System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48297, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48297 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48297 - **State**: PUBLISHED - **Published Date**: February 09, 2023 at 00:00 UTC - **Last Updated**: March 25, 2025 at 13:50 UTC - **Reserved Date**: January 29, 2023 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) - 3.0.0 (Status: affected) **Huawei - EMUI** Affected versions: - 12.0.1 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474) 2. [](https://consumer.huawei.com/en/support/bulletin/2023/2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6273 - **State**: PUBLISHED - **Published Date**: June 23, 2024 at 22:00 UTC - **Last Updated**: August 01, 2024 at 21:33 UTC - **Reserved Date**: June 23, 2024 at 09:34 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as problematic. Affected by this vulnerability is the function save_patient of the file patient_side.php. The manipulation of the argument Full Name/Contact/Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269485 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SourceCodester - Clinic Queuing System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-269485 | SourceCodester Clinic Queuing System patient_side.php save_patient cross site scripting](https://vuldb.com/?id.269485) 2. [VDB-269485 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.269485) 3. [Submit #362873 | SourceCodester Clinic Queuing System using PHP and SQlite3 1.0 Cross Site Scripting](https://vuldb.com/?submit.362873) 4. [](https://docs.google.com/document/d/14ExrgXqPQlgvjw2poqNzYzAOi-C5tda-XBJF513yzag/edit?usp=sharing) 5. [](https://github.com/sgr-xd/CVEs/blob/main/CVE-2024-6273.md) ### Credits - Guru Raghav Saravanan - R0ck3t (VulDB User) - R0ck3t (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2351, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2351 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2351 - **State**: PUBLISHED - **Published Date**: July 13, 2013 at 10:00 UTC - **Last Updated**: September 16, 2024 at 21:03 UTC - **Reserved Date**: March 04, 2013 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.00, 9.1x, and 9.2x allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT101012](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03747342) 2. [HPSBMU02870](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03747342)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3662 - **State**: PUBLISHED - **Published Date**: November 13, 2019 at 23:45 UTC - **Last Updated**: August 04, 2024 at 19:12 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **McAfee - Advanced Threat Defense (ATD)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10304)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5886, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5886 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5886 - **State**: PUBLISHED - **Published Date**: January 12, 2009 at 19:27 UTC - **Last Updated**: August 07, 2024 at 11:13 UTC - **Reserved Date**: January 12, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TAKempis Discussion Web 4.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing a password via a direct request for _private/discussion.mdb. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4899](http://securityreason.com/securityalert/4899) 2. [7445](https://www.exploit-db.com/exploits/7445) 3. [discussionweb-discussion-info-disclosure(47348)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47348)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22738 - **State**: PUBLISHED - **Published Date**: May 26, 2021 at 19:19 UTC - **Last Updated**: August 03, 2024 at 18:51 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description Use of a Broken or Risky Cryptographic Algorithm vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access when credentials are discovered after a brute force attack. ### Weakness Classification (CWE) - CWE-327: Security Weakness ### Affected Products **n/a - homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior** Affected versions: - homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36823 - **State**: PUBLISHED - **Published Date**: July 06, 2023 at 15:06 UTC - **Last Updated**: February 13, 2025 at 16:56 UTC - **Reserved Date**: June 27, 2023 at 15:43 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in "relaxed" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow `style` elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence `</` as `<\/` in `style` element content. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **rgrove - sanitize** Affected versions: - >= 3.0.0, < 6.0.2 (Status: affected) ### References 1. [https://github.com/rgrove/sanitize/security/advisories/GHSA-f5ww-cq3m-q3g7](https://github.com/rgrove/sanitize/security/advisories/GHSA-f5ww-cq3m-q3g7) 2. [https://github.com/rgrove/sanitize/commit/76ed46e6dc70820f38efe27de8dabd54dddb5220](https://github.com/rgrove/sanitize/commit/76ed46e6dc70820f38efe27de8dabd54dddb5220) 3. [https://github.com/rgrove/sanitize/releases/tag/v6.0.2](https://github.com/rgrove/sanitize/releases/tag/v6.0.2) 4. [](https://lists.debian.org/debian-lts-announce/2023/11/msg00008.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15573 - **State**: PUBLISHED - **Published Date**: August 26, 2019 at 14:24 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gesior-AAC before 2019-05-01 allows SQL injection in tankyou.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/marcomoa/gesior-aac/pull/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1110 - **State**: PUBLISHED - **Published Date**: August 11, 2021 at 21:33 UTC - **Last Updated**: August 03, 2024 at 15:55 UTC - **Reserved Date**: November 12, 2020 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA Linux kernel distributions on Jetson Xavier contain a vulnerability in camera firmware where a user can change input data after validation, which may lead to complete denial of service and serious data corruption of all kernel components. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Affected Products **NVIDIA - Jetson AGX Xavier series, Jetson Xavier NX.** Affected versions: - All Jetson Linux versions prior to r32.6.1 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5216)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5032 - **State**: PUBLISHED - **Published Date**: February 17, 2017 at 17:00 UTC - **Last Updated**: August 06, 2024 at 00:46 UTC - **Reserved Date**: May 24, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The dwarf_get_xu_hash_entry function in libdwarf before 20160923 allows remote attackers to cause a denial of service (crash) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.prevanders.net/dwarfbug.html) 2. [[oss-security] 20160524 CVE request: Multiple vunerabilities in libdwarf & dwarfdump](http://www.openwall.com/lists/oss-security/2016/05/24/1) 3. [[oss-security] 20160524 Re: CVE request: Multiple vunerabilities in libdwarf & dwarfdump](http://www.openwall.com/lists/oss-security/2016/05/25/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4070 - **State**: PUBLISHED - **Published Date**: June 22, 2020 at 15:40 UTC - **Last Updated**: August 04, 2024 at 07:52 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In CSS Validator less than or equal to commit 54d68a1, there is a cross-site scripting vulnerability in handling URIs. A user would have to click on a specifically crafted validator link to trigger it. This has been patched in commit e5c09a9. ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **World Wide Web Consortium (W3C) - CSS Validator** Affected versions: - <= 54d68a1 (Status: affected) ### References 1. [](https://github.com/w3c/css-validator/security/advisories/GHSA-wf36-7w73-rh8c) 2. [](https://github.com/w3c/css-validator/commit/e5c09a9119167d3064db786d5f00d730b584a53b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0152 - **State**: PUBLISHED - **Published Date**: July 14, 2017 at 18:00 UTC - **Last Updated**: September 16, 2024 at 18:39 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way affected Microsoft scripting engine render when handling objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user, aka "Scripting Engine Memory Corruption Vulnerability." ### Affected Products **Microsoft Corporation - Microsoft ChakraCore** Affected versions: - Microsoft ChakraCore (Status: affected) ### References 1. [](https://github.com/Microsoft/ChakraCore/commit/9da019424601325a6e95e6be0fa03d7d21d0b517)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2970 - **State**: PUBLISHED - **Published Date**: October 16, 2019 at 17:40 UTC - **Last Updated**: October 15, 2024 at 18:45 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.4 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7810, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7810 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7810 - **State**: PUBLISHED - **Published Date**: November 30, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 06:37 UTC - **Reserved Date**: March 08, 2018 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 allowing an attacker to craft a URL containing JavaScript that will be executed within the user's browser, potentially impacting the machine the browser is running on. ### Affected Products **Schneider Electric SE - Embedded Web Servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200** Affected versions: - Embedded Web Servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2018-38) 2. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41216, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41216 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41216 - **State**: PUBLISHED - **Published Date**: November 05, 2021 at 22:10 UTC - **Last Updated**: August 04, 2024 at 03:08 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an open source platform for machine learning. In affected versions the shape inference function for `Transpose` is vulnerable to a heap buffer overflow. This occurs whenever `perm` contains negative elements. The shape inference function does not validate that the indices in `perm` are all valid. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **tensorflow - tensorflow** Affected versions: - >= 2.6.0, < 2.6.1 (Status: affected) - >= 2.5.0, < 2.5.2 (Status: affected) - < 2.4.4 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9) 2. [](https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31085, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31085 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31085 - **State**: PUBLISHED - **Published Date**: March 31, 2024 at 19:34 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 28, 2024 at 06:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Marsh, SJ Post-Plugin Library allows Reflected XSS.This issue affects Post-Plugin Library: from n/a through 2.6.2.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Rob Marsh, SJ - Post-Plugin Library** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/post-plugin-library/wordpress-post-plugin-library-plugin-2-6-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Dimas Maulana (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4794 - **State**: PUBLISHED - **Published Date**: October 30, 2008 at 20:49 UTC - **Last Updated**: August 07, 2024 at 10:31 UTC - **Reserved Date**: October 30, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera before 9.62 allows remote attackers to execute arbitrary commands via the History Search results page, a different vulnerability than CVE-2008-4696. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32538](http://secunia.com/advisories/32538) 2. [opera-historysearch-command-execution(46219)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46219) 3. [1021128](http://www.securitytracker.com/id?1021128) 4. [SUSE-SR:2008:023](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html) 5. [](http://www.opera.com/support/search/view/906/) 6. [31991](http://www.securityfocus.com/bid/31991) 7. [GLSA-200811-01](http://security.gentoo.org/glsa/glsa-200811-01.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1788 - **State**: PUBLISHED - **Published Date**: January 21, 2020 at 22:49 UTC - **Last Updated**: August 04, 2024 at 06:46 UTC - **Reserved Date**: November 29, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Honor V30 smartphones with versions earlier than 10.0.1.135(C00E130R4P1) have an improper authentication vulnerability. Certain applications do not properly validate the identity of another application who would call its interface. An attacker could trick the user into installing a malicious application. Successful exploit could allow unauthorized actions leading to information disclosure. ### Affected Products **n/a - Honor V30** Affected versions: - Versions earlier than 10.0.1.135(C00E130R4P1) (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-02-smartphone-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25056 - **State**: PUBLISHED - **Published Date**: August 31, 2020 at 20:24 UTC - **Last Updated**: August 04, 2024 at 15:26 UTC - **Reserved Date**: August 31, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Samsung mobile devices with Q(10.0) (Galaxy S20) software. Because HAL improperly checks versions, bootloading by the S.LSI NFC chipset is mishandled. The Samsung ID is SVE-2020-16169 (August 2020). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29784 - **State**: PUBLISHED - **Published Date**: June 03, 2022 at 20:27 UTC - **Last Updated**: August 03, 2024 at 06:33 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PublicCMS V4.0.202204.a and below contains an information leak via the component /views/directive/sys/SysConfigDataDirective.java. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/JinYiTong/CVE-Req/blob/main/publiccms/publiccms.md) 2. [](https://github.com/sanluan/PublicCMS/commit/d8d7626cf51e4968fb384e1637a3c0c9921f33e9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21817 - **State**: PUBLISHED - **Published Date**: July 16, 2021 at 10:24 UTC - **Last Updated**: August 03, 2024 at 18:23 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An information disclosure vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **n/a - D-Link** Affected versions: - D-LINK DIR-3040 1.13B03 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1282)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8537 - **State**: PUBLISHED - **Published Date**: October 29, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 13:18 UTC - **Reserved Date**: October 29, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description McAfee Network Data Loss Prevention (NDLP) before 9.2.2 allows local users to obtain sensitive information by reading the logs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [70835](http://www.securityfocus.com/bid/70835) 2. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10044) 3. [mcafee-ndlp-cve20148537-info-disc(98430)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98430)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10220 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 07:32 UTC - **Reserved Date**: April 19, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mushorg/glastopf/issues/286)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7697, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7697 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7697 - **State**: PUBLISHED - **Published Date**: April 11, 2017 at 23:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 11, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In libsamplerate before 0.1.9, a buffer over-read occurs in the calc_output_single function in src_sinc.c via a crafted audio file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/erikd/libsamplerate/issues/11) 2. [97587](http://www.securityfocus.com/bid/97587) 3. [[debian-lts-announce] 20211214 [SECURITY] [DLA 2845-1] libsamplerate security update](https://lists.debian.org/debian-lts-announce/2021/12/msg00010.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3051, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3051 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3051 - **State**: PUBLISHED - **Published Date**: July 07, 2008 at 18:20 UTC - **Last Updated**: August 07, 2024 at 09:21 UTC - **Reserved Date**: July 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Pinboard extension 0.0.6 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [pinboard-sql-injection(43489)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43489) 2. [](http://typo3.org/teams/security/security-bulletins/typo3-20080701-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36888, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36888 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36888 - **State**: PUBLISHED - **Published Date**: July 27, 2022 at 14:22 UTC - **Last Updated**: August 03, 2024 at 10:14 UTC - **Reserved Date**: July 27, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys. ### Affected Products **Jenkins project - Jenkins HashiCorp Vault Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2593) 2. [[oss-security] 20220727 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/07/27/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1873 - **State**: PUBLISHED - **Published Date**: April 20, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:27 UTC - **Reserved Date**: April 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Oracle Database Server 9.2.0.7, 10.1.0.4, and 10.2.0.1 has unknown impact and attack vectors in the Oracle Spatial component, aka Vuln# DB08. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19712](http://secunia.com/advisories/19712) 2. [19859](http://secunia.com/advisories/19859) 3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2006-090826.html) 4. [ADV-2006-1571](http://www.vupen.com/english/advisories/2006/1571) 5. [17590](http://www.securityfocus.com/bid/17590) 6. [SSRT061148](http://www.securityfocus.com/archive/1/432267/100/0/threaded) 7. [oracle-database-multiple-unspecified(26068)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26068) 8. [ADV-2006-1397](http://www.vupen.com/english/advisories/2006/1397) 9. [HPSBMA02113](http://www.securityfocus.com/archive/1/432267/100/0/threaded) 10. [1015961](http://securitytracker.com/id?1015961)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4913 - **State**: PUBLISHED - **Published Date**: September 17, 2007 at 17:00 UTC - **Last Updated**: September 17, 2024 at 02:21 UTC - **Reserved Date**: September 17, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ips_kernel/class_upload.php in Invision Power Board (IPB or IP.Board) 2.3.1 up to 20070912 allows remote attackers to upload arbitrary script files with crafted image filenames to uploads/, where they are saved with a .txt extension and are not executable. NOTE: there are limited usage scenarios under which this would be a vulnerability, but it is being tracked by CVE since the vendor has stated it is security-relevant. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://forums.invisionpower.com/index.php?act=attach&type=post&id=11870) 2. [](http://forums.invisionpower.com/index.php?showtopic=237075)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36740, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36740 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36740 - **State**: PUBLISHED - **Published Date**: June 06, 2024 at 18:40 UTC - **Last Updated**: February 13, 2025 at 15:59 UTC - **Reserved Date**: May 30, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in OneFlow-Inc. Oneflow v0.9.1 allows attackers to cause a Denial of Service (DoS) when index as a negative number exceeds the range of size. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/Redmept1on/070f5b8b752079c6b761f00f3cab7103)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1220 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Majordomo 1.94.3 and earlier allows remote attackers to execute arbitrary commands when the advertise or noadvertise directive is used in a configuration file, via shell metacharacters in the Reply-To header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19970824 Vulnerability in Majordomo](http://www.securityfocus.com/archive/1/7527) 2. [majordomo-advertise(502)](https://exchange.xforce.ibmcloud.com/vulnerabilities/502)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4025, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4025 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4025 - **State**: PUBLISHED - **Published Date**: August 17, 2024 at 07:34 UTC - **Last Updated**: August 19, 2024 at 18:20 UTC - **Reserved Date**: July 31, 2023 at 15:45 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_player function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to update player instances. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **princeahmed - Radio Player – Live Shoutcast, Icecast and Any Audio Stream Player for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/77409977-6822-4d14-9842-cb6a5aff2162?source=cve) 2. [](https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt) 3. [](https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php) 4. [](https://plugins.trac.wordpress.org/changeset/3048105) ### Credits - Alex Thomas
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27400 - **State**: PUBLISHED - **Published Date**: February 28, 2025 at 15:26 UTC - **Last Updated**: February 28, 2025 at 15:43 UTC - **Reserved Date**: February 24, 2025 at 15:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue. ### CVSS Metrics - **CVSS Base Score**: 2.9/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **OpenMage - magento-lts** Affected versions: - < 20.12.3 (Status: affected) ### References 1. [https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668](https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668) 2. [https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea](https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea) 3. [https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3](https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3) 4. [https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0](https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0107 - **State**: PUBLISHED - **Published Date**: April 15, 2014 at 17:00 UTC - **Last Updated**: August 06, 2024 at 09:05 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201604-02](https://security.gentoo.org/glsa/201604-02) 2. [59291](http://secunia.com/advisories/59291) 3. [59290](http://secunia.com/advisories/59290) 4. [RHSA-2015:1888](http://rhn.redhat.com/errata/RHSA-2015-1888.html) 5. [59151](http://secunia.com/advisories/59151) 6. [59247](http://secunia.com/advisories/59247) 7. [59515](http://secunia.com/advisories/59515) 8. [DSA-2886](http://www.debian.org/security/2014/dsa-2886) 9. [60502](http://secunia.com/advisories/60502) 10. [59369](http://secunia.com/advisories/59369) 11. [59711](http://secunia.com/advisories/59711) 12. [57563](http://secunia.com/advisories/57563) 13. [66397](http://www.securityfocus.com/bid/66397) 14. [1034711](http://www.securitytracker.com/id/1034711) 15. [1034716](http://www.securitytracker.com/id/1034716) 16. [RHSA-2014:1351](http://rhn.redhat.com/errata/RHSA-2014-1351.html) 17. [RHSA-2014:0348](http://rhn.redhat.com/errata/RHSA-2014-0348.html) 18. [59036](http://secunia.com/advisories/59036) 19. [apache-xalanjava-cve20140107-sec-bypass(92023)](https://exchange.xforce.ibmcloud.com/vulnerabilities/92023) 20. [[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities](https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E) 21. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E) 22. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) 23. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 24. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html) 25. [](https://www.oracle.com//security-alerts/cpujul2021.html) 26. [](https://issues.apache.org/jira/browse/XALANJ-2435) 27. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755) 28. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676093) 29. [](http://www.ibm.com/support/docview.wss?uid=swg21677967) 30. [](https://www.tenable.com/security/tns-2018-15) 31. [](http://www-01.ibm.com/support/docview.wss?uid=swg21677145) 32. [](http://www-01.ibm.com/support/docview.wss?uid=swg21681933) 33. [](http://www-01.ibm.com/support/docview.wss?uid=swg21674334) 34. [](http://www.ocert.org/advisories/ocert-2014-002.html) 35. [](http://svn.apache.org/viewvc?view=revision&revision=1581058) 36. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680703) 37. [[tomcat-dev] 20210823 [Bug 65516] New: upgrade to xalan 2.7.2 to address CVE-2014-0107](https://lists.apache.org/thread.html/r0c00afcab8f238562e27b3ae7b8af1913c62bc60838fb8b34c19e26b%40%3Cdev.tomcat.apache.org%3E) 38. [[tomcat-dev] 20210823 [Bug 65516] upgrade to xalan 2.7.2 to address CVE-2014-0107](https://lists.apache.org/thread.html/r2900489bc665a2e32d021bb21f6ce2cb8e6bb5973490eebb9a346bca%40%3Cdev.tomcat.apache.org%3E) 39. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1145, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1145 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1145 - **State**: PUBLISHED - **Published Date**: July 22, 2022 at 23:39 UTC - **Last Updated**: August 02, 2024 at 23:55 UTC - **Reserved Date**: March 29, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interaction and profile destruction. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html) 2. [](https://crbug.com/1304545) 3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5067, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5067 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5067 - **State**: PUBLISHED - **Published Date**: June 24, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:32 UTC - **Reserved Date**: June 24, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The (1) Cross-System Tools and (2) Data Transfer Workbench in SAP NetWeaver have hardcoded credentials, which allows remote attackers to obtain access via unspecified vectors, aka SAP Security Notes 2059659 and 2057982. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://erpscan.io/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/) 2. [](https://erpscan.io/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/) 3. [](http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015) 4. [](http://packetstormsecurity.com/files/133516/SAP-NetWeaver-AS-LSCT1I13-ABAP-Hardcoded-Credentials.html) 5. [](http://packetstormsecurity.com/files/133515/SAP-NetWeaver-AS-FKCDBFTRACE-ABAP-Hardcoded-Credentials.html) 6. [75165](http://www.securityfocus.com/bid/75165)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43640 - **State**: PUBLISHED - **Published Date**: November 12, 2024 at 17:54 UTC - **Last Updated**: January 30, 2025 at 00:10 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Kernel-Mode Driver Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-415: Security Weakness ### Affected Products **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) ### References 1. [Windows Kernel-Mode Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0392, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0392 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0392 - **State**: PUBLISHED - **Published Date**: July 12, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: June 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FreeBSD-SA-00:20](http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html) 2. [RHSA-2000:025](http://www.redhat.com/support/errata/RHSA-2000-025.html) 3. [CA-2000-06](http://www.cert.org/advisories/CA-2000-06.html) 4. [20000516 BUFFER OVERRUN VULNERABILITIES IN KERBEROS](http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html) 5. [1220](http://www.securityfocus.com/bid/1220)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34316, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34316 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34316 - **State**: PUBLISHED - **Published Date**: July 13, 2021 at 11:03 UTC - **Last Updated**: August 04, 2024 at 00:05 UTC - **Reserved Date**: June 08, 2021 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The DL180CoolType.dll library in affected applications lacks proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13380) ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Siemens - JT2Go** Affected versions: - All versions < V13.2 (Status: affected) **Siemens - Teamcenter Visualization** Affected versions: - All versions < V13.2 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-849/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8562, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8562 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8562 - **State**: PUBLISHED - **Published Date**: July 11, 2017 at 21:00 UTC - **Last Updated**: September 17, 2024 at 04:19 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to Windows improperly handling calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability". ### Affected Products **Microsoft Corporation - Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703.** Affected versions: - Microsoft Windows (Status: affected) ### References 1. [99397](http://www.securityfocus.com/bid/99397) 2. [](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8562)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26471, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26471 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26471 - **State**: PUBLISHED - **Published Date**: October 07, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 05:03 UTC - **Reserved Date**: March 04, 2022 at 00:00 UTC - **Assigned By**: MediaTek ### Vulnerability Description In telephony, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319121; Issue ID: ALPS07319121. ### Affected Products **MediaTek, Inc. - MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8321, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797** Affected versions: - Android 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/October-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6018, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6018 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6018 - **State**: PUBLISHED - **Published Date**: November 16, 2023 at 16:05 UTC - **Last Updated**: August 02, 2024 at 08:21 UTC - **Reserved Date**: November 08, 2023 at 09:12 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description An attacker can overwrite any file on the server hosting MLflow without any authentication. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **mlflow - mlflow/mlflow** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/7cf918b5-43f4-48c0-a371-4d963ce69b30)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23389, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23389 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23389 - **State**: PUBLISHED - **Published Date**: February 14, 2022 at 20:48 UTC - **Last Updated**: August 03, 2024 at 03:43 UTC - **Reserved Date**: January 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PublicCMS v4.0 was discovered to contain a remote code execution (RCE) vulnerability via the cmdarray parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/sanluan/PublicCMS/issues/59)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17432, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17432 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17432 - **State**: PUBLISHED - **Published Date**: December 06, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 20:51 UTC - **Reserved Date**: December 05, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt) 2. [](https://bugs.debian.org/883602) 3. [DSA-4067](https://www.debian.org/security/2017/dsa-4067) 4. [[debian-lts-announce] 20171220 [SECURITY] [DLA 1213-1] openafs security update](https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3178, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3178 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3178 - **State**: PUBLISHED - **Published Date**: September 12, 2022 at 16:30 UTC - **Last Updated**: August 03, 2024 at 01:00 UTC - **Reserved Date**: September 12, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV. ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **gpac - gpac/gpac** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0) 2. [](https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1826 - **State**: PUBLISHED - **Published Date**: June 02, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:06 UTC - **Reserved Date**: June 02, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in HP Radia Notify Daemon 3.1.0.0 (formerly by Novadigm), and other versions including 2.x, 3.x, and 4.x, allows remote attackers to execute arbitrary code via a long file extension. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1014089](http://securitytracker.com/id?1014089) 2. [ADV-2005-0681](http://www.vupen.com/english/advisories/2005/0681) 3. [HPSBMA01143](http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034394.html) 4. [20050601 HP Radia Notify Daemon: Multiple Buffer Overflow Vulnerabilities](http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034387.html) 5. [15567](http://secunia.com/advisories/15567) 6. [](http://www.grok.org.uk/advisories/radexecd.html) 7. [SSRT5962](http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034394.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44185 - **State**: PUBLISHED - **Published Date**: October 24, 2024 at 16:40 UTC - **Last Updated**: November 04, 2024 at 21:46 UTC - **Reserved Date**: August 20, 2024 at 21:42 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved checks. This issue is fixed in tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. ### Affected Products **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/120916) 2. [](https://support.apple.com/en-us/120911) 3. [](https://support.apple.com/en-us/120913) 4. [](https://support.apple.com/en-us/120909) 5. [](https://support.apple.com/en-us/120914) 6. [](https://support.apple.com/en-us/120915)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42631 - **State**: PUBLISHED - **Published Date**: November 01, 2023 at 09:08 UTC - **Last Updated**: September 05, 2024 at 19:55 UTC - **Reserved Date**: September 12, 2023 at 08:33 UTC - **Assigned By**: Unisoc ### Vulnerability Description In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0734 - **State**: PUBLISHED - **Published Date**: March 13, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:21 UTC - **Reserved Date**: March 12, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PY Software Active Webcam WebServer (webcam.exe) 5.5 allows remote attackers to cause a denial of service (memory exhaustion and process crash) via a large number of HTTP requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [active-webcam-memory-dos(19653)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19653) 2. [](http://secway.org/advisory/ad20050104.txt) 3. [20050310 Multiple Vulnerabilities of PY Software Active Webcam WebServer](http://archives.neohapsis.com/archives/fulldisclosure/2005-03/0216.html) 4. [14553](http://secunia.com/advisories/14553)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0339 - **State**: PUBLISHED - **Published Date**: January 15, 2010 at 19:00 UTC - **Last Updated**: September 16, 2024 at 18:29 UTC - **Reserved Date**: January 15, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the User Links (vm19_userlinks) extension 0.1.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-021/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22353 - **State**: PUBLISHED - **Published Date**: March 31, 2024 at 11:43 UTC - **Last Updated**: August 01, 2024 at 22:43 UTC - **Reserved Date**: January 08, 2024 at 23:42 UTC - **Assigned By**: ibm ### Vulnerability Description IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-770: Security Weakness ### Affected Products **IBM - WebSphere Application Server Liberty** Affected versions: - 17.0.0.3 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7145365) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/280400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5259, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5259 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5259 - **State**: PUBLISHED - **Published Date**: February 12, 2013 at 20:00 UTC - **Last Updated**: August 07, 2024 at 00:30 UTC - **Reserved Date**: February 12, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in lib/controllers/CentralController.php in OrangeHRM before 2.6.11.2 allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_orangehrm.html) 2. [20111130 Multiple vulnerabilities in OrangeHRM](http://www.securityfocus.com/archive/1/520684/100/0/threaded) 3. [77418](http://osvdb.org/show/osvdb/77418) 4. [50857](http://www.securityfocus.com/bid/50857) 5. [orangehrm-id-sql-injection(71569)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71569) 6. [47014](http://secunia.com/advisories/47014) 7. [](http://blog.orangehrm.com/2011/12/09/security-vulnerabilities-fixed-with-orangehrm-26112/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36380 - **State**: PUBLISHED - **Published Date**: October 31, 2021 at 19:51 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/shenzhim/aaptjs/issues/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2709, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2709 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2709 - **State**: PUBLISHED - **Published Date**: November 20, 2005 at 22:00 UTC - **Last Updated**: August 07, 2024 at 22:45 UTC - **Reserved Date**: August 26, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2006:0140](http://www.redhat.com/support/errata/RHSA-2006-0140.html) 2. [18684](http://secunia.com/advisories/18684) 3. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14.1) 4. [19369](http://secunia.com/advisories/19369) 5. [RHSA-2006:0101](http://www.redhat.com/support/errata/RHSA-2006-0101.html) 6. [ADV-2005-2359](http://www.vupen.com/english/advisories/2005/2359) 7. [17541](http://secunia.com/advisories/17541) 8. [DSA-1018](http://www.debian.org/security/2006/dsa-1018) 9. [FLSA:157459-2](http://www.securityfocus.com/archive/1/428058/100/0/threaded) 10. [1015434](http://securitytracker.com/id?1015434) 11. [20676](http://www.osvdb.org/20676) 12. [FLSA:157459-4](http://www.securityfocus.com/archive/1/427981/100/0/threaded) 13. [USN-219-1](https://usn.ubuntu.com/219-1/) 14. [17648](http://secunia.com/advisories/17648) 15. [RHSA-2006:0190](http://www.redhat.com/support/errata/RHSA-2006-0190.html) 16. [18510](http://secunia.com/advisories/18510) 17. [FLSA:157459-1](http://www.securityfocus.com/archive/1/428028/100/0/threaded) 18. [kernel-sysctl-interface-dos(23040)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23040) 19. [FLSA:157459-3](http://www.securityfocus.com/archive/1/427980/100/0/threaded) 20. [DSA-1017](http://www.debian.org/security/2006/dsa-1017) 21. [oval:org.mitre.oval:def:10746](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10746) 22. [17504](http://secunia.com/advisories/17504) 23. [MDKSA-2006:059](http://www.mandriva.com/security/advisories?name=MDKSA-2006:059) 24. [19374](http://secunia.com/advisories/19374) 25. [RHSA-2006:0191](http://www.redhat.com/support/errata/RHSA-2006-0191.html) 26. [18562](http://secunia.com/advisories/18562) 27. [15365](http://www.securityfocus.com/bid/15365)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19902, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19902 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19902 - **State**: PUBLISHED - **Published Date**: December 31, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 11:51 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No-CMS 1.1.3 is prone to Persistent XSS via the blog/manage_article "keyword" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/security-breachlock/CVE-2018-19902/blob/master/XSS.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2304 - **State**: REJECTED - **Published Date**: June 15, 2010 at 17:48 UTC - **Last Updated**: September 28, 2010 at 09:00 UTC - **Reserved Date**: June 15, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47162 - **State**: PUBLISHED - **Published Date**: March 14, 2023 at 06:53 UTC - **Last Updated**: January 13, 2025 at 15:53 UTC - **Reserved Date**: December 12, 2022 at 11:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Dannie Herdyawan DH – Anti AdBlocker plugin <= 36 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Dannie Herdyawan - DH – Anti AdBlocker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/dh-anti-adblocker/wordpress-dh-anti-adblocker-plugin-36-cross-site-request-forgery-csrf?_s_id=cve) ### Credits - rezaduty (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9186 - **State**: PUBLISHED - **Published Date**: November 14, 2024 at 06:00 UTC - **Last Updated**: November 15, 2024 at 19:27 UTC - **Reserved Date**: September 25, 2024 at 19:36 UTC - **Assigned By**: WPScan ### Vulnerability Description The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit WordPress plugin before 3.3.0 does not sanitize and escape the bwfan-track-id parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/fab29b59-7e87-4289-88dd-ed5520260c26/) ### Credits - y4ng0615 - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28335 - **State**: PUBLISHED - **Published Date**: April 13, 2021 at 19:33 UTC - **Last Updated**: August 03, 2024 at 21:40 UTC - **Reserved Date**: March 12, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Remote Procedure Call Runtime Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28335)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2191 - **State**: PUBLISHED - **Published Date**: July 10, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: July 11, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in ttt-webmaster.php in Turbo Traffic Trader PHP 1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) msg[0] or (2) siteurl parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10638](http://www.osvdb.org/displayvuln.php?osvdb_id=10638) 2. [1011609](http://securitytracker.com/id?1011609) 3. [12785](http://secunia.com/advisories/12785) 4. [turbo-traffic-xss(17673)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17673) 5. [11358](http://www.securityfocus.com/bid/11358) 6. [20041011 Turbo Traffic Trader Nitro v1.0 SQL Injection & XSS Proofs of Concept](http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0296.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42952 - **State**: PUBLISHED - **Published Date**: August 15, 2024 at 00:00 UTC - **Last Updated**: March 18, 2025 at 15:17 UTC - **Reserved Date**: August 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromqossetting_page.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24386, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24386 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24386 - **State**: PUBLISHED - **Published Date**: March 28, 2025 at 02:19 UTC - **Last Updated**: March 29, 2025 at 03:55 UTC - **Reserved Date**: January 21, 2025 at 06:04 UTC - **Assigned By**: dell ### Vulnerability Description Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Dell - Unity** Affected versions: - N/A (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities) ### Credits - Dell would like to thank zzcentury from Ubisectech Sirius Team for reporting these issues.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3681, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3681 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3681 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:50 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [jenkins-cve20143681-xss(96975)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96975) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1147766) 3. [RHSA-2016:0070](https://access.redhat.com/errata/RHSA-2016:0070) 4. [](https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16389, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16389 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16389 - **State**: PUBLISHED - **Published Date**: December 09, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 20:27 UTC - **Reserved Date**: November 01, 2017 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the JavaScript engine. The mismatch between an old and a new object can provide an attacker with unintended memory access. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions** Affected versions: - Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions (Status: affected) ### References 1. [101818](http://www.securityfocus.com/bid/101818) 2. [1039791](http://www.securitytracker.com/id/1039791) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-36.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8403, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8403 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8403 - **State**: REJECTED - **Published Date**: April 13, 2021 at 20:41 UTC - **Last Updated**: April 13, 2021 at 20:41 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30355 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 18:04 UTC - **Last Updated**: August 03, 2024 at 22:32 UTC - **Reserved Date**: April 07, 2021 at 00:00 UTC - **Assigned By**: checkpoint ### Vulnerability Description Amazon Kindle e-reader prior to and including version 5.13.4 improperly manages privileges, allowing the framework user to elevate privileges to root. ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **n/a - Amazon Kindle e-reader** Affected versions: - All versions prior to and including 5.13.4 (Status: affected) ### References 1. [](https://research.checkpoint.com/2021/i-can-take-over-your-kindle/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9441 - **State**: PUBLISHED - **Published Date**: December 12, 2016 at 02:00 UTC - **Last Updated**: October 15, 2024 at 17:15 UTC - **Reserved Date**: November 18, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201701-08](https://security.gentoo.org/glsa/201701-08) 2. [](https://github.com/tats/w3m/issues/24) 3. [](https://github.com/tats/w3m/blob/master/ChangeLog) 4. [94407](http://www.securityfocus.com/bid/94407) 5. [[oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/11/18/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0905 - **State**: PUBLISHED - **Published Date**: September 24, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:31 UTC - **Reserved Date**: September 23, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#651928](http://www.kb.cert.org/vuls/id/651928) 2. [SUSE-SA:2004:036](http://www.novell.com/linux/security/advisories/2004_36_mozilla.html) 3. [](http://bugzilla.mozilla.org/show_bug.cgi?id=250862) 4. [FLSA:2089](http://marc.info/?l=bugtraq&m=109900315219363&w=2) 5. [oval:org.mitre.oval:def:10378](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378) 6. [11177](http://www.securityfocus.com/bid/11177) 7. [](http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3) 8. [GLSA-200409-26](http://security.gentoo.org/glsa/glsa-200409-26.xml) 9. [mozilla-netscape-sameorigin-bypass(17374)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17374) 10. [TA04-261A](http://www.us-cert.gov/cas/techalerts/TA04-261A.html) 11. [SSRT4826](http://marc.info/?l=bugtraq&m=109698896104418&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46672, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46672 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46672 - **State**: PUBLISHED - **Published Date**: November 15, 2023 at 08:05 UTC - **Last Updated**: February 13, 2025 at 17:14 UTC - **Reserved Date**: October 24, 2023 at 17:28 UTC - **Assigned By**: elastic ### Vulnerability Description An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Elastic - Logstash** Affected versions: - 8.10.0 (Status: affected) ### References 1. [](https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191) 2. [](https://www.elastic.co/community/security) 3. [](https://security.netapp.com/advisory/ntap-20240125-0002/) 4. [](https://security.netapp.com/advisory/ntap-20240229-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6179 - **State**: PUBLISHED - **Published Date**: December 24, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 12:10 UTC - **Reserved Date**: September 02, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Service Registry and Repository (WSRR) 7.5.x before 7.5.0.4 and 8.0.x before 8.0.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IV51859](http://www-01.ibm.com/support/docview.wss?uid=swg1IV51859) 2. [](http://www.ibm.com/support/docview.wss?uid=swg21693384) 3. [ibm-wsrr-cve20146179-xss(98516)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98516) 4. [](http://www.ibm.com/support/docview.wss?uid=swg21693387)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0066 - **State**: PUBLISHED - **Published Date**: March 13, 2023 at 16:03 UTC - **Last Updated**: February 27, 2025 at 20:26 UTC - **Reserved Date**: January 05, 2023 at 04:19 UTC - **Assigned By**: WPScan ### Vulnerability Description The Companion Sitemap Generator WordPress plugin through 4.5.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Companion Sitemap Generator** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/545c9e2f-bacd-4f30-ae01-de1583e26d32) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23443 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 15:48 UTC - **Last Updated**: April 17, 2025 at 18:12 UTC - **Reserved Date**: January 16, 2025 at 11:24 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Claire Ryan Author Showcase allows Reflected XSS. This issue affects Author Showcase: from n/a through 1.4.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Claire Ryan - Author Showcase** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/author-showcase/vulnerability/wordpress-author-showcase-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4144 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: June 12, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11063 - **State**: PUBLISHED - **Published Date**: November 11, 2024 at 07:30 UTC - **Last Updated**: November 12, 2024 at 15:42 UTC - **Reserved Date**: November 11, 2024 at 02:23 UTC - **Assigned By**: twcert ### Vulnerability Description The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **D-Link - DSL6740C** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html) 2. [](https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47603 - **State**: PUBLISHED - **Published Date**: December 11, 2024 at 19:11 UTC - **Last Updated**: December 11, 2024 at 20:42 UTC - **Reserved Date**: September 27, 2024 at 20:37 UTC - **Assigned By**: GitHub_M ### Vulnerability Description GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **gstreamer - gstreamer** Affected versions: - < 1.24.10 (Status: affected) ### References 1. [https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/](https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/) 2. [https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch) 3. [https://gstreamer.freedesktop.org/security/sa-2024-0021.html](https://gstreamer.freedesktop.org/security/sa-2024-0021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43121 - **State**: PUBLISHED - **Published Date**: November 09, 2022 at 00:00 UTC - **Last Updated**: May 01, 2025 at 15:33 UTC - **Reserved Date**: October 17, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in the CMS Field Add page of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tooltip text field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/intelliants/subrion/issues/895)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3227, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3227 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3227 - **State**: PUBLISHED - **Published Date**: October 14, 2011 at 10:00 UTC - **Last Updated**: August 06, 2024 at 23:29 UTC - **Reserved Date**: August 19, 2011 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description libsecurity in Apple Mac OS X before 10.7.2 does not properly handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL), which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) a crafted (1) web site or (2) e-mail message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2011-10-12-3](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html) 2. [](http://support.apple.com/kb/HT5002) 3. [50085](http://www.securityfocus.com/bid/50085)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22499 - **State**: PUBLISHED - **Published Date**: January 17, 2023 at 20:23 UTC - **Last Updated**: March 10, 2025 at 21:22 UTC - **Reserved Date**: December 29, 2022 at 17:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated action. A malicious program could clear the terminal screen after permission prompt was shown and write a generic message. This situation impacts users who use Web Worker API and relied on interactive permission prompt. The reproduction is very timing sensitive and can’t be reliably reproduced on every try. This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers). The problem has been fixed in Deno v1.29.3; it is recommended all users update to this version. Users are advised to upgrade. Users unable to upgrade may run with --no-prompt flag to disable interactive permission prompts. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **denoland - deno** Affected versions: - >= 1.9, < 1.29.3 (Status: affected) ### References 1. [https://github.com/denoland/deno/security/advisories/GHSA-mc52-jpm2-cqh6](https://github.com/denoland/deno/security/advisories/GHSA-mc52-jpm2-cqh6) 2. [https://github.com/denoland/deno/pull/17392](https://github.com/denoland/deno/pull/17392)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27361 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:56 UTC - **Last Updated**: August 02, 2024 at 12:09 UTC - **Reserved Date**: February 28, 2023 at 17:58 UTC - **Assigned By**: zdi ### Vulnerability Description NETGEAR RAX30 rex_cgi JSON Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of JSON data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19355. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **NETGEAR - RAX30** Affected versions: - 1.0.6.74_1 (Status: affected) ### References 1. [ZDI-23-495](https://www.zerodayinitiative.com/advisories/ZDI-23-495/) 2. [vendor-provided URL](https://kb.netgear.com/000065625/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-the-RAX30-PSV-2022-0302)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46911 - **State**: PUBLISHED - **Published Date**: October 14, 2024 at 08:13 UTC - **Last Updated**: November 01, 2024 at 17:06 UTC - **Reserved Date**: September 15, 2024 at 18:44 UTC - **Assigned By**: apache ### Vulnerability Description Cross-site Resource Forgery (CSRF), Privilege escalation vulnerability in Apache Roller. On multi-blog/user Roller websites, by default weblog owners are trusted to publish arbitrary weblog content and this combined with a deficiency in Roller's CSRF protections allowed an escalation of privileges attack. This issue affects Apache Roller before 6.1.4. Roller users who run multi-blog/user Roller websites are recommended to upgrade to version 6.1.4, which fixes the issue. Roller 6.1.4 release announcement:  https://lists.apache.org/thread/3c3f6rwqptyw6wdc95654fq5vlosqdpw ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Apache Software Foundation - Apache Roller** Affected versions: - 1.0.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/6m0ghjo9j92qty00t2qb6qf2spds0p5t) ### Credits - Chi Tran from EEVEE
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1482, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1482 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1482 - **State**: PUBLISHED - **Published Date**: May 12, 2010 at 15:00 UTC - **Last Updated**: September 16, 2024 at 23:41 UTC - **Reserved Date**: April 20, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in admin/editprefs.php in the backend in CMS Made Simple (CMSMS) before 1.7.1 might allow remote attackers to inject arbitrary web script or HTML via the date_format_string parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blog.cmsmadesimple.org/2010/05/01/announcing-cms-made-simple-1-7-1-escade/) 2. [39997](http://www.securityfocus.com/bid/39997) 3. [](http://int21.de/cve/CVE-2010-1482-cmsmadesimple-xss-backend.html) 4. [20100507 CMS Made Simple: backend cross site scripting (XSS), CVE-2010-1482](http://www.securityfocus.com/archive/1/511178)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2993, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2993 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2993 - **State**: PUBLISHED - **Published Date**: April 26, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:28 UTC - **Reserved Date**: April 24, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Birebin.com application for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140424 Birebin.com Android App SSL certificate validation weakness](http://archives.neohapsis.com/archives/bugtraq/2014-04/0153.html) 2. [](http://sceptive.com/p/birebincom-android-app-ssl-certificate-validation-weakness-) 3. [67524](http://www.securityfocus.com/bid/67524)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19100, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19100 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19100 - **State**: PUBLISHED - **Published Date**: April 29, 2020 at 02:09 UTC - **Last Updated**: August 05, 2024 at 02:09 UTC - **Reserved Date**: November 18, 2019 at 00:00 UTC - **Assigned By**: ABB ### Vulnerability Description A privilege escalation vulnerability in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x, 4.2.x, < 4.3.11SP, < 4.4.9SP, < 4.5.4SP, <. 4.6.3SP, < 4.7.2 and < 4.8.1 allow authenticated users to delete arbitrary files via an exposed interface. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-264: Security Weakness ### Affected Products **B&R - Automation Studio** Affected versions: - 4.0.x (Status: affected) - 4.1.x (Status: affected) - 4.2.x (Status: affected) - < 4.3.11SP (Status: affected) - < 4.4.9SP (Status: affected) - < 4.5.4SP (Status: affected) - < 4.6.3SP (Status: affected) - < 4.7.2 (Status: affected) - < 4.8.1 (Status: affected) ### References 1. [](https://www.br-automation.com/en/downloads/032020-multiple-vulnerabilities-in-automation-studio/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4777 - **State**: PUBLISHED - **Published Date**: April 13, 2006 at 10:00 UTC - **Last Updated**: August 08, 2024 at 00:01 UTC - **Reserved Date**: April 13, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tashcom ASPEdit 2.9 stores the administration password (aka the FTP password) in cleartext in the registry, which might allow local users to view the password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19744](http://www.osvdb.org/19744) 2. [](http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous_group=94) 3. [1014989](http://securitytracker.com/id?1014989) 4. [37](http://securityreason.com/securityalert/37)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1617 - **State**: PUBLISHED - **Published Date**: February 20, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 01:00 UTC - **Reserved Date**: February 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [11443](http://www.securityfocus.com/bid/11443) 2. [20041018 Web browsers - a mini-farce](http://marc.info/?l=bugtraq&m=109811406620511&w=2) 3. [DSA-1077](http://www.debian.org/security/2006/dsa-1077) 4. [1011809](http://securitytracker.com/id?1011809) 5. [20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities](http://www.securityfocus.com/archive/1/435689/30/4740/threaded) 6. [DSA-1076](http://www.debian.org/security/2006/dsa-1076) 7. [DSA-1085](http://www.debian.org/security/2006/dsa-1085) 8. [20041018 Web browsers - a mini-farce](http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html) 9. [](http://lcamtuf.coredump.cx/mangleme/gallery/) 10. [20383](http://secunia.com/advisories/20383) 11. [lynx-dos(17804)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17804)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26310 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 00:00 UTC - **Last Updated**: August 28, 2024 at 14:55 UTC - **Reserved Date**: February 19, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Archer Platform 6.8 before 6.14 P2 (6.14.0.2) contains an improper access control vulnerability. A remote authenticated malicious user could potentially exploit this to gain access to API information that should only be accessible with extra privileges. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:L/I:N/PR:L/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://archerirm.com) 2. [](https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/716134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39877 - **State**: PUBLISHED - **Published Date**: October 04, 2021 at 16:41 UTC - **Last Updated**: August 04, 2024 at 02:20 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description A vulnerability was discovered in GitLab starting with version 12.2 that allows an attacker to cause uncontrolled resource consumption with a specially crafted file. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **GitLab - GitLab** Affected versions: - >=12.2, <14.1.7 (Status: affected) - >=14.2, <14.2.5 (Status: affected) - >=14.3, <14.3.1 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/300095) 2. [](https://hackerone.com/reports/1077021) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39877.json) ### Credits - Thanks phill for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3272, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3272 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3272 - **State**: PUBLISHED - **Published Date**: December 06, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 19:57 UTC - **Reserved Date**: June 06, 2012 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Cross-site scripting (XSS) vulnerability on the HP Color LaserJet CM3530 with firmware before 53.190.9, Color LaserJet CM60xx with firmware before 52.210.9, Color LaserJet CP3525 with firmware before 06.140.3 18, Color LaserJet CP4xxx with firmware before 07.120.6, Color LaserJet CP6015 with firmware before 04.160.3, LaserJet P3015 with firmware before 07.140.3, and LaserJet P4xxx with firmware before 04.170.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT100778](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03556108) 2. [HPSBPI02828](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03556108) 3. [1027841](http://www.securitytracker.com/id?1027841)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2230 - **State**: REJECTED - **Published Date**: June 12, 2024 at 17:03 UTC - **Last Updated**: June 12, 2024 at 17:30 UTC - **Reserved Date**: March 06, 2024 at 19:22 UTC - **Assigned By**: schneider ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6312 - **State**: PUBLISHED - **Published Date**: November 22, 2013 at 17:00 UTC - **Last Updated**: August 06, 2024 at 17:39 UTC - **Reserved Date**: October 31, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Unspecified vulnerability in IBM Rational Service Tester 8.3.x and 8.5.x before 8.5.1 and Rational Performance Tester 8.3.x and 8.5.x before 8.5.1 allows remote attackers to read arbitrary files via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655814) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655815) 3. [ibm-rst-cve20136312-info-disc(88593)](https://exchange.xforce.ibmcloud.com/vulnerabilities/88593)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7621, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7621 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7621 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 19:50 UTC - **Last Updated**: August 04, 2024 at 20:54 UTC - **Reserved Date**: February 07, 2019 at 00:00 UTC - **Assigned By**: elastic ### Vulnerability Description Kibana versions before 6.8.6 and 7.5.1 contain a cross site scripting (XSS) flaw in the coordinate and region map visualizations. An attacker with the ability to create coordinate map visualizations could create a malicious visualization. If another Kibana user views that visualization or a dashboard containing the visualization it could execute JavaScript in the victim�s browser. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Elastic - Kibana** Affected versions: - before 6.8.6 and 7.5.1 (Status: affected) ### References 1. [](https://www.elastic.co/community/security/) 2. [](https://discuss.elastic.co/t/elastic-stack-6-8-6-and-7-5-1-security-update/212390)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23083 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53210 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 13:49 UTC - **Last Updated**: May 04, 2025 at 09:55 UTC - **Reserved Date**: November 19, 2024 at 17:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount (skb->users) and iucv_sock_recvmsg() does not decrement skb refcount at exit. This results in skb memory leak in skb_queue_purge() and WARN_ON in iucv_sock_destruct() during socket close. To fix this decrease skb refcount by one if MSG_PEEK is set in order to prevent memory leak and WARN_ON. WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv] CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G W 6.10.0-rc7 #1 Hardware name: IBM 3931 A01 704 (z/VM 7.3.0) Call Trace: [<001587c682c4aa98>] iucv_sock_destruct+0x148/0x1a0 [af_iucv] [<001587c682c4a9d0>] iucv_sock_destruct+0x80/0x1a0 [af_iucv] [<001587c704117a32>] __sk_destruct+0x52/0x550 [<001587c704104a54>] __sock_release+0xa4/0x230 [<001587c704104c0c>] sock_close+0x2c/0x40 [<001587c702c5f5a8>] __fput+0x2e8/0x970 [<001587c7024148c4>] task_work_run+0x1c4/0x2c0 [<001587c7023b0716>] do_exit+0x996/0x1050 [<001587c7023b13aa>] do_group_exit+0x13a/0x360 [<001587c7023b1626>] __s390x_sys_exit_group+0x56/0x60 [<001587c7022bccca>] do_syscall+0x27a/0x380 [<001587c7049a6a0c>] __do_syscall+0x9c/0x160 [<001587c7049ce8a8>] system_call+0x70/0x98 Last Breaking-Event-Address: [<001587c682c4a9d4>] iucv_sock_destruct+0x84/0x1a0 [af_iucv] ### Affected Products **Linux - Linux** Affected versions: - eac3731bd04c7131478722a3c148b78774553116 (Status: affected) - eac3731bd04c7131478722a3c148b78774553116 (Status: affected) - eac3731bd04c7131478722a3c148b78774553116 (Status: affected) - eac3731bd04c7131478722a3c148b78774553116 (Status: affected) - eac3731bd04c7131478722a3c148b78774553116 (Status: affected) **Linux - Linux** Affected versions: - 2.6.21 (Status: affected) - 0 (Status: unaffected) - 6.1.120 (Status: unaffected) - 6.6.64 (Status: unaffected) - 6.11.11 (Status: unaffected) - 6.12.2 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/934326aef7ac4652f81c69d18bf44eebaefc39c3) 2. [](https://git.kernel.org/stable/c/42251c2d1ef1cb0822638bebb87ad9120c759673) 3. [](https://git.kernel.org/stable/c/783c2c6e61c5a04eb8baea598753d5fa174dbe85) 4. [](https://git.kernel.org/stable/c/9f603e66e1c59c1d25e60eb0636cb307d190782e) 5. [](https://git.kernel.org/stable/c/ebaf81317e42aa990ad20b113cfe3a7b20d4e937)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6187, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6187 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6187 - **State**: PUBLISHED - **Published Date**: November 30, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 15:54 UTC - **Reserved Date**: November 29, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in PHP Content Architect (aka NoAh) 0.9 pre 1.2 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the filepath parameter to (1) css_file.php, (2) js_file.php, or (3) xml_file.php in noah/modules/nosystem/templates/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39682](http://osvdb.org/39682) 2. [39683](http://osvdb.org/39683) 3. [26633](http://www.securityfocus.com/bid/26633) 4. [39684](http://osvdb.org/39684) 5. [noah-filepath-directory-traversal(38727)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38727) 6. [4675](https://www.exploit-db.com/exploits/4675)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32860 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 03:46 UTC - **Last Updated**: August 02, 2024 at 15:32 UTC - **Reserved Date**: May 16, 2023 at 03:04 UTC - **Assigned By**: MediaTek ### Vulnerability Description In display, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929788; Issue ID: ALPS07929788. ### Affected Products **MediaTek, Inc. - MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985** Affected versions: - Android 12.0, 13.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/December-2023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28094 - **State**: PUBLISHED - **Published Date**: June 22, 2023 at 00:00 UTC - **Last Updated**: December 06, 2024 at 21:20 UTC - **Reserved Date**: March 10, 2023 at 00:00 UTC - **Assigned By**: Pega ### Vulnerability Description Pega platform clients who are using versions 7.4 through 8.8.x and have upgraded from a version prior to 8.x may be utilizing default credentials. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-1393: Security Weakness ### Affected Products **Pegasystems - Pega Platform** Affected versions: - 7.4 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://support.pega.com/support-doc/pega-security-advisory-%E2%80%93-c23-vulnerability-default-operators?) ### Credits - Mohamad Shokor
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24746 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 17:20 UTC - **Last Updated**: August 03, 2024 at 19:42 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Social Sharing Plugin WordPress plugin before 3.3.40 does not escape the viewed post URL before outputting it back in onclick attributes when the "Enable 'More' icon" option is enabled (which is the default setting), leading to a Reflected Cross-Site Scripting issue. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Social Sharing Plugin – Sassy Social Share** Affected versions: - 3.3.40 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa) ### Credits - Paul J. Martinez
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0495 - **State**: PUBLISHED - **Published Date**: March 17, 2025 at 19:21 UTC - **Last Updated**: March 18, 2025 at 16:25 UTC - **Reserved Date**: January 15, 2025 at 15:26 UTC - **Assigned By**: Docker ### Vulnerability Description Buildx is a Docker CLI plugin that extends build capabilities using BuildKit. Cache backends support credentials by setting secrets directly as attribute values in cache-to/cache-from configuration. When supplied as user input, these secure values may be inadvertently captured in OpenTelemetry traces as part of the arguments and flags for the traced CLI command. OpenTelemetry traces are also saved in BuildKit daemon's history records. This vulnerability does not impact secrets passed to the Github cache backend via environment variables or registry authentication. ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **docker - buildx** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/docker/buildx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5084 - **State**: PUBLISHED - **Published Date**: January 03, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 18:44 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300212C. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/rubyfly/K7AntiVirus_POC/tree/master/0x8300212C)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3984, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3984 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3984 - **State**: PUBLISHED - **Published Date**: December 01, 2021 at 00:00 UTC - **Last Updated**: August 03, 2024 at 17:09 UTC - **Reserved Date**: November 19, 2021 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description vim is vulnerable to Heap-based Buffer Overflow ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **vim - vim/vim** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a) 2. [](https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655) 3. [FEDORA-2021-b0ac29efb1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/) 4. [[oss-security] 20220114 Re: 3 new CVE's in vim](http://www.openwall.com/lists/oss-security/2022/01/15/1) 5. [[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html) 6. [GLSA-202208-32](https://security.gentoo.org/glsa/202208-32) 7. [[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30795 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 10:54 UTC - **Last Updated**: March 27, 2025 at 18:56 UTC - **Reserved Date**: March 26, 2025 at 09:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FunnelKit Automation By Autonami allows Phishing. This issue affects Automation By Autonami: from n/a through 3.5.1. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **FunnelKit - Automation By Autonami** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-marketing-automations/vulnerability/wordpress-automation-by-autonami-plugin-3-5-1-open-redirection-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)