfe8a680490730%40%3Cuser.ofbiz.apache.org%3E)
7. [](http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html)
8. [[ofbiz-commits] 20210321 [ofbiz-site] branch master updated: Updates security page for CVE-2021-26295 fixed in 17.12.06](https://lists.apache.org/thread.html/r0a0a701610b3bcdf14634047313adab3f1628bb9aa55cf29cd262ef5%40%3Ccommits.ofbiz.apache.org%3E)
9. [[ofbiz-commits] 20210427 [ofbiz-site] branch master updated: Updates security page for CVE-2021-29200 and 30128 fixed in 17.12.07](https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d%40%3Ccommits.ofbiz.apache.org%3E)
10. [](http://packetstormsecurity.com/files/163730/Apache-OfBiz-17.12.01-Remote-Command-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5749
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The Sandbox_profiles component in Apple iOS before 8.4.1 allows attackers to bypass the third-party app-sandbox protection mechanism and read arbitrary managed preferences via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/kb/HT205030)
2. [1033275](http://www.securitytracker.com/id/1033275)
3. [76337](http://www.securityfocus.com/bid/76337)
4. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0629
- **State**: PUBLISHED
- **Published Date**: March 06, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC Documentum TaskSpace (TSP) 6.7SP1 before P25 and 6.7SP2 before P11 does not properly handle the interaction between the dm_world group and the dm_superusers_dynamic group, which allows remote authenticated users to obtain sensitive information and gain privileges in opportunistic circumstances by leveraging an incorrect group-addition implementation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140305 ESA-2014-012: EMC Documentum TaskSpace Multiple Vulnerabilities](http://seclists.org/bugtraq/2014/Mar/33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15321
- **State**: PUBLISHED
- **Published Date**: December 22, 2017 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 00:36 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei FusionSphere OpenStack V100R006C000SPC102 (NFV) has an information leak vulnerability due to the use of a low version transmission protocol by default. An attacker could intercept packets transferred by a target device. Successful exploit could cause an information leak.
### Affected Products
**Huawei Technologies Co., Ltd. - FusionSphere OpenStack**
Affected versions:
- V100R006C000SPC102 (NFV) (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171108-01-fusionsphere-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0224
- **State**: PUBLISHED
- **Published Date**: March 09, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Muscat Empower CGI program allows remote attackers to obtain the absolute pathname of the server via an invalid request in the DB parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [muskat-empower-url-dir(6093)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6093)
2. [20010212 Vulnerability in Muscat Empower wich can print path to DB-dir.](http://archives.neohapsis.com/archives/bugtraq/2001-02/0216.html)
3. [2374](http://www.securityfocus.com/bid/2374) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40122
- **State**: PUBLISHED
- **Published Date**: February 16, 2024 at 00:08 UTC
- **Last Updated**: November 21, 2024 at 20:15 UTC
- **Reserved Date**: August 09, 2023 at 02:29 UTC
- **Assigned By**: google_android
### Vulnerability Description
In applyCustomDescription of SaveUi.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/55fc00a0788ea0995fe0851616b9ac21710a2931)
2. [](https://source.android.com/security/bulletin/2024-02-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46696
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 05:29 UTC
- **Last Updated**: May 04, 2025 at 09:32 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix potential UAF in nfsd4_cb_getattr_release
Once we drop the delegation reference, the fields embedded in it are no
longer safe to access. Do that last.
### Affected Products
**Linux - Linux**
Affected versions:
- c5967721e1063648b0506481585ba7e2e49a075e (Status: affected)
- c5967721e1063648b0506481585ba7e2e49a075e (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.10.8 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e0b66698a5ae41078f7490e8b3527013f5fccd6c)
2. [](https://git.kernel.org/stable/c/1116e0e372eb16dd907ec571ce5d4af325c55c10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24362
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:52 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15987.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.1.0.52543 (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-273/)
### Credits
- Rich |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4193
- **State**: PUBLISHED
- **Published Date**: November 29, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 01:34 UTC
- **Reserved Date**: November 29, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in File System API in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html)
2. [](https://crbug.com/1354518)
3. [GLSA-202305-10](https://security.gentoo.org/glsa/202305-10)
4. [GLSA-202311-11](https://security.gentoo.org/glsa/202311-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8219
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 10, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35022
- **State**: PUBLISHED
- **Published Date**: June 30, 2024 at 16:10 UTC
- **Last Updated**: January 09, 2025 at 21:37 UTC
- **Reserved Date**: June 11, 2023 at 20:38 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 11.7 could allow a local user to update projects that they do not have the authorization to access. IBM X-Force ID: 258254.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**IBM - InfoSphere Information Server**
Affected versions:
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7158447)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/258254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27745
- **State**: PUBLISHED
- **Published Date**: November 27, 2020 at 17:01 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.schedmd.com/news.php)
2. [DSA-4841](https://www.debian.org/security/2021/dsa-4841)
3. [[debian-lts-announce] 20220117 [SECURITY] [DLA 2886-1] slurm-llnl security update](https://lists.debian.org/debian-lts-announce/2022/01/msg00011.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48512
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:17 UTC
- **Last Updated**: November 25, 2024 at 19:53 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6087
- **State**: PUBLISHED
- **Published Date**: February 06, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in topic.php in Camera Life 2.6.2b4 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31689](http://www.securityfocus.com/bid/31689)
2. [cameralife-topic-xss(45805)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45805)
3. [](http://sourceforge.net/project/shownotes.php?group_id=70910&release_id=643552)
4. [6710](https://www.exploit-db.com/exploits/6710) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30812
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:55 UTC
- **Last Updated**: March 27, 2025 at 18:56 UTC
- **Reserved Date**: March 26, 2025 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Addons for Elementor allows Stored XSS. This issue affects SKT Addons for Elementor: from n/a through 3.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**sonalsinha21 - SKT Addons for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/skt-addons-for-elementor/vulnerability/wordpress-skt-addons-for-elementor-plugin-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Prissy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2641
- **State**: PUBLISHED
- **Published Date**: March 26, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
In Moodle 2.x and 3.x, SQL injection can occur via user preferences.
### Affected Products
**n/a - Moodle 2.x and 3.x**
Affected versions:
- Moodle 2.x and 3.x (Status: affected)
### References
1. [41828](https://www.exploit-db.com/exploits/41828/)
2. [96977](http://www.securityfocus.com/bid/96977)
3. [](https://moodle.org/mod/forum/discuss.php?d=349419)
4. [1038174](http://www.securitytracker.com/id/1038174) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7721
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3603
- **State**: PUBLISHED
- **Published Date**: June 17, 2021 at 12:09 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: June 15, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-829: Security Weakness
### Affected Products
**PHPMailer - PHPMailer**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/)
2. [](https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3)
3. [FEDORA-2021-bfc34b3d5c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/)
4. [FEDORA-2021-ef548cb234](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8481
- **State**: PUBLISHED
- **Published Date**: January 08, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Atlassian JIRA Software 7.0.3, JIRA Core 7.0.3, and the bundled JIRA Service Desk 3.0.3 installer attaches the wrong image to e-mail notifications when a user views an issue with inline wiki markup referencing an image attachment, which might allow remote attackers to obtain sensitive information by updating a different issue that includes wiki markup for an external image reference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [79381](http://www.securityfocus.com/bid/79381)
2. [](https://jira.atlassian.com/browse/JRA-47557)
3. [](https://confluence.atlassian.com/jira/jira-security-advisory-2015-12-09-792307790.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43505
- **State**: PUBLISHED
- **Published Date**: March 31, 2022 at 16:29 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Cross Site Scripting (XSS) vulnerabilities exist in Ssourcecodester Simple Client Management System v1 via (1) Add new Client and (2) Add new invoice.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://raw.githubusercontent.com/Sentinal920/Findings/main/Simple%20Client%20Management%20System/xss.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49563
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 01:35 UTC
- **Last Updated**: March 29, 2025 at 03:55 UTC
- **Reserved Date**: October 16, 2024 at 05:04 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Dell - Unity**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities)
### Credits
- Dell would like to thank zzcentury from Ubisectech Sirius Team for reporting these issues. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0271
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Runtime library in GNU Ada compiler (GNAT) 3.12p through 3.14p allows local users to modify files of other users via a symlink attack on temporary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4086](http://www.securityfocus.com/bid/4086)
2. [20020212 RUS-CERT Advisory 2002-02:01: Temporary file handling in GNAT](http://marc.info/?l=bugtraq&m=101353440624007&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1742
- **State**: PUBLISHED
- **Published Date**: May 16, 2008 at 06:54 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 11, 2008 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Memory leak in the Certificate Trust List (CTL) Provider service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) allows remote attackers to cause a denial of service (memory consumption and service interruption) via a series of malformed TCP packets, as demonstrated by TCPFUZZ, aka Bug ID CSCsj80609.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080514 Cisco Unified Communications Manager Denial of Service Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml)
2. [cucm-ctlprovider-dos(42410)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42410)
3. [ADV-2008-1533](http://www.vupen.com/english/advisories/2008/1533)
4. [29221](http://www.securityfocus.com/bid/29221)
5. [30238](http://secunia.com/advisories/30238)
6. [1020022](http://securitytracker.com/id?1020022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4622
- **State**: PUBLISHED
- **Published Date**: January 18, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: January 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in admin/admin_news_bot.php in Drunken:Golem Gaming Portal 0.5.1 alpha 2 allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter, a different vector than CVE-2007-0572.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [drunkengolem-adminnews-file-include(53136)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53136)
2. [9635](http://www.exploit-db.com/exploits/9635) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41538
- **State**: PUBLISHED
- **Published Date**: September 28, 2021 at 11:12 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 21, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**Siemens - NX 1953 Series**
Affected versions:
- All versions < V1973.3700 (Status: affected)
**Siemens - NX 1980 Series**
Affected versions:
- All versions < V1988 (Status: affected)
**Siemens - Solid Edge SE2021**
Affected versions:
- All versions < SE2021MP8 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1122/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6898
- **State**: PUBLISHED
- **Published Date**: January 08, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 20:42 UTC
- **Reserved Date**: January 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Widcomm Bluetooth for Windows (BTW) before 4.0.1.1500 allows remote attackers to listen to and record conversations, aka the CarWhisperer attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf)
2. [20070104 23C3 - Bluetooth hacking revisted [Summary and Code]](http://www.securityfocus.com/archive/1/455889/100/0/threaded)
3. [37589](http://osvdb.org/37589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25778
- **State**: PUBLISHED
- **Published Date**: October 14, 2020 at 15:10 UTC
- **Last Updated**: August 04, 2024 at 15:40 UTC
- **Reserved Date**: September 18, 2020 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in a specific kernel extension where an attacker could supply a kernel pointer and leak several bytes of memory. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
### Affected Products
**Trend Micro - Trend Micro Antivirus for Mac (Consumer)**
Affected versions:
- 2020 (v10.x) (Status: affected)
### References
1. [](https://helpcenter.trendmicro.com/en-us/article/TMKA-09948)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1241/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5184
- **State**: PUBLISHED
- **Published Date**: March 30, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 06, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
A vulnerability was discovered in NetIQ Sentinel Server 8.0 before 8.0.1 that may allow leakage of information (account enumeration).
### Affected Products
**n/a - NetIQ Sentinel Server**
Affected versions:
- NetIQ Sentinel Server (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2017-15)
2. [97262](http://www.securityfocus.com/bid/97262)
3. [](https://www.netiq.com/support/kb/doc.php?id=7018753) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12533
- **State**: PUBLISHED
- **Published Date**: June 18, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 08:38 UTC
- **Reserved Date**: June 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2018:2664](https://access.redhat.com/errata/RHSA-2018:2664)
2. [1041617](http://www.securitytracker.com/id/1041617)
3. [](https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html)
4. [RHSA-2018:2663](https://access.redhat.com/errata/RHSA-2018:2663)
5. [104502](http://www.securityfocus.com/bid/104502)
6. [RHSA-2018:2930](https://access.redhat.com/errata/RHSA-2018:2930)
7. [20200313 RichFaces exploitation toolkit](http://seclists.org/fulldisclosure/2020/Mar/21) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52285
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 09:47 UTC
- **Last Updated**: March 11, 2025 at 14:07 UTC
- **Reserved Date**: November 06, 2024 at 14:56 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.8), SiPass integrated ACC-AP (All versions < V6.4.8). Affected devices expose several MQTT URLs without authentication. This could allow an unauthenticated remote attacker to access sensitive data.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Siemens - SiPass integrated AC5102 (ACC-G2)**
Affected versions:
- 0 (Status: affected)
**Siemens - SiPass integrated ACC-AP**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-515903.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2072
- **State**: PUBLISHED
- **Published Date**: April 27, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in DeleGate 9.x before 9.0.6 and 8.x before 8.11.6 allow remote attackers to cause a denial of service via crafted DNS responses messages that cause (1) a buffer over-read or (2) infinite recursion, which can trigger a segmentation fault or invalid memory access, as demonstrated by the OUSPG PROTOS DNS test suite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dns-improper-request-handling(26081)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26081)
2. [VU#955777](http://www.kb.cert.org/vuls/id/955777)
3. [1015991](http://securitytracker.com/id?1015991)
4. [19750](http://secunia.com/advisories/19750)
5. [ADV-2006-1505](http://www.vupen.com/english/advisories/2006/1505)
6. [ADV-2006-1506](http://www.vupen.com/english/advisories/2006/1506)
7. [17691](http://www.securityfocus.com/bid/17691)
8. [](http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en)
9. [](http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29001
- **State**: PUBLISHED
- **Published Date**: November 27, 2024 at 18:20 UTC
- **Last Updated**: November 27, 2024 at 19:22 UTC
- **Reserved Date**: March 29, 2023 at 17:39 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Contiki-NG is an open-source, cross-platform operating system for IoT devices. The Contiki-NG operating system processes source routing headers (SRH) in its two alternative RPL protocol implementations. The IPv6 implementation uses the results of this processing to determine whether an incoming packet should be forwarded to another host. Because of missing validation of the resulting next-hop address, an uncontrolled recursion may occur in the tcpip_ipv6_output function in the os/net/ipv6/tcpip.c module when receiving a packet with a next-hop address that is a local address. Attackers that have the possibility to send IPv6 packets to the Contiki-NG host can therefore trigger deeply nested recursive calls, which can cause a stack overflow. The vulnerability has not been patched in the current release of Contiki-NG, but is expected to be patched in the next release. The problem can be fixed by applying the patch in Contiki-NG pull request #2264. Users are advised to either apply the patch manually or to wait for the next release. There are no known workarounds for this vulnerability.
### Weakness Classification (CWE)
- CWE-674: Security Weakness
### Affected Products
**contiki-ng - contiki-ng**
Affected versions:
- <= 4.9 (Status: affected)
### References
1. [https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-7p75-mf53-ffwm](https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-7p75-mf53-ffwm)
2. [https://github.com/contiki-ng/contiki-ng/pull/2264](https://github.com/contiki-ng/contiki-ng/pull/2264) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10436
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 13:04 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/my-profile.php by adding a question mark (?) followed by the payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniocannito.it/?p=137#uxss)
2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0850
- **State**: PUBLISHED
- **Published Date**: February 21, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 20, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Dokeos 1.8.4 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to whoisonline.php, (2) tracking_list_coaches_column parameter to main/mySpace/index.php, (3) tutor_name parameter to main/create_course/add_course.php, the (4) Referer HTTP header to index.php, and the (5) X-Fowarded-For HTTP header to main/admin/class_list.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27792](http://www.securityfocus.com/bid/27792)
2. [3687](http://securityreason.com/securityalert/3687)
3. [](http://projects.dokeos.com/index.php?do=details&task_id=2218)
4. [20080219 [DSECRG-08-015] Multiple Security Vulnerabilities in Dokeos 1.8.4](http://www.securityfocus.com/archive/1/488314/100/0/threaded)
5. [1019425](http://www.securitytracker.com/id?1019425)
6. [28974](http://secunia.com/advisories/28974)
7. [ADV-2008-0587](http://www.vupen.com/english/advisories/2008/0587) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35089
- **State**: PUBLISHED
- **Published Date**: September 20, 2022 at 23:56 UTC
- **Last Updated**: May 28, 2025 at 15:31 UTC
- **Reserved Date**: July 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SWFTools commit 772e55a2 was discovered to contain a heap-buffer-overflow via getTransparentColor at /home/bupt/Desktop/swftools/src/gif2swf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/issues/181)
2. [](https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30771
- **State**: PUBLISHED
- **Published Date**: November 15, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 16:08 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions. This issue was discovered by Insyde engineering during a security review. Fixed in: Kernel 5.1: Version 05.17.25 Kernel 5.2: Version 05.27.25 Kernel 5.3: Version 05.36.25 Kernel 5.4: Version 05.44.25 Kernel 5.5: Version 05.52.25 https://www.insyde.com/security-pledge/SA-2022064
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.insyde.com/security-pledge)
2. [](https://www.insyde.com/security-pledge/SA-2022064) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7387
- **State**: PUBLISHED
- **Published Date**: June 02, 2014 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: June 02, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Session fixation vulnerability in DataLife Engine (DLE) 9.7 and earlier allows remote attackers to hijack web sessions via the PHPSESSID cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://dle-news.ru/bags/v97/1549-patchi-bezopasnosti-dlya-versii-97.html)
2. [](http://en.securitylab.ru/lab/PT-2012-53)
3. [51971](http://secunia.com/advisories/51971) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22016
- **State**: PUBLISHED
- **Published Date**: September 23, 2021 at 12:12 UTC
- **Last Updated**: August 03, 2024 at 18:30 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.
### Affected Products
**n/a - VMware vCenter Server, VMware Cloud Foundation**
Affected versions:
- VMware vCenter Server 6.7 before 6.7 U3o and VMware Cloud Foundation 3.x before 3.10.2.2 (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2021-0020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-10019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-10019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-10019
- **State**: PUBLISHED
- **Published Date**: February 20, 2023 at 06:31 UTC
- **Last Updated**: March 12, 2025 at 19:27 UTC
- **Reserved Date**: February 18, 2023 at 20:15 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in OCLC-Research OAICat 1.5.61. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.5.62 is able to address this issue. The identifier of the patch is 6cc65501869fa663bcd24a70b63f41f5cfe6b3e1. It is recommended to upgrade the affected component. The identifier VDB-221489 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**OCLC-Research - OAICat**
Affected versions:
- 1.5.61 (Status: affected)
### References
1. [](https://vuldb.com/?id.221489)
2. [](https://vuldb.com/?ctiid.221489)
3. [](https://code.google.com/archive/p/oaicat/issues/7)
4. [](https://github.com/OCLC-Research/oaicat/commit/6cc65501869fa663bcd24a70b63f41f5cfe6b3e1)
5. [](https://oaicat.googlecode.com/files/oaicat-1.5.62.tar.gz)
### Credits
- Ward van Wanrooij |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26857
- **State**: REJECTED
- **Last Updated**: October 13, 2022 at 00:00 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28070
- **State**: PUBLISHED
- **Published Date**: March 16, 2024 at 00:00 UTC
- **Last Updated**: March 20, 2025 at 19:21 UTC
- **Reserved Date**: March 01, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.0.0.4 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient input validation. A successful exploit could allow an attacker to access sensitive information and gain unauthorized access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17260
- **State**: PUBLISHED
- **Published Date**: October 08, 2019 at 11:15 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MPC-HC through 1.7.13 allows a Read Access Violation on a Block Data Move starting at mpc_hc!memcpy+0x000000000000004e.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mpc-hc.org/changelog/)
2. [](https://github.com/linhlhq/research/blob/master/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32884
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 18:04 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 19, 2024 at 14:07 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
- CWE-88: Security Weakness
### Affected Products
**Byron - gitoxide**
Affected versions:
- < 0.42.0 (Status: affected)
- < 0.62 (Status: affected)
- < 0.35 (Status: affected)
### References
1. [https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh](https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh)
2. [https://rustsec.org/advisories/RUSTSEC-2024-0335.html](https://rustsec.org/advisories/RUSTSEC-2024-0335.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55540
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 15:25 UTC
- **Last Updated**: January 02, 2025 at 17:09 UTC
- **Reserved Date**: December 06, 2024 at 17:33 UTC
- **Assigned By**: Acronis
### Vulnerability Description
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169.
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Acronis - Acronis Cyber Protect 16**
Affected versions:
- unspecified (Status: affected)
### References
1. [SEC-2245](https://security-advisory.acronis.com/advisories/SEC-2245)
### Credits
- @vanitas (https://hackerone.com/vanitas) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4689
- **State**: PUBLISHED
- **Published Date**: August 26, 2020 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:36 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 171826.
### Affected Products
**IBM - Security Guardium Data Encryption**
Affected versions:
- 3.0.0.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6320835)
2. [ibm-gde-cve20194689-info-disc (171826)](https://exchange.xforce.ibmcloud.com/vulnerabilities/171826) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1298
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 20:46 UTC
- **Last Updated**: March 07, 2025 at 00:10 UTC
- **Reserved Date**: February 06, 2024 at 22:34 UTC
- **Assigned By**: TianoCore
### Vulnerability Description
EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-369: Security Weakness
### Affected Products
**TianoCore - edk2**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/tianocore/edk2/security/advisories/GHSA-chfw-xj8f-6m53)
2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7NUL7NSZQ76A5OKDUCODQNY7WSX4SST/)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIMEZWDKEIQKU7NMHKL57DOCITPGEXYN/)
### Credits
- Binarly |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0442
- **State**: PUBLISHED
- **Published Date**: February 02, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 07, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
2. [57687](http://www.securityfocus.com/bid/57687)
3. [MDVSA-2013:095](http://www.mandriva.com/security/advisories?name=MDVSA-2013:095)
4. [SSRT101156](http://marc.info/?l=bugtraq&m=136570436423916&w=2)
5. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html)
6. [RHSA-2013:0236](http://rhn.redhat.com/errata/RHSA-2013-0236.html)
7. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html)
8. [VU#858729](http://www.kb.cert.org/vuls/id/858729)
9. [SUSE-SU-2013:0478](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html)
10. [RHSA-2013:0237](http://rhn.redhat.com/errata/RHSA-2013-0237.html)
11. [HPSBUX02857](http://marc.info/?l=bugtraq&m=136439120408139&w=2)
12. [RHSA-2013:0247](http://rhn.redhat.com/errata/RHSA-2013-0247.html)
13. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=906899)
14. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2)
15. [](http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/6527ae06da69)
16. [SSRT101103](http://marc.info/?l=bugtraq&m=136439120408139&w=2)
17. [openSUSE-SU-2013:0312](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html)
18. [openSUSE-SU-2013:0377](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html)
19. [RHSA-2013:0246](http://rhn.redhat.com/errata/RHSA-2013-0246.html)
20. [oval:org.mitre.oval:def:16035](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16035)
21. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html)
22. [HPSBUX02864](http://marc.info/?l=bugtraq&m=136570436423916&w=2)
23. [RHSA-2013:0245](http://rhn.redhat.com/errata/RHSA-2013-0245.html)
24. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html)
25. [](http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS)
26. [oval:org.mitre.oval:def:19434](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19434)
27. [oval:org.mitre.oval:def:19126](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19126)
28. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2)
29. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056)
30. [oval:org.mitre.oval:def:18597](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1171
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 18:06 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists in SymCrypt during the OAEP decryption stage. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.
The update addresses the vulnerability through a software change to the OAEP decoding operations.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1703**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1171) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4560
- **State**: PUBLISHED
- **Published Date**: May 11, 2024 at 05:38 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: May 06, 2024 at 18:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the chatbot_chatgpt_upload_file_to_assistant function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers, with to upload arbitrary files on the affected site's server which may make remote code execution possible.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**kognetiks - Kognetiks Chatbot for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7bc33a05-d462-492e-9ea5-cf37b887cc94?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/chatbot-chatgpt/trunk/includes/utilities/chatbot-file-upload.php#L17)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5522
- **State**: PUBLISHED
- **Published Date**: November 16, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2012-18299](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html)
2. [](http://www.mantisbt.org/bugs/view.php?id=14496)
3. [56520](http://www.securityfocus.com/bid/56520)
4. [[oss-security] 20121114 Re: CVE request: mantis before 1.2.12](http://openwall.com/lists/oss-security/2012/11/14/1)
5. [FEDORA-2012-18294](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html)
6. [](http://www.mantisbt.org/bugs/changelog_page.php?version_id=150)
7. [FEDORA-2012-18273](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4011
- **State**: PUBLISHED
- **Published Date**: March 21, 2019 at 15:42 UTC
- **Last Updated**: August 05, 2024 at 04:57 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable integer underflow vulnerability exists in the mdnscap binary of the CUJO Smart Firewall, version 7003. When parsing SRV records in an mDNS packet, the "RDLENGTH" value is handled incorrectly, leading to an out-of-bounds access that crashes the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.
### Affected Products
**n/a - CUJO**
Affected versions:
- CUJO Smart Firewall - Firmware version 7003 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12598
- **State**: PUBLISHED
- **Published Date**: June 07, 2019 at 17:36 UTC
- **Last Updated**: August 04, 2024 at 23:24 UTC
- **Reserved Date**: June 03, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SuiteCRM 7.8.x before 7.8.30, 7.10.x before 7.10.17, and 7.11.x before 7.11.5 allows SQL Injection (issue 1 of 3).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1400
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 07:04 UTC
- **Last Updated**: May 07, 2025 at 14:02 UTC
- **Reserved Date**: February 17, 2025 at 16:14 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
Out-of-bounds Read vulnerability in unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**libplctag - libplctag**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1400)
### Credits
- Gabriele Quagliarella |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6833
- **State**: PUBLISHED
- **Published Date**: December 10, 2016 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 17, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93255](http://www.securityfocus.com/bid/93255)
2. [[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html)
3. [[oss-security] 20160812 CVE request: Qemu net: vmxnet3: use after free while writing](http://www.openwall.com/lists/oss-security/2016/08/12/1)
4. [[qemu-devel] 20160809 [PULL 2/3] net: vmxnet3: check for device_active before write](https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html)
5. [GLSA-201609-01](https://security.gentoo.org/glsa/201609-01)
6. [[oss-security] 20160817 Re: CVE request: Qemu net: vmxnet3: use after free while writing](http://www.openwall.com/lists/oss-security/2016/08/18/3)
7. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7871
- **State**: PUBLISHED
- **Published Date**: June 29, 2021 at 12:51 UTC
- **Last Updated**: August 04, 2024 at 09:41 UTC
- **Reserved Date**: January 22, 2020 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient validation of the parameter. This issue affects: Cnesty Helpcom 10.0 versions prior to.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cnesty - Helpcom**
Affected versions:
- 10.0 (Status: affected)
### References
1. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36095)
### Credits
- Jeongun Baek |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3953
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15634
- **State**: PUBLISHED
- **Published Date**: August 19, 2020 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 routers with firmware 1.0.4.84_10.0.58. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9755.
### Weakness Classification (CWE)
- CWE-134: Security Weakness
### Affected Products
**NETGEAR - R6700**
Affected versions:
- 1.0.4.84_10.0.58 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-935/)
2. [](https://kb.netgear.com/000062126/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R6700v3-PSV-2020-0189)
### Credits
- d4rkn3ss from VNPT ISC |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2310
- **State**: PUBLISHED
- **Published Date**: April 26, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in plugins/spaw/img_popup.php in BloofoxCMS 0.2.2 allows remote attackers to inject arbitrary web script or HTML via the img_url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2640](http://securityreason.com/securityalert/2640)
2. [23487](http://www.securityfocus.com/bid/23487)
3. [20070414 bloofoxCMS 0.2.2 Cross Site Scripting](http://www.securityfocus.com/archive/1/465719/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51733
- **State**: PUBLISHED
- **Published Date**: January 17, 2024 at 07:11 UTC
- **Last Updated**: August 30, 2024 at 15:24 UTC
- **Reserved Date**: December 22, 2023 at 09:53 UTC
- **Assigned By**: CERT-In
### Vulnerability Description
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Identity parameter under Local endpoint settings at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
### CVSS Metrics
- **CVSS Base Score**: 6.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Hathway - Skyworth Router CM5100**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013)
### Credits
- This vulnerability is reported by Sushant Mane, Parul Sindhwad, Tushar Nagrare and Dr. Faruk Kazi from CoE-CNDS Lab, VJTI Mumbai, India. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27214
- **State**: PUBLISHED
- **Published Date**: February 19, 2021 at 18:39 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 14, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Server-side request forgery (SSRF) vulnerability in the ProductConfig servlet in Zoho ManageEngine ADSelfService Plus through 6013 allows a remote unauthenticated attacker to perform blind HTTP requests or perform a Cross-site scripting (XSS) attack against the administrative interface via an HTTP request, a different vulnerability than CVE-2019-3905.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/self-service-password/release-notes.html)
2. [](https://www.horizonsecurity.it/lang_EN/advisories/?a=20&title=ManageEngine+ADSelfService+Plus+privilege+escalation++CVE202127214) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2185
- **State**: PUBLISHED
- **Published Date**: January 19, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130905 Re: CVE-2013-2185 / Tomcat](http://www.openwall.com/lists/oss-security/2013/09/05/4)
2. [RHSA-2013:1193](http://rhn.redhat.com/errata/RHSA-2013-1193.html)
3. [RHSA-2013:1265](http://rhn.redhat.com/errata/RHSA-2013-1265.html)
4. [[oss-security] 20141024 Re: Duplicate Request: CVE-2013-4444 as a duplicate of CVE-2013-2185](http://openwall.com/lists/oss-security/2014/10/24/12)
5. [RHSA-2013:1194](http://rhn.redhat.com/errata/RHSA-2013-1194.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2588
- **State**: PUBLISHED
- **Published Date**: May 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Russcom PHPImages allows remote attackers to upload files of arbitrary types by uploading a file with a .gif extension. NOTE: due to lack of specific information about attack vectors do not depend on the existence of another vulnerability, it is not clear whether this is a vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060522 Russcom PHPImages lack of validation](http://www.securityfocus.com/archive/1/434824/100/0/threaded)
2. [953](http://securityreason.com/securityalert/953)
3. [phpimages-image-file-upload(26649)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26649)
4. [18089](http://www.securityfocus.com/bid/18089) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.