System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36021
- **State**: PUBLISHED
- **Published Date**: March 01, 2023 at 15:46 UTC
- **Last Updated**: March 07, 2025 at 21:05 UTC
- **Reserved Date**: July 15, 2022 at 23:52 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-407: Security Weakness
### Affected Products
**redis - redis**
Affected versions:
- < 6.0.18 (Status: affected)
- >= 6.2.0, < 6.2.11 (Status: affected)
- >= 7.0.0, < 7.0.9 (Status: affected)
### References
1. [https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv](https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv)
2. [https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84](https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1642
- **State**: PUBLISHED
- **Published Date**: March 24, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: March 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in ManageEngine Firewall Analyzer allows remote authenticated users to "access any common file" via a direct URL request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24707](http://secunia.com/advisories/24707)
2. [20070322 ManageEngine Firewall Analyzer arbitrary file disclosure to authorized user](http://www.securityfocus.com/archive/1/463509/100/0/threaded)
3. [23097](http://www.securityfocus.com/bid/23097)
4. [20070330 Re: ManageEngine Firewall Analyzer arbitrary file disclosure to authorized user](http://www.securityfocus.com/archive/1/464271/100/0/threaded)
5. [2479](http://securityreason.com/securityalert/2479)
6. [34525](http://osvdb.org/34525)
7. [manageengine-unspecified-info-disclosure(33319)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33319)
8. [20070329 Re: ManageEngine Firewall Analyzer arbitrary file disclosure to authorized user](http://www.securityfocus.com/archive/1/464154/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4722
- **State**: PUBLISHED
- **Published Date**: September 12, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in Open Bulletin Board (OpenBB) 1.0.8 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) index.php and possibly (2) collector.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19937](http://www.securityfocus.com/bid/19937)
2. [ADV-2006-3546](http://www.vupen.com/english/advisories/2006/3546)
3. [openbb-index-file-include(28838)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28838)
4. [20060910 Open Bulletin Board <= 1.0.8 (root_path) File Include Vulnerability](http://www.securityfocus.com/archive/1/445743/100/0/threaded)
5. [1552](http://securityreason.com/securityalert/1552) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14263
- **State**: PUBLISHED
- **Published Date**: July 31, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 16, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getVersionID method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6026.
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.1.1049 (Status: affected)
### References
1. [](https://zerodayinitiative.com/advisories/ZDI-18-723)
2. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31887
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:52 UTC
- **Last Updated**: April 01, 2025 at 15:39 UTC
- **Reserved Date**: April 01, 2025 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in zookatron MyBookProgress by Stormhill Media allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MyBookProgress by Stormhill Media: from n/a through 1.0.8.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**zookatron - MyBookProgress by Stormhill Media**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mybookprogress/vulnerability/wordpress-mybookprogress-plugin-1-0-8-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9414
- **State**: PUBLISHED
- **Published Date**: September 25, 2019 at 23:27 UTC
- **Last Updated**: August 06, 2024 at 08:51 UTC
- **Reserved Date**: September 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-symposium plugin through 15.8.1 for WordPress has XSS via the wp-content/plugins/wp-symposium/get_album_item.php?size parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8175)
2. [](https://wordpress.org/plugins/wp-symposium/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000416
- **State**: PUBLISHED
- **Published Date**: January 22, 2018 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 02:53 UTC
- **Reserved Date**: January 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
axTLS version 1.5.3 has a coding error in the ASN.1 parser resulting in the year (19)50 of UTCTime being misinterpreted as 2050.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ieee-security.org/TC/SP2017/papers/231.pdf)
2. [](https://www.youtube.com/watch?v=FW--c_F_cY8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5830
- **State**: PUBLISHED
- **Published Date**: November 10, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in All In One Control Panel (AIOCP) 1.3.007 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) topid, (2) forid, and (3) catid parameters to code/cp_forum_view.php; (4) choosed_language parameter to cp_dpage.php; (5) orderdir parameter to cp_links_search.php; (6) order_field parameter to (a) cp_show_ec_products.php and (b) cp_users_online.php; and the (7) signature and (8) fiscal code fields in the user profile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4378](http://www.vupen.com/english/advisories/2006/4378)
2. [20061106 AIOCP <=1.3.007 multiples vulnerabilities [sql , remote file include , xss]](http://www.securityfocus.com/archive/1/450701/100/0/threaded)
3. [](http://sourceforge.net/project/shownotes.php?release_id=478370)
4. [aiocp-topid-xss(30045)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30045)
5. [aiocp-userprofile-xss(30048)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30048)
6. [1839](http://securityreason.com/securityalert/1839)
7. [22719](http://secunia.com/advisories/22719)
8. [20931](http://www.securityfocus.com/bid/20931) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32703
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 17:17 UTC
- **Last Updated**: August 09, 2024 at 18:37 UTC
- **Reserved Date**: April 17, 2024 at 08:56 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in reputeinfosystems ARForms.This issue affects ARForms: from n/a through 6.4.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**reputeinfosystems - ARForms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/arforms/wordpress-arforms-plugin-6-4-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0950
- **State**: PUBLISHED
- **Published Date**: February 15, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in listmain.asp in Fullaspsite ASP Hosting Site allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070213 Fullaspsite Shop (tr) Xss & SqL İnj. VulnZ.](http://www.securityfocus.com/archive/1/459979/100/0/threaded)
2. [33720](http://osvdb.org/33720)
3. [22545](http://www.securityfocus.com/bid/22545)
4. [2250](http://securityreason.com/securityalert/2250)
5. [fullaspsite-listmain-xss(32469)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32469) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47268
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:19 UTC
- **Last Updated**: May 04, 2025 at 07:07 UTC
- **Reserved Date**: May 21, 2024 at 13:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port
A pending hrtimer may expire after the kthread_worker of tcpm port
is destroyed, see below kernel dump when do module unload, fix it
by cancel the 2 hrtimers.
[ 111.517018] Unable to handle kernel paging request at virtual address ffff8000118cb880
[ 111.518786] blk_update_request: I/O error, dev sda, sector 60061185 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 111.526594] Mem abort info:
[ 111.526597] ESR = 0x96000047
[ 111.526600] EC = 0x25: DABT (current EL), IL = 32 bits
[ 111.526604] SET = 0, FnV = 0
[ 111.526607] EA = 0, S1PTW = 0
[ 111.526610] Data abort info:
[ 111.526612] ISV = 0, ISS = 0x00000047
[ 111.526615] CM = 0, WnR = 1
[ 111.526619] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000041d75000
[ 111.526623] [ffff8000118cb880] pgd=10000001bffff003, p4d=10000001bffff003, pud=10000001bfffe003, pmd=10000001bfffa003, pte=0000000000000000
[ 111.526642] Internal error: Oops: 96000047 [#1] PREEMPT SMP
[ 111.526647] Modules linked in: dwc3_imx8mp dwc3 phy_fsl_imx8mq_usb [last unloaded: tcpci]
[ 111.526663] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc4-00927-gebbe9dbd802c-dirty #36
[ 111.526670] Hardware name: NXP i.MX8MPlus EVK board (DT)
[ 111.526674] pstate: 800000c5 (Nzcv daIF -PAN -UAO -TCO BTYPE=--)
[ 111.526681] pc : queued_spin_lock_slowpath+0x1a0/0x390
[ 111.526695] lr : _raw_spin_lock_irqsave+0x88/0xb4
[ 111.526703] sp : ffff800010003e20
[ 111.526706] x29: ffff800010003e20 x28: ffff00017f380180
[ 111.537156] buffer_io_error: 6 callbacks suppressed
[ 111.537162] Buffer I/O error on dev sda1, logical block 60040704, async page read
[ 111.539932] x27: ffff00017f3801c0
[ 111.539938] x26: ffff800010ba2490 x25: 0000000000000000 x24: 0000000000000001
[ 111.543025] blk_update_request: I/O error, dev sda, sector 60061186 op 0x0:(READ) flags 0x0 phys_seg 7 prio class 0
[ 111.548304]
[ 111.548306] x23: 00000000000000c0 x22: ffff0000c2a9f184 x21: ffff00017f380180
[ 111.551374] Buffer I/O error on dev sda1, logical block 60040705, async page read
[ 111.554499]
[ 111.554503] x20: ffff0000c5f14210 x19: 00000000000000c0 x18: 0000000000000000
[ 111.557391] Buffer I/O error on dev sda1, logical block 60040706, async page read
[ 111.561218]
[ 111.561222] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 111.564205] Buffer I/O error on dev sda1, logical block 60040707, async page read
[ 111.570887] x14: 00000000000000f5 x13: 0000000000000001 x12: 0000000000000040
[ 111.570902] x11: ffff0000c05ac6d8
[ 111.583420] Buffer I/O error on dev sda1, logical block 60040708, async page read
[ 111.588978] x10: 0000000000000000 x9 : 0000000000040000
[ 111.588988] x8 : 0000000000000000
[ 111.597173] Buffer I/O error on dev sda1, logical block 60040709, async page read
[ 111.605766] x7 : ffff00017f384880 x6 : ffff8000118cb880
[ 111.605777] x5 : ffff00017f384880
[ 111.611094] Buffer I/O error on dev sda1, logical block 60040710, async page read
[ 111.617086] x4 : 0000000000000000 x3 : ffff0000c2a9f184
[ 111.617096] x2 : ffff8000118cb880
[ 111.622242] Buffer I/O error on dev sda1, logical block 60040711, async page read
[ 111.626927] x1 : ffff8000118cb880 x0 : ffff00017f384888
[ 111.626938] Call trace:
[ 111.626942] queued_spin_lock_slowpath+0x1a0/0x390
[ 111.795809] kthread_queue_work+0x30/0xc0
[ 111.799828] state_machine_timer_handler+0x20/0x30
[ 111.804624] __hrtimer_run_queues+0x140/0x1e0
[ 111.808990] hrtimer_interrupt+0xec/0x2c0
[ 111.813004] arch_timer_handler_phys+0x38/0x50
[ 111.817456] handle_percpu_devid_irq+0x88/0x150
[ 111.821991] __handle_domain_irq+0x80/0xe0
[ 111.826093] gic_handle_irq+0xc0/0x140
[ 111.829848] el1_irq+0xbc/0x154
[ 111.832991] arch_cpu_idle+0x1c/0x2c
[ 111.836572] default_idle_call+0x24/0x6c
[ 111.840497] do_idle+0x238/0x2ac
[ 1
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 3ed8e1c2ac9914a2fcb08ec13476b85319536cea (Status: affected)
- 3ed8e1c2ac9914a2fcb08ec13476b85319536cea (Status: affected)
- 3ed8e1c2ac9914a2fcb08ec13476b85319536cea (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 5.10.44 (Status: unaffected)
- 5.12.11 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/18eaf0de50eadeeb395b83310b259b21ad8ed0a6)
2. [](https://git.kernel.org/stable/c/d0a06696a8a4d99f649240b6f9b8a2e55452ecf5)
3. [](https://git.kernel.org/stable/c/3a13ff7ef4349d70d1d18378d661117dd5af8efe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2172
- **State**: PUBLISHED
- **Published Date**: June 23, 2009 at 21:21 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in forum/radioandtv.php in the Radio and TV Player addon for vBulletin allows remote registered users to inject arbitrary web script or HTML via the station parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35385](http://www.securityfocus.com/bid/35385)
2. [8965](https://www.exploit-db.com/exploits/8965) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7012
- **State**: PUBLISHED
- **Published Date**: August 19, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31178](http://www.securityfocus.com/bid/31178)
2. [1020870](http://www.securitytracker.com/id?1020870)
3. [48242](http://osvdb.org/48242)
4. [](http://zebux.free.fr/pub/Advisory/Advisory_Accellion_SPAM_Engine_Vulnerability_200808.txt)
5. [31848](http://secunia.com/advisories/31848)
6. [fta-errorreporting-mail-relay(45159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49587
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 01:35 UTC
- **Last Updated**: November 26, 2024 at 14:33 UTC
- **Reserved Date**: November 27, 2023 at 18:45 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**SAP_SE - SAP Solution Manager**
Affected versions:
- 720 (Status: affected)
### References
1. [](https://me.sap.com/notes/3395306)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3853
- **State**: PUBLISHED
- **Published Date**: June 04, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:57 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
### Affected Products
**Talos - Foxit**
Affected versions:
- Foxit PDF Reader 9.0.1.1049 (Status: affected)
### References
1. [1040733](http://www.securitytracker.com/id/1040733)
2. [103942](http://www.securityfocus.com/bid/103942)
3. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0536) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45255
- **State**: PUBLISHED
- **Published Date**: December 21, 2021 at 11:50 UTC
- **Last Updated**: August 04, 2024 at 04:39 UTC
- **Reserved Date**: December 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1071
- **State**: PUBLISHED
- **Published Date**: May 11, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-16-319)
2. [1035828](http://www.securitytracker.com/id/1035828)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-14.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-10056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-10056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-10056
- **State**: PUBLISHED
- **Published Date**: January 16, 2023 at 18:58 UTC
- **Last Updated**: April 07, 2025 at 16:47 UTC
- **Reserved Date**: January 15, 2023 at 17:47 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in 2071174A vinylmap. It has been classified as critical. Affected is the function contact of the file recordstoreapp/views.py. The manipulation leads to sql injection. The name of the patch is b07b79a1e92cc62574ba0492cce000ef4a7bd25f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218400.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**2071174A - vinylmap**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.218400)
2. [](https://vuldb.com/?ctiid.218400)
3. [](https://github.com/2071174A/vinylmap/commit/b07b79a1e92cc62574ba0492cce000ef4a7bd25f)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0033
- **State**: PUBLISHED
- **Published Date**: March 10, 2020 at 19:55 UTC
- **Last Updated**: August 04, 2024 at 05:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds write due to stale pointer. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144351324
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.0 Android-8.1 Android-9 Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4111
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4789
- **State**: PUBLISHED
- **Published Date**: May 26, 2016 at 14:00 UTC
- **Last Updated**: November 14, 2024 at 19:49 UTC
- **Reserved Date**: May 12, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the system configuration section in the administrative user interface in Pulse Connect Secure (PCS) 8.2 before 8.2r1, 8.1 before 8.1r2, 8.0 before 8.0r9, and 7.4 before 7.4r13.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035932](http://www.securitytracker.com/id/1035932)
2. [](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40209) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4985
- **State**: PUBLISHED
- **Published Date**: May 30, 2025 at 14:19 UTC
- **Last Updated**: May 30, 2025 at 21:59 UTC
- **Reserved Date**: May 20, 2025 at 07:30 UTC
- **Assigned By**: 3DS
### Vulnerability Description
A stored Cross-site Scripting (XSS) vulnerability affecting Risk Management in Project Portfolio Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Dassault Systèmes - Project Portfolio Manager**
Affected versions:
- Release 3DEXPERIENCE R2022x Golden (Status: affected)
- Release 3DEXPERIENCE R2023x Golden (Status: affected)
- Release 3DEXPERIENCE R2024x Golden (Status: affected)
- Release 3DEXPERIENCE R2025x Golden (Status: affected)
### References
1. [](https://www.3ds.com/vulnerability/advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2488
- **State**: PUBLISHED
- **Published Date**: July 16, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the NFSv4 module in the kernel in Sun Solaris 10, and OpenSolaris snv_102 through snv_119, allows local users to cause a denial of service (client panic) via vectors involving "file operations."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35874](http://secunia.com/advisories/35874)
2. [ADV-2009-1922](http://www.vupen.com/english/advisories/2009/1922)
3. [oval:org.mitre.oval:def:5586](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5586)
4. [](http://sunsolve.sun.com/search/document.do?assetkey=1-21-141733-03-1)
5. [solaris-nfsv4-kernel-dos(51774)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51774)
6. [55876](http://osvdb.org/55876)
7. [262788](http://sunsolve.sun.com/search/document.do?assetkey=1-66-262788-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11061
- **State**: PUBLISHED
- **Published Date**: August 24, 2018 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 01:06 UTC
- **Reserved Date**: May 14, 2018 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
RSA NetWitness Platform versions prior to 11.1.0.2 and RSA Security Analytics versions prior to 10.6.6 are vulnerable to a server-side template injection vulnerability due to insecure configuration of the template engine used in the product. A remote authenticated malicious RSA NetWitness Server user with an Admin or Operator role could exploit this vulnerability to execute arbitrary commands on the server with root privileges.
### Affected Products
**Dell EMC - RSA NetWitness**
Affected versions:
- unspecified (Status: affected)
**Dell EMC - RSA Security Analytics**
Affected versions:
- unspecified (Status: affected)
### References
1. [1041542](http://www.securitytracker.com/id/1041542)
2. [20180814 DSA-2018-132: RSA NetWitness Platform Server-Side Template Injection Vulnerability](http://seclists.org/fulldisclosure/2018/Aug/32)
3. [105134](http://www.securityfocus.com/bid/105134)
4. [1041541](http://www.securitytracker.com/id/1041541) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2210
- **State**: PUBLISHED
- **Published Date**: May 14, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:49 UTC
- **Reserved Date**: May 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Maian Support 1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_script, (2) msg_script2, and (3) msg_script3 parameters to admin/inc/footer.php; and the (4) msg_script2 parameter to admin/inc/header.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3888](http://securityreason.com/securityalert/3888)
2. [29032](http://www.securityfocus.com/bid/29032)
3. [30068](http://secunia.com/advisories/30068)
4. [20080503 Maian Support v1.3 Xss Vulnerabilities](http://www.securityfocus.com/archive/1/491587/100/0/threaded)
5. [maian-support-footer-header-xss(42205)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14799
- **State**: PUBLISHED
- **Published Date**: August 22, 2018 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 02:52 UTC
- **Reserved Date**: August 01, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
In Philips PageWriter TC10, TC20, TC30, TC50, TC70 Cardiographs, all versions prior to May 2018, the PageWriter device does not sanitize data entered by user. This can lead to buffer overflow or format string vulnerabilities.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Philips - PageWriter TC10, TC20, TC30, TC50, TC70 Cardiographs**
Affected versions:
- All versions prior to May 2018. (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-228-01)
2. [](https://www.usa.philips.com/healthcare/about/customer-support/product-security)
3. [105103](http://www.securityfocus.com/bid/105103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37501
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 11:57 UTC
- **Last Updated**: August 02, 2024 at 03:57 UTC
- **Reserved Date**: June 09, 2024 at 11:44 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PluginsWare Advanced Classifieds & Directory Pro allows Path Traversal.This issue affects Advanced Classifieds & Directory Pro: from n/a through 3.1.3.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**PluginsWare - Advanced Classifieds & Directory Pro**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/advanced-classifieds-and-directory-pro/wordpress-advanced-classifieds-directory-pro-plugin-3-1-3-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5231
- **State**: PUBLISHED
- **Published Date**: January 30, 2020 at 21:15 UTC
- **Last Updated**: August 04, 2024 at 08:22 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In Opencast before 7.6 and 8.1, users with the role ROLE_COURSE_ADMIN can use the user-utils endpoint to create new users not including the role ROLE_ADMIN. ROLE_COURSE_ADMIN is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation. This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**opencast - opencast**
Affected versions:
- < 7.6 (Status: affected)
- >= 8.0, < 8.1 (Status: affected)
### References
1. [](https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg)
2. [](https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1313
- **State**: PUBLISHED
- **Published Date**: July 03, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:10 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125724.
### Affected Products
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Quality Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
### References
1. [](https://www-prd-trops.events.ibm.com/node/715749)
2. [ibm-rqm-cve20171313-xss(125724)](https://exchange.xforce.ibmcloud.com/vulnerabilities/125724) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0351
- **State**: PUBLISHED
- **Published Date**: February 04, 2021 at 17:10 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In wlan driver, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11; Patch ID: ALPS05412917.
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.1, Android-9, Android-10, Android-11 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-acknowledgements) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4273
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201610-10](https://security.gentoo.org/glsa/201610-10)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb16-32.html)
3. [40510](https://www.exploit-db.com/exploits/40510/)
4. [93490](http://www.securityfocus.com/bid/93490)
5. [RHSA-2016:2057](http://rhn.redhat.com/errata/RHSA-2016-2057.html)
6. [1036985](http://www.securitytracker.com/id/1036985) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40057
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 13:50 UTC
- **Last Updated**: August 04, 2024 at 02:27 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.
### Affected Products
**Huawei - EMUI**
Affected versions:
- 10.1.1 (Status: affected)
- 10.1.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 3.1.1 (Status: affected)
- 3.1.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/3/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33288
- **State**: PUBLISHED
- **Published Date**: May 22, 2023 at 00:00 UTC
- **Last Updated**: March 18, 2025 at 18:22 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9)
2. [](https://lore.kernel.org/all/CAHk-=whcaHLNpb7Mu_QX7ABwPgyRyfW-V8=v4Mv0S22fpjY4JQ%40mail.gmail.com/)
3. [](https://lore.kernel.org/lkml/20230309174728.233732-1-zyytlz.wz%40163.com/)
4. [](https://github.com/torvalds/linux/commit/47c29d69212911f50bdcdd0564b5999a559010d4)
5. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=47c29d69212911f50bdcdd0564b5999a559010d4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15820
- **State**: PUBLISHED
- **Published Date**: August 30, 2019 at 12:39 UTC
- **Last Updated**: August 05, 2024 at 00:56 UTC
- **Reserved Date**: August 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The login-or-logout-menu-item plugin before 1.2.0 for WordPress has no requirement for lolmi_save_settings authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/9500)
2. [](https://wordpress.org/plugins/login-or-logout-menu-item/#developers)
3. [](https://blog.nintechnet.com/unauthenticated-options-change-in-wordpress-login-or-logout-menu-item-plugin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36570
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 17:07 UTC
- **Last Updated**: April 14, 2025 at 22:46 UTC
- **Reserved Date**: June 23, 2023 at 20:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36570) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24217
- **State**: PUBLISHED
- **Published Date**: October 06, 2020 at 13:05 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kb.cert.org/vuls/id/896979)
2. [](https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/)
3. [](http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html)
4. [](http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1186
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in TelCondex SimpleWebServer 2.12.30210 Build3285 allows remote attackers to execute arbitrary code via a long HTTP Referer header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20031029 TelCondex SimpleWebserver Buffer Overflow](http://www.securityfocus.com/archive/1/342785)
2. [8925](http://www.securityfocus.com/bid/8925)
3. [simplewebserver-referer-bo(13549)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13549)
4. [10101](http://www.osvdb.org/10101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7032
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 05:30 UTC
- **Last Updated**: August 21, 2024 at 13:39 UTC
- **Reserved Date**: July 23, 2024 at 17:16 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Smart Online Order for Clover plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'moo_deactivateAndClean' function in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to deactivate the plugin and drop all plugin tables from the database.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**elbanyaoui - Smart Online Order for Clover**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9a6b05b1-c649-4b72-b884-11fb83ec77f2?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/clover-online-orders/trunk/moo_OnlineOrders.php#L183)
3. [](https://plugins.trac.wordpress.org/browser/clover-online-orders/trunk/includes/moo-OnlineOrders-deactivator.php#L29)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26281
- **State**: PUBLISHED
- **Published Date**: December 17, 2024 at 06:37 UTC
- **Last Updated**: December 17, 2024 at 14:41 UTC
- **Reserved Date**: January 27, 2021 at 19:41 UTC
- **Assigned By**: Vivo
### Vulnerability Description
Some parameters of the alarm clock module are improperly stored, leaking some sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**vivo - Alarm clock**
Affected versions:
- Versions earlier than 6.0.1.2 (Status: affected)
### References
1. [](https://www.vivo.com/en/support/security-advisory-detail?id=9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3110
- **State**: PUBLISHED
- **Published Date**: June 12, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:00 UTC
- **Reserved Date**: April 17, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3141.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA13-168A](http://www.us-cert.gov/ncas/alerts/TA13-168A)
2. [MS13-047](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047)
3. [oval:org.mitre.oval:def:16507](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16507) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2423
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 19:00 UTC
- **Last Updated**: October 02, 2024 at 16:20 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Search). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise PT PeopleTools**
Affected versions:
- 8.55 (Status: affected)
- 8.56 (Status: affected)
- 8.57 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
2. [106592](http://www.securityfocus.com/bid/106592) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2152
- **State**: PUBLISHED
- **Published Date**: March 10, 2025 at 13:31 UTC
- **Last Updated**: May 12, 2025 at 15:35 UTC
- **Reserved Date**: March 10, 2025 at 06:23 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function Assimp::BaseImporter::ConvertToUTF8 of the file BaseImporter.cpp of the component File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
- CWE-119: Security Weakness
### Affected Products
**Open Asset Import Library - Assimp**
Affected versions:
- 5.4.3 (Status: affected)
### References
1. [VDB-299063 | Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 heap-based overflow](https://vuldb.com/?id.299063)
2. [VDB-299063 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.299063)
3. [Submit #510818 | https://github.com/assimp/assimp assimp v5.4.3 Heap-based Buffer Overflow](https://vuldb.com/?submit.510818)
4. [](https://github.com/assimp/assimp/issues/6027)
5. [](https://github.com/assimp/assimp/issues/6027#issue-2877629241)
### Credits
- Chen Lihai
- Zhang Yuqing |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6070
- **State**: PUBLISHED
- **Published Date**: November 19, 2019 at 16:37 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Falconpl before 0.9.6.9-git20120606 misuses the libcurl API which may allow remote attackers to interfere with security checks.
### Affected Products
**falconpl - falconpl**
Affected versions:
- 0.9.6.9- (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2012-6070)
2. [](http://www.openwall.com/lists/oss-security/2012/12/27/1)
3. [](http://www.openwall.com/lists/oss-security/2013/01/15/6)
4. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696681) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7543
- **State**: PUBLISHED
- **Published Date**: March 26, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 06:31 UTC
- **Reserved Date**: February 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in installer/build/view.step4.php of the SnapCreek Duplicator plugin 1.2.32 for WordPress allows remote attackers to inject arbitrary JavaScript or HTML via the json parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://snapcreek.com/duplicator/docs/changelog/?lite)
2. [44288](https://www.exploit-db.com/exploits/44288/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32252
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 15:59 UTC
- **Last Updated**: April 04, 2025 at 18:57 UTC
- **Reserved Date**: April 04, 2025 at 10:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in blackandwhitedigital WP Genealogy – Your Family History Website allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Genealogy – Your Family History Website: from n/a through 0.1.9.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**blackandwhitedigital - WP Genealogy – Your Family History Website**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpgenealogy/vulnerability/wordpress-wp-genealogy-plugin-0-1-9-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11159
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 05:00 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer over-read can happen while processing WPA,RSN IE of beacon and response frames if IE length is less than length of frame pointer being accessed in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8064AU, APQ8076, APQ8084, APQ8092, APQ8094, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, AR9380, CSR6030, CSR8811, CSRA6620, CSRA6640, CSRB31024, IPQ4018, IPQ4028, IPQ4029, IPQ5010, IPQ5018, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM8215, MDM9206, MDM9215, MDM9225, MDM9225M, MDM9230, MDM9235M, MDM9250, MDM9310, MDM9330, MDM9607, MDM9615, MDM9625, MDM9625M, MDM9626, MDM9628, MDM9630, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8976, MSM8992, MSM8994, MSM8996AU, PM3003A, PM4125, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8018, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3385
- **State**: PUBLISHED
- **Published Date**: August 14, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 25, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-1453](http://www.debian.org/security/2008/dsa-1453)
2. [RHSA-2007:0950](http://www.redhat.com/support/errata/RHSA-2007-0950.html)
3. [](http://support.apple.com/kb/HT2163)
4. [ADV-2008-1981](http://www.vupen.com/english/advisories/2008/1981/references)
5. [3011](http://securityreason.com/securityalert/3011)
6. [FEDORA-2007-3456](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html)
7. [27267](http://secunia.com/advisories/27267)
8. [29242](http://secunia.com/advisories/29242)
9. [ADV-2007-3527](http://www.vupen.com/english/advisories/2007/3527)
10. [26466](http://secunia.com/advisories/26466)
11. [20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)](http://www.securityfocus.com/archive/1/500412/100/0/threaded)
12. [SUSE-SR:2008:005](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html)
13. [33668](http://secunia.com/advisories/33668)
14. [ADV-2007-2902](http://www.vupen.com/english/advisories/2007/2902)
15. [20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500396/100/0/threaded)
16. [tomcat-slashcookie-information-disclosure(35999)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35999)
17. [26898](http://secunia.com/advisories/26898)
18. [28361](http://secunia.com/advisories/28361)
19. [IZ55562](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562)
20. [SSRT071472](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554)
21. [44183](http://secunia.com/advisories/44183)
22. [28317](http://secunia.com/advisories/28317)
23. [APPLE-SA-2008-06-30](http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html)
24. [ADV-2009-0233](http://www.vupen.com/english/advisories/2009/0233)
25. [SUSE-SR:2009:004](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html)
26. [](http://tomcat.apache.org/security-6.html)
27. [RHSA-2007:0871](http://www.redhat.com/support/errata/RHSA-2007-0871.html)
28. [ADV-2007-3386](http://www.vupen.com/english/advisories/2007/3386)
29. [30802](http://secunia.com/advisories/30802)
30. [RHSA-2008:0195](http://www.redhat.com/support/errata/RHSA-2008-0195.html)
31. [27037](http://secunia.com/advisories/27037)
32. [1018557](http://securitytracker.com/id?1018557)
33. [25316](http://www.securityfocus.com/bid/25316)
34. [VU#993544](http://www.kb.cert.org/vuls/id/993544)
35. [SSRT071447](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795)
36. [27727](http://secunia.com/advisories/27727)
37. [HPSBUX02262](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795)
38. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
39. [36486](http://secunia.com/advisories/36486)
40. [HPSBTU02276](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554)
41. [DSA-1447](http://www.debian.org/security/2008/dsa-1447)
42. [oval:org.mitre.oval:def:9549](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9549)
43. [](http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx)
44. [](http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540)
45. [20070814 CVE-2007-3385: Handling of \" in cookies](http://www.securityfocus.com/archive/1/476444/100/0/threaded)
46. [MDKSA-2007:241](http://www.mandriva.com/security/advisories?name=MDKSA-2007:241)
47. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E)
48. [[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E)
49. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E)
50. [[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E)
51. [[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E)
52. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E)
53. [[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3788
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14732
- **State**: PUBLISHED
- **Published Date**: August 07, 2019 at 00:06 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdPlug 2.3.1 has multiple heap-based buffer overflows in Ca2mLoader::load() in a2m.cpp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/adplug/adplug/issues/88)
2. [FEDORA-2021-64168929e4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/)
3. [FEDORA-2021-24ef21134b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56012
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:13 UTC
- **Last Updated**: January 27, 2025 at 13:45 UTC
- **Reserved Date**: December 14, 2024 at 19:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Pearlbells Flash News / Post (Responsive), Pearlbells Post Title (TypeWriter) allows Privilege Escalation.This issue affects Flash News / Post (Responsive): from n/a through 4.1; Post Title (TypeWriter): from n/a through 4.1.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Pearlbells - Flash News / Post (Responsive)**
Affected versions:
- n/a (Status: affected)
**Pearlbells - Post Title (TypeWriter)**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/flashnews-fading-effect-pearlbells/vulnerability/wordpress-flash-news-post-responsive-plugin-4-1-csrf-to-privilege-escalation-vulnerability?_s_id=cve)
2. [](https://patchstack.com/database/wordpress/plugin/flashnews-typewriter-pearlbells/vulnerability/wordpress-post-title-typewriter-plugin-4-1-csrf-to-privilege-escalation-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33223
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 04:46 UTC
- **Last Updated**: August 03, 2024 at 08:01 UTC
- **Reserved Date**: June 14, 2022 at 10:44 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Transient DOS in Modem due to null pointer dereference while processing the incoming packet with http chunked encoding.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 9205 LTE Modem (Status: affected)
- 9206 LTE Modem (Status: affected)
- 9207 LTE Modem (Status: affected)
- MDM8207 (Status: affected)
- QCA4004 (Status: affected)
- QTS110 (Status: affected)
- Snapdragon 1100 Wearable Platform (Status: affected)
- Snapdragon 1200 Wearable Platform (Status: affected)
- Snapdragon Wear 1300 Platform (Status: affected)
- Snapdragon X5 LTE Modem (Status: affected)
- WCD9306 (Status: affected)
- WCD9330 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46880
- **State**: PUBLISHED
- **Published Date**: April 14, 2023 at 00:00 UTC
- **Last Updated**: February 07, 2025 at 16:08 UTC
- **Reserved Date**: April 14, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.2-relnotes.txt)
2. [](https://github.com/openbsd/src/commit/3f851282810fa0ab4b90b3b1ecec2e8717ef16f8)
3. [](https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/006_x509.patch.sig)
4. [](https://security.netapp.com/advisory/ntap-20230517-0006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5697
- **State**: PUBLISHED
- **Published Date**: June 05, 2025 at 21:31 UTC
- **Last Updated**: June 09, 2025 at 14:55 UTC
- **Reserved Date**: June 04, 2025 at 20:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Brilliance Golden Link Secondary System up to 20250424. This issue affects some unknown processing of the file /reprotframework/tcCustDeferPosiQuery.htm. The manipulation of the argument custTradeId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Brilliance - Golden Link Secondary System**
Affected versions:
- 20250424 (Status: affected)
### References
1. [VDB-311213 | Brilliance Golden Link Secondary System tcCustDeferPosiQuery.htm sql injection](https://vuldb.com/?id.311213)
2. [VDB-311213 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311213)
3. [Submit #588323 | BRILLIANCE TECH Golden Link Secondary System 20250424 SQL Injection](https://vuldb.com/?submit.588323)
4. [](https://github.com/K-mxredo/MXdocument/blob/K-mxredo-blob/%E9%BB%84%E9%87%91%E9%80%9Astorageworkrent-tcCustDeferPosiQuery.md)
### Credits
- SecHZredo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0286
- **State**: PUBLISHED
- **Published Date**: May 02, 2018 at 22:00 UTC
- **Last Updated**: November 29, 2024 at 15:11 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the netconf interface of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on affected system. The vulnerability is due to improper handling of malformed requests processed by the netconf process. An attacker could exploit this vulnerability by sending malicious requests to the affected software. An exploit could allow the attacker to cause the targeted process to restart, resulting in a DoS condition on the affected system. Cisco Bug IDs: CSCvg95792.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**n/a - Cisco IOS XR**
Affected versions:
- Cisco IOS XR (Status: affected)
### References
1. [104083](http://www.securityfocus.com/bid/104083)
2. [1040827](http://www.securitytracker.com/id/1040827)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-iosxr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8864
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 14, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21544
- **State**: PUBLISHED
- **Published Date**: April 30, 2021 at 20:55 UTC
- **Last Updated**: September 17, 2024 at 03:28 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC iDRAC9 versions prior to 4.40.00.00 contain an improper authentication vulnerability. A remote authenticated malicious user with high privileges could potentially exploit this vulnerability to manipulate the username field under the comment section and set the value to any user.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-602: Security Weakness
### Affected Products
**Dell - Integrated Dell Remote Access Controller (iDRAC)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000185293) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1520
- **State**: PUBLISHED
- **Published Date**: May 22, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 30, 2006 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifiers, possibly in an e-mail address.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [libspf-debugging-format-string(26535)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26535)
2. [ADV-2006-1846](http://www.vupen.com/english/advisories/2006/1846)
3. [](http://permalink.gmane.org/gmane.mail.spam.spf.devel/849)
4. [](http://www.gossamer-threads.com/lists/spf/devel/27053?page=last)
5. [](http://www.libspf.org/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4440
- **State**: PUBLISHED
- **Published Date**: August 21, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the MercuryS SMTP server in Mercury Mail Transport System, possibly 4.51 and earlier, allows remote attackers to execute arbitrary code via a long AUTH CRAM-MD5 string. NOTE: this might overlap CVE-2006-5961.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26519](http://secunia.com/advisories/26519)
2. [20070818 Mercury SMTPD Remote Preauth Stack Based Overrun](http://archives.neohapsis.com/archives/fulldisclosure/2007-08/0341.html)
3. [ADV-2007-2918](http://www.vupen.com/english/advisories/2007/2918)
4. [4294](https://www.exploit-db.com/exploits/4294)
5. [](http://www.pmail.com/m32_451.htm)
6. [25357](http://www.securityfocus.com/bid/25357)
7. [mercury-smtp-bo(36117)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36117)
8. [1018587](http://www.securitytracker.com/id?1018587)
9. [mercury-authcrammd5-bo(36299)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36299) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13164
- **State**: PUBLISHED
- **Published Date**: May 19, 2020 at 21:26 UTC
- **Last Updated**: August 04, 2024 at 12:11 UTC
- **Reserved Date**: May 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476)
2. [](https://www.wireshark.org/security/wnpa-sec-2020-08.html)
3. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a)
4. [FEDORA-2020-4f5588cf97](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5UOISPQTRCZGQLKBVXEDL72AEXEHS425/)
5. [FEDORA-2020-ca3d3f15f0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNV3EYL4JBWCR22TJO3PH7ADUVS5RWSU/)
6. [GLSA-202007-13](https://security.gentoo.org/glsa/202007-13)
7. [openSUSE-SU-2020:1188](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html)
8. [openSUSE-SU-2020:1199](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html)
9. [[debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3548
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 07:37 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Task Manager in Invision Power Board (IP.Board) 2.0.1 allows limited remote attackers to include files via a .. (dot dot) in the "Task PHP File To Run" field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17443](http://secunia.com/advisories/17443)
2. [20051104 Invision Power Board Privilege Esaclation (2.0.1 + more)](http://www.securityfocus.com/archive/1/415798/30/0/threaded)
3. [35429](http://www.osvdb.org/35429)
4. [ipb-taskmanager-directory-traversal(40000)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3145
- **State**: PUBLISHED
- **Published Date**: August 27, 2010 at 18:10 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in the BitLocker Drive Encryption API, as used in sdclt.exe in Backup Manager in Microsoft Windows Vista SP1 and SP2, allows local users to gain privileges via a Trojan horse fveapi.dll file in the current working directory, as demonstrated by a directory that contains a Windows Backup Catalog (.wbcat) file, aka "Backup Manager Insecure Library Loading Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14751](http://www.exploit-db.com/exploits/14751/)
2. [ADV-2011-0074](http://www.vupen.com/english/advisories/2011/0074)
3. [1024948](http://www.securitytracker.com/id?1024948)
4. [MS11-001](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-001)
5. [TA11-011A](http://www.us-cert.gov/cas/techalerts/TA11-011A.html)
6. [oval:org.mitre.oval:def:12273](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12273) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0859
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: November 22, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2001:148](http://www.redhat.com/support/errata/RHSA-2001-148.html)
2. [3527](http://www.securityfocus.com/bid/3527)
3. [HPSBTL0112-006](http://online.securityfocus.com/advisories/3725)
4. [linux-korean-default-umask(7549)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7549) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27953
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 00:00 UTC
- **Last Updated**: June 03, 2025 at 13:05 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the session management component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46323
- **State**: PUBLISHED
- **Published Date**: December 20, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 18:19 UTC
- **Reserved Date**: November 29, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/12/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38997
- **State**: PUBLISHED
- **Published Date**: August 09, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 17:54 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A directory traversal vulnerability in the Captive Portal templates of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary system commands as root via a crafted ZIP archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2)
2. [](https://logicaltrust.net/blog/2023/08/opnsense.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8831
- **State**: PUBLISHED
- **Published Date**: May 08, 2017 at 06:10 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c)
2. [[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update](https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html)
3. [99619](http://www.securityfocus.com/bid/99619)
4. [](https://bugzilla.kernel.org/show_bug.cgi?id=195559)
5. [USN-3754-1](https://usn.ubuntu.com/3754-1/)
6. [](http://www.securityfocus.com/archive/1/540770/30/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4680
- **State**: PUBLISHED
- **Published Date**: January 07, 2011 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 03:51 UTC
- **Reserved Date**: January 06, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024963](http://www.securitytracker.com/id?1024963)
2. [](http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf)
3. [45767](http://www.securityfocus.com/bid/45767)
4. [asa-webvpn-security-bypass(64606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64606)
5. [42931](http://secunia.com/advisories/42931) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23112
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 15:09 UTC
- **Last Updated**: August 01, 2024 at 22:51 UTC
- **Reserved Date**: January 11, 2024 at 16:29 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Fortinet - FortiOS**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.1 (Status: affected)
- 6.4.7 (Status: affected)
**Fortinet - FortiProxy**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-24-013](https://fortiguard.com/psirt/FG-IR-24-013) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1575
- **State**: PUBLISHED
- **Published Date**: May 14, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: May 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows allows remote attackers to hide the real file types of downloaded files via the Content-Type HTTP header and a filename containing whitespace, dots, or ASCII byte 160.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16431](http://www.osvdb.org/16431)
2. [](http://secunia.com/secunia_research/2004-11/advisory/)
3. [12979](http://secunia.com/advisories/12979) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1178
- **State**: PUBLISHED
- **Published Date**: March 29, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) via a JavaScript loop that attempts to construct an infinitely long string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nishantdaspatnaik.yolasite.com/ipodpoc3.php)
2. [safari-iphone-javascript-dos(57993)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46388, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46388
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 00:00 UTC
- **Last Updated**: September 20, 2024 at 16:46 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LOYTEC electronics GmbH LINX-212 and LINX-151 devices (all versions) are vulnerable to Insecure Permissions via dpal_config.zml file. This vulnerability allows remote attackers to disclose smtp client account credentials and bypass email authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20231127 [CVE-2023-46386, CVE-2023-46387, CVE-2023-46388, CVE-2023-46389] Multiple vulnerabilities in Loytec products (3)](http://seclists.org/fulldisclosure/2023/Nov/7)
2. [](http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html)
3. [](https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/)
4. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9723
- **State**: PUBLISHED
- **Published Date**: March 30, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:34 UTC
- **Reserved Date**: June 15, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
The touchscreen driver synaptics_dsx in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-06-05, the size of a stack-allocated buffer can be set to a value which exceeds the size of the stack.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2018-02-01)
2. [](https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=e83ebd2098009b0d336ffab11e00f739902bd5d9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27630
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 21:19 UTC
- **Last Updated**: April 15, 2025 at 18:53 UTC
- **Reserved Date**: March 23, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An information disclosure vulnerability exists in the confctl_get_master_wlan functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to information disclosure. An attacker can send packets to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**TCL - LinkHub Mesh Wifi**
Affected versions:
- MS1G_00_01.00_14 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1504) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21184
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:58 UTC
- **Last Updated**: March 12, 2025 at 01:42 UTC
- **Reserved Date**: December 05, 2024 at 21:43 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Core Messaging Elevation of Privileges Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows Core Messaging Elevation of Privileges Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21184) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6483
- **State**: PUBLISHED
- **Published Date**: October 15, 2014 at 15:15 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Application Express component in Oracle Database Server before 4.2.6 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70480](http://www.securityfocus.com/bid/70480)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2339
- **State**: PUBLISHED
- **Published Date**: July 07, 2022 at 03:15 UTC
- **Last Updated**: August 03, 2024 at 00:32 UTC
- **Reserved Date**: July 07, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**nocodb - nocodb/nocodb**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/fff06de8-2a82-49b1-8e81-968731e87eef)
2. [](https://github.com/nocodb/nocodb/commit/000ecd886738b965b5997cd905825e3244f48b95) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7259
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 07:00 UTC
- **Last Updated**: August 02, 2024 at 08:57 UTC
- **Reserved Date**: May 05, 2024 at 14:36 UTC
- **Assigned By**: VulDB
### Vulnerability Description
** DISPUTED ** A vulnerability was found in zzdevelop lenosp up to 20230831. It has been classified as problematic. This affects an unknown part of the component Adduser Page. The manipulation of the argument username with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-266127. NOTE: The vendor rejected the issue because he claims that XSS which require administrative privileges are not of any use for attackers.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**zzdevelop - lenosp**
Affected versions:
- 20230831 (Status: affected)
### References
1. [VDB-266127 | zzdevelop lenosp Adduser Page cross site scripting](https://vuldb.com/?id.266127)
2. [VDB-266127 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.266127)
3. [](https://gitee.com/zzdevelop/lenosp/issues/I7XC2Y)
### Credits
- VulDB Gitee Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16673
- **State**: PUBLISHED
- **Published Date**: November 09, 2017 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 20:37 UTC
- **Reserved Date**: November 08, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Datto Backup Agent 1.0.6.0 and earlier does not authenticate incoming connections. This allows an attacker to impersonate a Datto Backup Appliance to "pair" with the agent and issue requests to this agent, if the attacker can reach the agent on TCP port 25566 or 25568, and send unspecified "specific information" by which the agent identifies a network device that is "appearing to be a valid Datto."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.datto.com/partner-security-update-nov2017) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43470
- **State**: PUBLISHED
- **Published Date**: September 22, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 15:44 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in janobe Online Voting System v.1.0 allows a remote attacker to execute arbitrary code via the checklogin.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ae6e361b/Online-Voting-System)
2. [](https://gist.github.com/ae6e361b/1ed56fbfbbfd368835b8a8089f8ee64a)
3. [](https://www.sourcecodester.com/php/14690/online-voting-system-phpmysqli-full-source-code.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0304
- **State**: PUBLISHED
- **Published Date**: February 12, 2022 at 01:35 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html)
2. [](https://crbug.com/1282118) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4226
- **State**: PUBLISHED
- **Published Date**: June 30, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The packet-storing feature on Cisco 9900 phones with firmware 9.3(2) does not properly support the RTP protocol, which allows remote attackers to cause a denial of service (device hang) by sending malformed RTP packets after a call is answered, aka Bug ID CSCur39976.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150629 Cisco Unified IP Phones 9900 Series Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39554)
2. [1032748](http://www.securitytracker.com/id/1032748)
3. [75471](http://www.securityfocus.com/bid/75471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0061
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5264
- **State**: PUBLISHED
- **Published Date**: September 29, 2023 at 14:00 UTC
- **Last Updated**: September 20, 2024 at 16:57 UTC
- **Reserved Date**: September 29, 2023 at 05:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in huakecms 3.0. Affected by this vulnerability is an unknown functionality of the file /admin/cms_content.php. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240877 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - huakecms**
Affected versions:
- 3.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.240877)
2. [](https://vuldb.com/?ctiid.240877)
3. [](https://github.com/yhy217/huakecms-vul/issues/1)
### Credits
- jamspilly (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26641
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 17:23 UTC
- **Last Updated**: June 04, 2025 at 17:52 UTC
- **Reserved Date**: February 12, 2025 at 19:23 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19044.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1346
- **State**: PUBLISHED
- **Published Date**: May 22, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, does not properly interpret Unicode encoding, which allows remote attackers to spoof a postMessage origin, and bypass intended restrictions on sending a message to a connected frame or window, via crafted characters in a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6254)
2. [APPLE-SA-2014-06-30-3](http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html)
3. [APPLE-SA-2014-05-21-1](http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html)
4. [67554](http://www.securityfocus.com/bid/67554) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19451
- **State**: PUBLISHED
- **Published Date**: June 07, 2019 at 16:51 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A command injection can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031 when using the Open File action on a Field. An attacker can leverage this to gain remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [108692](http://www.securityfocus.com/bid/108692) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11599
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 09:42 UTC
- **Last Updated**: November 29, 2024 at 19:55 UTC
- **Reserved Date**: November 21, 2024 at 16:26 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost versions 10.0.x <= 10.0.1, 10.1.x <= 10.1.1, 9.11.x <= 9.11.3, 9.5.x <= 9.5.11 fail to properly validate email addresses which allows an unauthenticated user to bypass email domain restrictions via carefully crafted input on email registration.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-754: Security Weakness
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 10.0.0 (Status: affected)
- 10.1.0 (Status: affected)
- 9.11.0 (Status: affected)
- 9.5.0 (Status: affected)
- 10.2.0 (Status: unaffected)
- 10.0.2 (Status: unaffected)
- 10.1.2 (Status: unaffected)
- 9.11.4 (Status: unaffected)
- 9.5.12 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- jofra (v_jofra) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32692
- **State**: PUBLISHED
- **Published Date**: December 23, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:30 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**ActivityWatch - Activity Watch**
Affected versions:
- 0.11.0 (Status: affected)
### References
1. [](https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-3x6w-q32m-jqf3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39685
- **State**: PUBLISHED
- **Published Date**: September 01, 2023 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 13:17 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in hjson-java up to v3.0.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted JSON string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hjson/hjson-java/issues/27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3677
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43571
- **State**: PUBLISHED
- **Published Date**: November 03, 2022 at 22:56 UTC
- **Last Updated**: May 02, 2025 at 18:24 UTC
- **Reserved Date**: October 20, 2022 at 18:37 UTC
- **Assigned By**: Splunk
### Vulnerability Description
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Splunk - Splunk Enterprise**
Affected versions:
- 8.1 (Status: affected)
- 8.2 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html)
2. [](https://research.splunk.com/application/b06b41d7-9570-4985-8137-0784f582a1b3/)
### Credits
- Danylo Dmytriiev (DDV_UA) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8184
- **State**: PUBLISHED
- **Published Date**: October 17, 2019 at 20:18 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-49.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46289
- **State**: PUBLISHED
- **Published Date**: July 21, 2023 at 20:25 UTC
- **Last Updated**: October 24, 2024 at 15:50 UTC
- **Reserved Date**: November 28, 2022 at 20:44 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.nAtoms calculation wrap-around, leading to a small buffer allocation
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Open Babel - Open Babel**
Affected versions:
- 3.1.1 (Status: affected)
- master commit 530dbfa3 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665)
### Credits
- Discovered by Claudio Bozzato of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21085
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 21:26 UTC
- **Last Updated**: February 13, 2025 at 17:33 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u401 (Status: affected)
- Oracle Java SE:8u401-perf (Status: affected)
- Oracle Java SE:11.0.22 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.13 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.9 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html)
2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html)
3. [](https://security.netapp.com/advisory/ntap-20240426-0004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31817
- **State**: PUBLISHED
- **Published Date**: July 08, 2021 at 10:43 UTC
- **Last Updated**: August 03, 2024 at 23:10 UTC
- **Reserved Date**: April 26, 2021 at 00:00 UTC
- **Assigned By**: Octopus
### Vulnerability Description
When configuring Octopus Server if it is configured with an external SQL database, on initial configuration the database password is written to the OctopusServer.txt log file in plaintext.
### Affected Products
**Octopus Deploy - Octopus Server**
Affected versions:
- 2020.6.4671 (Status: affected)
- unspecified (Status: affected)
- 2021.1.7149 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://advisories.octopus.com/adv/2021-06---Cleartext-Storage-of-Sensitive-Information-%28CVE-2021-31817%29.2121138201.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4327
- **State**: PUBLISHED
- **Published Date**: December 17, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Michael Arndt WebCal 1.11-3.04 allow remote attackers to inject arbitrary web script or HTML via the (1) function, (2) year, and (3) date parameters to webcal.cgi, (4) new calendar entries, and (5) notes for entries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20051216 Advisory: XSS in WebCal (v1.11-v3.04)](http://www.securityfocus.com/archive/1/419655/100/0/threaded)
2. [267](http://securityreason.com/securityalert/267)
3. [18017](http://secunia.com/advisories/18017)
4. [15917](http://www.securityfocus.com/bid/15917) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26740
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 17:00 UTC
- **Last Updated**: May 04, 2025 at 08:55 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_mirred: use the backlog for mirred ingress
The test Davide added in commit ca22da2fbd69 ("act_mirred: use the backlog
for nested calls to mirred ingress") hangs our testing VMs every 10 or so
runs, with the familiar tcp_v4_rcv -> tcp_v4_rcv deadlock reported by
lockdep.
The problem as previously described by Davide (see Link) is that
if we reverse flow of traffic with the redirect (egress -> ingress)
we may reach the same socket which generated the packet. And we may
still be holding its socket lock. The common solution to such deadlocks
is to put the packet in the Rx backlog, rather than run the Rx path
inline. Do that for all egress -> ingress reversals, not just once
we started to nest mirred calls.
In the past there was a concern that the backlog indirection will
lead to loss of error reporting / less accurate stats. But the current
workaround does not seem to address the issue.
### Affected Products
**Linux - Linux**
Affected versions:
- 53592b3640019f2834701093e38272fdfd367ad8 (Status: affected)
- 53592b3640019f2834701093e38272fdfd367ad8 (Status: affected)
- 53592b3640019f2834701093e38272fdfd367ad8 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.10 (Status: affected)
- 0 (Status: unaffected)
- 6.6.19 (Status: unaffected)
- 6.7.7 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7c787888d164689da8b1b115f3ef562c1e843af4)
2. [](https://git.kernel.org/stable/c/60ddea1600bc476e0f5e02bce0e29a460ccbf0be)
3. [](https://git.kernel.org/stable/c/52f671db18823089a02f07efc04efdb2272ddc17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19550
- **State**: PUBLISHED
- **Published Date**: January 31, 2020 at 13:53 UTC
- **Last Updated**: August 05, 2024 at 02:16 UTC
- **Reserved Date**: December 03, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Remote Authentication Bypass in Senior Rubiweb 6.2.34.28 and 6.2.34.37 allows admin access to sensitive information of affected users using vulnerable versions. The attacker only needs to provide the correct URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/underprotection/CVE-2019-19550/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26888
- **State**: PUBLISHED
- **Published Date**: February 16, 2023 at 19:59 UTC
- **Last Updated**: January 27, 2025 at 18:22 UTC
- **Reserved Date**: March 21, 2022 at 23:31 UTC
- **Assigned By**: intel
### Vulnerability Description
Cross-site scripting in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable information disclosure via local access.
### CVSS Metrics
- **CVSS Base Score**: 2.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N`
### Affected Products
**n/a - Intel(R) Quartus Prime Pro and Standard edition software**
Affected versions:
- See references (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30705
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:27 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. Processing a maliciously crafted ASTC file may disclose memory contents.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212528)
2. [](https://support.apple.com/en-us/HT212529)
3. [](https://support.apple.com/en-us/HT212532)
4. [](https://support.apple.com/en-us/HT212533)
5. [](https://support.apple.com/en-us/HT212530)
6. [](https://support.apple.com/en-us/HT212531) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.