System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11756
- **State**: PUBLISHED
- **Published Date**: July 23, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:03 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
### Affected Products
**Apache Software Foundation - PHP Runtime for Apache OpenWhisk**
Affected versions:
- Docker tag openwhisk/action-php-v7.2 1.0.0 (Status: affected)
- openwhisk/action-php-v7.1 1.0.0, 1.0.1 (Status: affected)
### References
1. [](https://github.com/apache/incubator-openwhisk-runtime-php/commit/6caf902f527250ee4b7b695929b628d560e0dad1)
2. [[openwhisk-dev] 20180720 [CVE] CVE-2018-11756 PHP Runtime for Apache OpenWhisk](https://lists.apache.org/thread.html/439bd5ff5822708c645a0d816ed9914b88c97eda32eae6ea211bc0dc%40%3Cdev.openwhisk.apache.org%3E)
3. [104915](http://www.securityfocus.com/bid/104915) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9041
- **State**: PUBLISHED
- **Published Date**: February 04, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 21, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The import functionality in the bookmarks application in ownCloud server before 5.0.18, 6.x before 6.0.6, and 7.x before 7.0.3 does not validate CSRF tokens, which allow remote attackers to conduct CSRF attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://owncloud.org/security/advisory/?id=oc-sa-2014-027) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0382
- **State**: PUBLISHED
- **Published Date**: February 02, 2009 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:46 UTC
- **Reserved Date**: February 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Internationalization (i18n) Translation 5.x before 5.x-2.5, a module for Drupal, allows remote attackers with "translate node" permissions to bypass intended access restrictions and read unpublished nodes via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33549](http://secunia.com/advisories/33549)
2. [](http://drupal.org/node/358958)
3. [33283](http://www.securityfocus.com/bid/33283) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24520
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45098
- **State**: PUBLISHED
- **Published Date**: December 16, 2021 at 04:07 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/OISF/suricata/releases)
2. [](https://redmine.openinfosecfoundation.org/issues/4710)
3. [](https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942)
4. [](https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3977
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 16:31 UTC
- **Last Updated**: April 28, 2025 at 13:48 UTC
- **Reserved Date**: April 26, 2025 at 07:41 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in iteachyou Dreamer CMS up to 4.1.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/attachment/download of the component Attachment Handler. The manipulation of the argument ID leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
- CWE-266: Security Weakness
### Affected Products
**iteachyou - Dreamer CMS**
Affected versions:
- 4.1.0 (Status: affected)
- 4.1.1 (Status: affected)
- 4.1.2 (Status: affected)
- 4.1.3 (Status: affected)
### References
1. [VDB-306313 | iteachyou Dreamer CMS Attachment download improper authorization](https://vuldb.com/?id.306313)
2. [VDB-306313 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306313)
3. [Submit #557639 | iteachyou dreamer_cms 4.1.3 broken function level authorization](https://vuldb.com/?submit.557639)
4. [](https://gitee.com/iteachyou/dreamer_cms/issues/IC13O1)
### Credits
- aibot88 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000149
- **State**: PUBLISHED
- **Published Date**: April 05, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 17:58 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A man in the middle vulnerability exists in Jenkins Ansible Plugin 0.8 and older in AbstractAnsibleInvocation.java, AnsibleAdHocCommandBuilder.java, AnsibleAdHocCommandInvocationTest.java, AnsibleContext.java, AnsibleJobDslExtension.java, AnsiblePlaybookBuilder.java, AnsiblePlaybookStep.java that disables host key verification by default.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-03-26/#SECURITY-630) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40760
- **State**: PUBLISHED
- **Published Date**: November 18, 2021 at 16:27 UTC
- **Last Updated**: April 23, 2025 at 19:21 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - After Effects**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/after_effects/apsb21-79.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2935
- **State**: PUBLISHED
- **Published Date**: September 12, 2013 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 01:41 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Citrix CloudPortal Services Manager (aka Cortex) 10.0 before Cumulative Update 3 has unknown impact and attack vectors, a different vulnerability than other CVEs listed in CTX137162.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.citrix.com/article/CTX137162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6817
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:05 UTC
- **Last Updated**: November 22, 2024 at 21:55 UTC
- **Reserved Date**: July 16, 2024 at 21:39 UTC
- **Assigned By**: zdi
### Vulnerability Description
IrfanView PSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23216.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**IrfanView - IrfanView**
Affected versions:
- 4.66 64bit (Status: affected)
### References
1. [ZDI-24-969](https://www.zerodayinitiative.com/advisories/ZDI-24-969/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16093
- **State**: PUBLISHED
- **Published Date**: November 30, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
In versions prior to 5.5, LXCI for VMware allows an authenticated user to write to any system file due to insufficient sanitization during the upload of a backup file.
### Affected Products
**Lenovo - LXCI for VMware**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/solutions/LEN-23800) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1029
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Res Manager in Worldspan for Windows Gateway 4.1 allows remote attackers to cause a denial of service (crash) via a malformed request to TCP port 17990.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14478](http://www.osvdb.org/14478)
2. [5169](http://www.securityfocus.com/bid/5169)
3. [worldspan-res-manager-dos(9490)](http://www.iss.net/security_center/static/9490.php)
4. [20020704 Worldspan DoS](http://archives.neohapsis.com/archives/bugtraq/2002-07/0048.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1424
- **State**: PUBLISHED
- **Published Date**: September 25, 2017 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 17:15 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Business Process Manager 8.5.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 127477.
### Affected Products
**IBM - Business Process Manager Advanced**
Affected versions:
- 8.5.7 (Status: affected)
- 8.5.7.CF201609 (Status: affected)
- 8.5.7.CF201606 (Status: affected)
- 8.5.7.CF201612 (Status: affected)
- 8.5.7.CF201703 (Status: affected)
- 8.5.7.CF201706 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22005112)
2. [100962](http://www.securityfocus.com/bid/100962)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/127477) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0466
- **State**: PUBLISHED
- **Published Date**: June 11, 2021 at 16:42 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In startIpClient of ClientModeImpl.java, there is a possible identifier which could be used to track a device. This could lead to remote information disclosure to a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154114734
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4544
- **State**: PUBLISHED
- **Published Date**: May 22, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [89844](http://www.securityfocus.com/bid/89844)
2. [openSUSE-SU-2016:1524](http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html)
3. [GLSA-201611-22](https://security.gentoo.org/glsa/201611-22)
4. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
5. [[oss-security] 20160505 CVE Request: PHP: several issues fixed with 7.0.6, 5.6.21 and 5.5.35](http://www.openwall.com/lists/oss-security/2016/05/05/21)
6. [DSA-3602](http://www.debian.org/security/2016/dsa-3602)
7. [](http://php.net/ChangeLog-5.php)
8. [](https://bugs.php.net/bug.php?id=72094)
9. [](http://php.net/ChangeLog-7.php)
10. [](https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=082aecfc3a753ad03be82cf14f03ac065723ec92)
11. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731)
12. [openSUSE-SU-2016:1357](http://lists.opensuse.org/opensuse-updates/2016-05/msg00086.html)
13. [FEDORA-2016-f4e73663f4](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183736.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2645
- **State**: REJECTED
- **Published Date**: July 30, 2009 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 01:41 UTC
- **Reserved Date**: July 30, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20908
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 14:29 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 71.9980.37 allows arbitrary file-read operations during pkgacct custom template handling (SEC-435).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/72+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2739
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 30, 2024 at 15:44 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).
### Affected Products
**Oracle Corporation - WebCenter Sites**
Affected versions:
- 12.2.1.3.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28708
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 16:40 UTC
- **Last Updated**: September 17, 2024 at 01:17 UTC
- **Reserved Date**: April 19, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2 and 15.1.x versions prior to 15.1.5.1, when a BIG-IP DNS resolver-enabled, HTTP-Explicit or SOCKS profile is configured on a virtual server, an undisclosed DNS response can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 14.1.x (Status: unaffected)
- 13.1.x (Status: unaffected)
- 12.1.x (Status: unaffected)
- 11.6.x (Status: unaffected)
- 17.0.0 (Status: unaffected)
- 16.1.x (Status: affected)
- 15.1.x (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K85054496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32034
- **State**: PUBLISHED
- **Published Date**: September 16, 2024 at 18:38 UTC
- **Last Updated**: September 16, 2024 at 20:00 UTC
- **Reserved Date**: April 09, 2024 at 15:29 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
decidim is a Free Open-Source participatory democracy, citizen participation and open government for cities and organizations. The admin panel is subject to potential Cross-site scripting (XSS) attach in case an admin assigns a valuator to a proposal, or does any other action that generates an admin activity log where one of the resources has an XSS crafted. This issue has been addressed in release version 0.27.7, 0.28.2, and newer. Users are advised to upgrade. Users unable to upgrade may redirect the pages /admin and /admin/logs to other admin pages to prevent this access (i.e. `/admin/organization/edit`).
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**decidim - decidim**
Affected versions:
- < 0.27.7 (Status: affected)
- >= 0.28.0, < 0.28.2 (Status: affected)
### References
1. [https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6](https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6)
2. [https://github.com/decidim/decidim/commit/23fc8d702a4976727f78617f5e42353d67931645](https://github.com/decidim/decidim/commit/23fc8d702a4976727f78617f5e42353d67931645)
3. [https://github.com/decidim/decidim/commit/9d79f09a2d38c87feb28725670d6cc1f55c22072](https://github.com/decidim/decidim/commit/9d79f09a2d38c87feb28725670d6cc1f55c22072)
4. [https://github.com/decidim/decidim/commit/e494235d559be13dd1f8694345e6f6bba762d1c0](https://github.com/decidim/decidim/commit/e494235d559be13dd1f8694345e6f6bba762d1c0)
5. [https://github.com/decidim/decidim/commit/ff755e23814aeb56e9089fc08006a5d3faee47b6](https://github.com/decidim/decidim/commit/ff755e23814aeb56e9089fc08006a5d3faee47b6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31078
- **State**: PUBLISHED
- **Published Date**: November 10, 2023 at 13:32 UTC
- **Last Updated**: September 03, 2024 at 17:48 UTC
- **Reserved Date**: April 24, 2023 at 05:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Marco Steinbrecher WP BrowserUpdate plugin <= 4.4.1 versions.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Marco Steinbrecher - WP BrowserUpdate**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-browser-update/wordpress-wp-browserupdate-plugin-4-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- qilin_99 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9323
- **State**: PUBLISHED
- **Published Date**: August 16, 2019 at 20:12 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: August 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The 404-to-301 plugin before 2.0.3 for WordPress has SQL injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/404-to-301/#developers)
2. [](https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2015-9323) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37804
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:04 UTC
- **Last Updated**: August 03, 2024 at 10:37 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the time parameter in the function saveParentControlInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6083
- **State**: PUBLISHED
- **Published Date**: June 27, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Monitoring V6 could allow an unauthenticated user to access SOAP queries that could contain sensitive information. IBM X-Force ID: 117696.
### Affected Products
**IBM - Tivoli Monitoring V6**
Affected versions:
- 6.2.2 (Status: affected)
- 6.2.3 (Status: affected)
- 6.3.0 (Status: affected)
- 6.2.3.1 (Status: affected)
- 6.2.3.2 (Status: affected)
- 6.2.3.3 (Status: affected)
- 6.2.3.4 (Status: affected)
- 6.2.3.5 (Status: affected)
- 6.3 (Status: affected)
- 6.3.0.1 (Status: affected)
- 6.3.0.2 (Status: affected)
- 6.3.0.3 (Status: affected)
- 6.3.0.4 (Status: affected)
- 6.3.0.5 (Status: affected)
- 6.3.0.6 (Status: affected)
- 6.2.2.2 (Status: affected)
- 6.2.2.3 (Status: affected)
- 6.2.2.4 (Status: affected)
- 6.2.2.5 (Status: affected)
- 6.2.2.6 (Status: affected)
- 6.2.2.7 (Status: affected)
- 6.2.2.8 (Status: affected)
- 6.2.2.9 (Status: affected)
- 6.3.0.7 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22000909)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/117696)
3. [99259](http://www.securityfocus.com/bid/99259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33045
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 05:26 UTC
- **Last Updated**: August 02, 2024 at 15:32 UTC
- **Reserved Date**: May 17, 2023 at 09:28 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSR8811 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- QAM8255P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QCA0000 (Status: affected)
- QCA4024 (Status: affected)
- QCA6391 (Status: affected)
- QCA6426 (Status: affected)
- QCA6436 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCC2073 (Status: affected)
- QCC2076 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCM8550 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN9000 (Status: affected)
- QCN9012 (Status: affected)
- QCN9013 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- SC8380XP (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD865 5G (Status: affected)
- SDX55 (Status: affected)
- SDX65M (Status: affected)
- SM8550P (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- WCD9340 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29779
- **State**: PUBLISHED
- **Published Date**: March 14, 2025 at 17:24 UTC
- **Last Updated**: March 19, 2025 at 15:27 UTC
- **Reserved Date**: March 11, 2025 at 14:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Post-Quantum Secure Feldman's Verifiable Secret Sharing provides a Python implementation of Feldman's Verifiable Secret Sharing (VSS) scheme. In versions 0.8.0b2 and prior, the `secure_redundant_execution` function in feldman_vss.py attempts to mitigate fault injection attacks by executing a function multiple times and comparing results. However, several critical weaknesses exist. Python's execution environment cannot guarantee true isolation between redundant executions, the constant-time comparison implementation in Python is subject to timing variations, the randomized execution order and timing provide insufficient protection against sophisticated fault attacks, and the error handling may leak timing information about partial execution results. These limitations make the protection ineffective against targeted fault injection attacks, especially from attackers with physical access to the hardware. A successful fault injection attack could allow an attacker to bypass the redundancy check mechanisms, extract secret polynomial coefficients during share generation or verification, force the acceptance of invalid shares during verification, and/or manipulate the commitment verification process to accept fraudulent commitments. This undermines the core security guarantees of the Verifiable Secret Sharing scheme. As of time of publication, no patched versions of Post-Quantum Secure Feldman's Verifiable Secret Sharing exist, but other mitigations are available. Long-term remediation requires reimplementing the security-critical functions in a lower-level language like Rust. Short-term mitigations include deploying the software in environments with physical security controls, increasing the redundancy count (from 5 to a higher number) by modifying the source code, adding external verification of cryptographic operations when possible, considering using hardware security modules (HSMs) for key operations.
### Weakness Classification (CWE)
- CWE-1240: Security Weakness
- CWE-1279: Security Weakness
### Affected Products
**DavidOsipov - PostQuantum-Feldman-VSS**
Affected versions:
- <= 0.8.0b2 (Status: affected)
### References
1. [https://github.com/DavidOsipov/PostQuantum-Feldman-VSS/security/advisories/GHSA-r8gc-qc2c-c7vh](https://github.com/DavidOsipov/PostQuantum-Feldman-VSS/security/advisories/GHSA-r8gc-qc2c-c7vh)
2. [https://en.wikipedia.org/wiki/Fault_attack](https://en.wikipedia.org/wiki/Fault_attack)
3. [https://eprint.iacr.org/2004/100.pdf](https://eprint.iacr.org/2004/100.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16569
- **State**: REJECTED
- **Published Date**: April 17, 2019 at 13:34 UTC
- **Last Updated**: April 17, 2019 at 13:34 UTC
- **Reserved Date**: September 06, 2018 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21722
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 07, 2024 at 14:26 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in oggvideotools 0.9.1 allows remote attackers to run arbitrary code via opening of crafted ogg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/oggvideotools/bugs/11/)
2. [](https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-and-heap-use-after-free-detected-in-line-17-of-streamextractorcpp)
3. [FEDORA-2023-154d731f46](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LO6NXK73PNR4KAAHLXAGPWJAPP772IOD/)
4. [FEDORA-2023-cf30e790ce](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5E3JKOO7D6Y2SW2TQB5JDVG7I4Y3UFGW/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0678
- **State**: PUBLISHED
- **Published Date**: February 22, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
images/captcha.php in RavenNuke 2.30 allows remote attackers to obtain sensitive information via an aFonts array parameter value that does not correspond to a valid font file, which reveals the installation path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ravennuke-captcha-info-disclosure(48792)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48792)
2. [](http://ravenphpscripts.com/postt17156.html)
3. [20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0](http://www.securityfocus.com/archive/1/500988/100/0/threaded)
4. [8068](https://www.exploit-db.com/exploits/8068)
5. [](http://www.waraxe.us/advisory-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1746
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
IOGraphics in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1747.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html)
2. [](https://support.apple.com/HT206167)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-16-202)
4. [1035363](http://www.securitytracker.com/id/1035363) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0704
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 21:23 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Wireless Network Manager improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Wireless Network Manager Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0704) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5718
- **State**: PUBLISHED
- **Published Date**: December 26, 2008 at 17:08 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=648189)
2. [DSA-1705](http://www.debian.org/security/2009/dsa-1705)
3. [34484](http://secunia.com/advisories/34484)
4. [FEDORA-2009-3064](https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00962.html)
5. [FEDORA-2009-3069](https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00966.html)
6. [33548](http://secunia.com/advisories/33548)
7. [33227](http://secunia.com/advisories/33227)
8. [SUSE-SR:2009:004](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html)
9. [50824](http://osvdb.org/50824)
10. [32925](http://www.securityfocus.com/bid/32925)
11. [[oss-security] 20090114 update on CVE-2008-5718](http://www.openwall.com/lists/oss-security/2009/01/13/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13291
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 14:28 UTC
- **Last Updated**: September 16, 2024 at 19:41 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology DiskStation Manager (DSM) before 6.2.1-23824 allows remote authenticated users to obtain sensitive information via the world readable configuration.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Synology - DiskStation Manager (DSM)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.synology.com/security/advisory/Synology_SA_18_51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4626
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45562
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:49 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064082/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30009
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 16:57 UTC
- **Last Updated**: May 03, 2025 at 00:06 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-197: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11394
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:46 UTC
- **Last Updated**: December 20, 2021 at 22:46 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11207
- **State**: PUBLISHED
- **Published Date**: August 13, 2019 at 20:55 UTC
- **Last Updated**: September 17, 2024 at 02:00 UTC
- **Reserved Date**: April 12, 2019 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The web server component of TIBCO Software Inc.'s TIBCO LogLogic Enterprise Virtual Appliance, and TIBCO LogLogic Log Management Intelligence contains multiple vulnerabilities that theoretically allow persistent and reflected cross-site scripting (XSS) attacks, as well as cross-site request forgery (CSRF) attacks. This issue affects: TIBCO Software Inc. TIBCO LogLogic Enterprise Virtual Appliance version 6.2.1 and prior versions. TIBCO Software Inc. TIBCO LogLogic Log Management Intelligence 6.2.1. TIBCO LogLogic LX825 Appliance 0.0.004, TIBCO LogLogic LX1025 Appliance 0.0.004, TIBCO LogLogic LX4025 Appliance 0.0.004, TIBCO LogLogic MX3025 Appliance 0.0.004, TIBCO LogLogic MX4025 Appliance 0.0.004, TIBCO LogLogic ST1025 Appliance 0.0.004, TIBCO LogLogic ST2025-SAN Appliance 0.0.004, and TIBCO LogLogic ST4025 Appliance 0.0.004 using TIBCO LogLogic Log Management Intelligence versions 6.2.1 and below. TIBCO LogLogic LX1035 Appliance 0.0.005, TIBCO LogLogic LX1025R1 Appliance 0.0.004, TIBCO LogLogic LX1025R2 Appliance 0.0.004, TIBCO LogLogic LX4025R1 Appliance 0.0.004, TIBCO LogLogic LX4025R2 Appliance 0.0.004, TIBCO LogLogic LX4035 Appliance 0.0.005, TIBCO LogLogic ST2025-SANR1 Appliance 0.0.004, TIBCO LogLogic ST2025-SANR2 Appliance 0.0.004, TIBCO LogLogic ST2035-SAN Appliance 0.0.005, TIBCO LogLogic ST4025R1 Appliance 0.0.004, TIBCO LogLogic ST4025R2 Appliance 0.0.004, and TIBCO LogLogic ST4035 Appliance 0.0.005 using TIBCO LogLogic Log Management Intelligence versions 6.2.1 and below.
### Affected Products
**TIBCO Software Inc. - TIBCO LogLogic Enterprise Virtual Appliance**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO LogLogic Log Management Intelligence**
Affected versions:
- 6.2.1 (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2019/08/tibco-security-advisory-august-13-2019-tibco-loglogic-log-management-intelligence) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3148
- **State**: PUBLISHED
- **Published Date**: June 11, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Yahoo! Webcam Viewer ActiveX control in ywcvwr.dll 2.0.1.4 for Yahoo! Messenger 8.1.0.249 allows remote attackers to execute arbitrary code via a long server property value to the receive method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4043](https://www.exploit-db.com/exploits/4043)
2. [yahoo-webcam-viewer-bo(34759)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34759)
3. [37081](http://osvdb.org/37081)
4. [](http://research.eeye.com/html/advisories/upcoming/20070605.html)
5. [24355](http://www.securityfocus.com/bid/24355)
6. [](http://messenger.yahoo.com/security_update.php?id=060707)
7. [ADV-2007-2094](http://www.vupen.com/english/advisories/2007/2094)
8. [25547](http://secunia.com/advisories/25547)
9. [20070608 EEYE: Yahoo Webcam ActiveX Controls Multiple Buffer Overflows](http://www.securityfocus.com/archive/1/470861/100/0/threaded)
10. [1018204](http://securitytracker.com/id?1018204)
11. [20070607 2nd Yahoo 0day ActiveX Exploit](http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063819.html)
12. [24341](http://www.securityfocus.com/bid/24341)
13. [1018203](http://www.securitytracker.com/id?1018203)
14. [](http://research.eeye.com/html/advisories/published/AD20070608.html)
15. [VU#932217](http://www.kb.cert.org/vuls/id/932217) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3545
- **State**: REJECTED
- **Published Date**: May 16, 2017 at 20:00 UTC
- **Last Updated**: May 16, 2017 at 19:57 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2076
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2507
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:59 UTC
- **Last Updated**: August 01, 2024 at 19:18 UTC
- **Reserved Date**: March 15, 2024 at 14:59 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget button URL in all versions up to, and including, 1.0.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**jetmonsters - JetWidgets For Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a02f0a23-0b2b-4e16-9f6d-ec6302a0d23b?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?old_path=/jetwidgets-for-elementor/tags/1.0.16&old=3055510&new_path=/jetwidgets-for-elementor/tags/1.0.17&new=3055510&sfp_email=&sfph_mail=)
### Credits
- João Pedro Soares de Alcântara |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6028
- **State**: PUBLISHED
- **Published Date**: November 21, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in textview.php in Anton Vlasov DoSePa 1.0.4 allows remote attackers to read arbitrary files via a .. (dot dot) sequence or absolute file path in the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dosepa-textview-information-disclosure(30349)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30349)
2. [2795](https://www.exploit-db.com/exploits/2795)
3. [ADV-2006-4576](http://www.vupen.com/english/advisories/2006/4576)
4. [21149](http://www.securityfocus.com/bid/21149)
5. [22960](http://secunia.com/advisories/22960)
6. [](http://www.craigheffner.com/security/exploits/dosepa.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6425
- **State**: PUBLISHED
- **Published Date**: January 18, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 17:39 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2013:1869](http://rhn.redhat.com/errata/RHSA-2013-1869.html)
2. [USN-2047-1](http://www.ubuntu.com/usn/USN-2047-1)
3. [](https://bugs.freedesktop.org/show_bug.cgi?id=67484)
4. [[Pixman] 20131110 [ANNOUNCE] pixman release 0.32.0 now available](http://lists.freedesktop.org/archives/pixman/2013-November/003109.html)
5. [[oss-security] 20131204 Re: CVE Request: xorg-server and pixman](http://www.openwall.com/lists/oss-security/2013/12/04/8)
6. [openSUSE-SU-2014:0011](http://lists.opensuse.org/opensuse-updates/2014-01/msg00005.html)
7. [openSUSE-SU-2014:0014](http://lists.opensuse.org/opensuse-updates/2014-01/msg00008.html)
8. [openSUSE-SU-2014:0145](http://lists.opensuse.org/opensuse-updates/2014-01/msg00097.html)
9. [DSA-2823](http://www.debian.org/security/2013/dsa-2823)
10. [](http://cgit.freedesktop.org/pixman/commit/?id=5e14da97f16e421d084a9e735be21b1025150f0c)
11. [openSUSE-SU-2014:0007](http://lists.opensuse.org/opensuse-updates/2014-01/msg00001.html)
12. [[oss-security] 20131203 CVE Request: xorg-server and pixman](http://www.openwall.com/lists/oss-security/2013/12/03/8)
13. [](https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1197921) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7116
- **State**: PUBLISHED
- **Published Date**: May 23, 2019 at 17:21 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-17.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5934
- **State**: PUBLISHED
- **Published Date**: October 15, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 15:18 UTC
- **Reserved Date**: February 08, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024)
2. [DSA-4318](https://www.debian.org/security/2018/dsa-4318)
3. [](http://moinmo.in/SecurityFixes)
4. [[debian-lts-announce] 20181015 [SECURITY] [DLA 1546-1] moin security update](https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html)
5. [USN-3794-1](https://usn.ubuntu.com/3794-1/)
6. [openSUSE-SU-2018:3105](http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37767
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 13:07 UTC
- **Last Updated**: May 26, 2025 at 05:20 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- c05d1c401572ac63d704183b19db2ce746961412 (Status: affected)
- c05d1c401572ac63d704183b19db2ce746961412 (Status: affected)
- c05d1c401572ac63d704183b19db2ce746961412 (Status: affected)
- c05d1c401572ac63d704183b19db2ce746961412 (Status: affected)
- c05d1c401572ac63d704183b19db2ce746961412 (Status: affected)
- c05d1c401572ac63d704183b19db2ce746961412 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.13 (Status: affected)
- 0 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.25 (Status: unaffected)
- 6.14.4 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f2904fa2b9da943db6bef7c0f8b3fb4fc14acbc4)
2. [](https://git.kernel.org/stable/c/8f7b5987e21e003cafac28f0e4d323e6496f83ba)
3. [](https://git.kernel.org/stable/c/c3ff73e3bddf1a6c30d7effe4018d12ba0cadd2e)
4. [](https://git.kernel.org/stable/c/fb803d4bb9ea0a61c21c4987505e4d4ae18f9fdc)
5. [](https://git.kernel.org/stable/c/327107bd7f052f4ee2d0c966c7ae879822f1814f)
6. [](https://git.kernel.org/stable/c/f23e9116ebb71b63fe9cec0dcac792aa9af30b0c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1816
- **State**: PUBLISHED
- **Published Date**: February 17, 2020 at 23:24 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.
### Affected Products
**Huawei - NIP6800**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60SPC500 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6600, USG9500**
Affected versions:
- V500R001C30SPC200 (Status: affected)
- V500R001C30SPC600 (Status: affected)
- V500R001C60SPC500 (Status: affected)
- V500R005C00 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0854
- **State**: PUBLISHED
- **Published Date**: January 15, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 17, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction script in the WebAccess Dashboard Viewer in Advantech WebAccess before 8.1 allows remote attackers to write to files of arbitrary types via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39735](https://www.exploit-db.com/exploits/39735/)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-16-127)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-16-128)
5. [](http://www.rapid7.com/db/modules/exploit/windows/scada/advantech_webaccess_dashboard_file_upload)
6. [](http://www.zerodayinitiative.com/advisories/ZDI-16-129) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1175
- **State**: PUBLISHED
- **Published Date**: February 28, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 28, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in an admin feature in WebAPP before 20070209 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0604](http://www.vupen.com/english/advisories/2007/0604)
2. [33275](http://osvdb.org/33275)
3. [](http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=249)
4. [22563](http://www.securityfocus.com/bid/22563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35892
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 23:45 UTC
- **Last Updated**: September 26, 2024 at 18:29 UTC
- **Reserved Date**: June 20, 2023 at 02:24 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Financial Transaction Manager for SWIFT Services 3.2.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 258786.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**IBM - Financial Transaction Manager for SWIFT Services**
Affected versions:
- 3.2.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7030359)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/258786) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1578
- **State**: PUBLISHED
- **Published Date**: September 09, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allow remote attackers to hijack the authentication of users with the block permission for requests that (1) block a user via a request to the Block module or (2) unblock a user via a request to the Unblock module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mediawiki-multiple-csrf(78911)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78911)
2. [[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2](http://www.openwall.com/lists/oss-security/2012/03/24/1)
3. [[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2](http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html)
4. [48504](http://secunia.com/advisories/48504)
5. [](https://bugzilla.wikimedia.org/show_bug.cgi?id=34212)
6. [[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3](http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html)
7. [[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2](http://www.openwall.com/lists/oss-security/2012/03/22/9)
8. [80361](http://osvdb.org/80361)
9. [52689](http://www.securityfocus.com/bid/52689) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4015
- **State**: PUBLISHED
- **Published Date**: August 07, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hewlett-Packard (HP) ProCurve 3500yl, 6200yl, and 5400zl switches with software before K.11.33 allow remote attackers to cause a denial of service (possibly memory leak or system crash) via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT061173](http://www.securityfocus.com/archive/1/442033/100/0/threaded)
2. [ADV-2006-3136](http://www.vupen.com/english/advisories/2006/3136)
3. [19310](http://www.securityfocus.com/bid/19310)
4. [1335](http://securityreason.com/securityalert/1335)
5. [HPSBGN02136](http://www.securityfocus.com/archive/1/442033/100/0/threaded)
6. [21316](http://secunia.com/advisories/21316)
7. [1016623](http://securitytracker.com/id?1016623) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52556
- **State**: PUBLISHED
- **Published Date**: March 01, 2024 at 16:08 UTC
- **Last Updated**: November 14, 2024 at 19:47 UTC
- **Reserved Date**: March 01, 2024 at 16:04 UTC
- **Assigned By**: cisa-cg
### Vulnerability Description
In OpenBSD 7.4 before errata 009, a race condition between pf(4)'s processing of packets and expiration of packet states may cause a kernel panic.
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**OpenBSD - OpenBSD**
Affected versions:
- 7.4 (Status: affected)
### References
1. [](https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/009_pf.patch.sig)
2. [](https://github.com/openbsd/src/commit/9d9f4dc6c833cb79d13f836581e3a781d06842e7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4418
- **State**: REJECTED
- **Published Date**: December 19, 2013 at 22:00 UTC
- **Last Updated**: December 19, 2013 at 21:57 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21789
- **State**: PUBLISHED
- **Published Date**: July 07, 2021 at 16:40 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0e0, the first dword passed in the input buffer is the device port to write to and the dword at offset 4 is the value to write via the OUT instruction. A local attacker can send a malicious IRP to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-782: OS Command Injection
### Affected Products
**n/a - Iobit**
Affected versions:
- IOBit Advanced SystemCare Ultimate 14.2.0.220 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7909
- **State**: PUBLISHED
- **Published Date**: May 06, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Use of Client-Side Authentication issue was discovered in Advantech B+B SmartWorx MESR901 firmware versions 1.5.2 and prior. The web interface uses JavaScript to check client authentication and redirect unauthorized users. Attackers may intercept requests and bypass authentication to access restricted web pages.
### Weakness Classification (CWE)
- CWE-603: Security Weakness
### Affected Products
**n/a - Advantech B+B SmartWorx MESR901**
Affected versions:
- Advantech B+B SmartWorx MESR901 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-122-03)
2. [98257](http://www.securityfocus.com/bid/98257) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6837
- **State**: PUBLISHED
- **Published Date**: June 27, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: June 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Zoph 0.7.2.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different issue than CVE-2008-3258. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30116](http://www.securityfocus.com/bid/30116)
2. [](http://www.securityfocus.com/bid/30116/exploit)
3. [zoph-login-sql-injection(43693)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43693) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2869
- **State**: PUBLISHED
- **Published Date**: November 30, 2016 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 23:40 UTC
- **Reserved Date**: March 09, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the UI in IBM QRadar SIEM 7.1 before MR2 Patch 13 and 7.2 before 7.2.7 allow remote authenticated users to inject arbitrary web script or HTML via crafted fields in a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [94859](http://www.securityfocus.com/bid/94859)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21987768) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3957
- **State**: PUBLISHED
- **Published Date**: January 13, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:45 UTC
- **Reserved Date**: November 16, 2009 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [acrobat-reader-unspec-dos(55555)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55555)
2. [](http://www.adobe.com/support/security/bulletins/apsb10-02.html)
3. [37760](http://www.securityfocus.com/bid/37760)
4. [ADV-2010-0103](http://www.vupen.com/english/advisories/2010/0103)
5. [1023446](http://www.securitytracker.com/id?1023446)
6. [SUSE-SA:2010:008](http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html)
7. [TA10-013A](http://www.us-cert.gov/cas/techalerts/TA10-013A.html)
8. [oval:org.mitre.oval:def:7975](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7975) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36716
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 21:55 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/changestock.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/kingbhob02/library-management-system/SQLi-10.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18859
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 16:45 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by slowdown/stoppage. This affects C6300 before 2017-05-30, CM400 before 2017-05-30, CM700 before 2017-05-30, and CMD31T before 2017-05-30.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000038560/Security-Advisory-for-Vulnerability-on-Select-Cable-Modems-and-Gateways-PSV-2017-2165) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24071
- **State**: PUBLISHED
- **Published Date**: February 25, 2021 at 23:01 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft SharePoint Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation 2010 Service Pack 2**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24071) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4280
- **State**: PUBLISHED
- **Published Date**: August 13, 2012 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 04:03 UTC
- **Reserved Date**: August 13, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in admin/agenteditor.php in Free Realty 3.1-0.6 allow remote attackers to hijack the authentication of administrators for requests that (1) add an agent via an addagent action or (2) modify an agent.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18874](http://www.exploit-db.com/exploits/18874)
2. [53491](http://www.securityfocus.com/bid/53491)
3. [](http://www.vulnerability-lab.com/get_content.php?id=513)
4. [49132](http://secunia.com/advisories/49132) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27456
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:23 UTC
- **Last Updated**: December 13, 2024 at 21:19 UTC
- **Reserved Date**: March 01, 2023 at 14:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in HashThemes Total allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Total: from n/a through 2.1.19.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**HashThemes - Total**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/total/vulnerability/wordpress-total-theme-2-1-19-authenticated-arbitrary-plugin-activation?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3785
- **State**: PUBLISHED
- **Published Date**: November 23, 2005 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Second-order symlink vulnerability in eix-sync.in in Ebuild IndeX (eix) before 0.5.0_pre2 allows local users to overwrite arbitrary files via a symlink attack on the exi.X.sync temporary file, which is processed by the diff-eix program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17699](http://secunia.com/advisories/17699)
2. [GLSA-200511-19](http://www.gentoo.org/security/en/glsa/glsa-200511-19.xml)
3. [ADV-2005-2539](http://www.vupen.com/english/advisories/2005/2539)
4. [15541](http://www.securityfocus.com/bid/15541)
5. [](http://bugs.gentoo.org/show_bug.cgi?id=112061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10846
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 15:22 UTC
- **Last Updated**: April 25, 2025 at 23:02 UTC
- **Reserved Date**: November 05, 2024 at 10:21 UTC
- **Assigned By**: Docker
### Vulnerability Description
The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**compose-spec - compose-go**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/compose-spec/compose-go/security/advisories/GHSA-36gq-35j3-p9r9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3510
- **State**: PUBLISHED
- **Published Date**: October 18, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Business Intelligence Enterprise Edition component in Oracle Fusion Middleware 11.1.1.3.0 and 11.1.1.5.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to BI Platform Security.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46517](http://secunia.com/advisories/46517)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html)
3. [ofm-biee-bips-unspecified(70788)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70788)
4. [76487](http://osvdb.org/76487)
5. [50213](http://www.securityfocus.com/bid/50213) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0801
- **State**: PUBLISHED
- **Published Date**: April 01, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1146339)
2. [1031996](http://www.securitytracker.com/id/1031996)
3. [openSUSE-SU-2015:0892](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html)
4. [GLSA-201512-10](https://security.gentoo.org/glsa/201512-10)
5. [DSA-3212](http://www.debian.org/security/2015/dsa-3212)
6. [](http://www.mozilla.org/security/announce/2015/mfsa2015-40.html)
7. [SUSE-SU-2015:0704](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html)
8. [USN-2552-1](http://www.ubuntu.com/usn/USN-2552-1)
9. [RHSA-2015:0766](http://rhn.redhat.com/errata/RHSA-2015-0766.html)
10. [73455](http://www.securityfocus.com/bid/73455)
11. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
12. [openSUSE-SU-2015:1266](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html)
13. [USN-2550-1](http://www.ubuntu.com/usn/USN-2550-1)
14. [1032000](http://www.securitytracker.com/id/1032000)
15. [openSUSE-SU-2015:0677](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html)
16. [RHSA-2015:0771](http://rhn.redhat.com/errata/RHSA-2015-0771.html)
17. [DSA-3211](http://www.debian.org/security/2015/dsa-3211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43616
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 14, 2025 at 16:27 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EMF images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16371.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Corel - CorelDRAW Graphics Suite**
Affected versions:
- 23.5.0.506 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1474/)
### Credits
- Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4923
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 23:26 UTC
- **Last Updated**: February 13, 2025 at 16:38 UTC
- **Reserved Date**: February 12, 2023 at 21:29 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Omnibox in Google Chrome prior to 99.0.4844.51 allowed an attacker in a privileged network position to perform a man-in-the-middle attack via malicious network traffic. (Chromium security severity: Low)
### Affected Products
**Google - Chrome**
Affected versions:
- 99.0.4844.51 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1251065)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5961
- **State**: PUBLISHED
- **Published Date**: September 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The russiananime (aka com.rareartifact.russiananime68A5CCFE) application 1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#847729](http://www.kb.cert.org/vuls/id/847729)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1843
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 05:33 UTC
- **Last Updated**: December 28, 2024 at 00:52 UTC
- **Reserved Date**: April 04, 2023 at 19:51 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to unauthorized permalink structure update due to a missing capability check on the permalink_setup function in versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to change the permalink structure.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Affected Products
**xpeedstudio - Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00eb6-3e05-42fa-bb84-2df4bcae3955?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/metform/trunk/plugin.php#L544)
3. [](https://plugins.trac.wordpress.org/changeset/2907471/)
### Credits
- Marco Wotschka |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4040
- **State**: PUBLISHED
- **Published Date**: December 06, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in FileLister 0.51 and earlier allows remote attackers to execute arbitrary SQL commands via the search parameters, possibly the searchwhat parameter to definesearch.jsp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17821](http://secunia.com/advisories/17821)
2. [15706](http://www.securityfocus.com/bid/15706)
3. [21476](http://www.osvdb.org/21476)
4. [21416](http://www.osvdb.org/21416)
5. [](http://pridels0.blogspot.com/2005/12/filelister-sql-inj-vuln.html)
6. [filelister-definesearch-xss(23418)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23418)
7. [ADV-2005-2725](http://www.vupen.com/english/advisories/2005/2725) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1120
- **State**: PUBLISHED
- **Published Date**: December 01, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: November 30, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in (1) http.c, (2) http-retr.c, (3) main.c and other code that handles network protocols in ProZilla 1.3.6-r2 and earlier allow remote servers to execute arbitrary code via a long Location header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.gentoo.org/show_bug.cgi?id=70090)
2. [GLSA-200411-31](http://www.gentoo.org/security/en/glsa/glsa-200411-31.xml)
3. [DSA-663](http://www.debian.org/security/2005/dsa-663)
4. [prozilla-bo(18210)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18210)
5. [11734](http://www.securityfocus.com/bid/11734)
6. [20041124 Prozilla Remote Exploit](http://www.securityfocus.com/archive/1/382219) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19637
- **State**: PUBLISHED
- **Published Date**: December 08, 2019 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/saitoha/libsixel/issues/105) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21349
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:58 UTC
- **Last Updated**: March 12, 2025 at 01:42 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Remote Desktop Configuration Service Tampering Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows Remote Desktop Configuration Service Tampering Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18925
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 16:15 UTC
- **Last Updated**: August 05, 2024 at 02:02 UTC
- **Reserved Date**: November 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Systematic IRIS WebForms 5.4 and its functionalities can be accessed and used without any form of authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/vulnerabilities-cve/vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40939
- **State**: PUBLISHED
- **Published Date**: December 08, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 20:28 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In certain Secustation products the administrator account password can be read. This affects V2.5.5.3116-S50-SMA-B20171107A, V2.3.4.1301-M20-TSA-B20150617A, V2.5.5.3116-S50-RXA-B20180502A, V2.5.5.3116-S50-SMA-B20190723A, V2.5.5.3116-S50-SMB-B20161012A, V2.3.4.2103-S50-NTD-B20170508B, V2.5.5.3116-S50-SMB-B20160601A, V2.5.5.2601-S50-TSA-B20151229A, and V2.5.5.3116-S50-SMA-B20170217.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdsbz.gitbook.io/untitled/secustion-camera-vulnerability-recurrence) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29312
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 17:08 UTC
- **Reserved Date**: November 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zend.com)
2. [](https://cowtransfer.com/s/f9684f004d7149)
3. [](https://github.com/zendframework/zendframework) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46145
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 08:32 UTC
- **Last Updated**: August 02, 2024 at 20:37 UTC
- **Reserved Date**: October 17, 2023 at 09:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Privilege Management vulnerability in Themify Themify Ultra allows Privilege Escalation.This issue affects Themify Ultra: from n/a through 7.3.5.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Themify - Themify Ultra**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/themify-ultra/wordpress-themify-ultra-theme-7-3-3-authenticated-privilege-escalation-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13769
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 04:22 UTC
- **Last Updated**: February 12, 2025 at 14:54 UTC
- **Reserved Date**: January 28, 2025 at 15:40 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL theme for WordPress is vulnerable to Stored Cross-Site Scripting due to a missing capability check on the 'theme_options_ajax_post_action' AJAX action in all versions up to, and including, 4.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings and inject malicious web scripts. The developer opted to remove the software from the repository, so an update is not available and it is recommended to find a replacement software.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ThemeREX - Puzzles | WP Magazine / Review with Store WordPress Theme + RTL**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3c22d064-348d-4335-beaf-22dcdcf88518?source=cve)
2. [](https://themeforest.net/item/puzzles-wordpress-magazinereview-with-wooc/5690583)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8334
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 19:50 UTC
- **Last Updated**: September 17, 2024 at 00:00 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad T495s, X395, T495, A485, A285, A475, A275 which may allow for unauthorized access.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H`
### Affected Products
**Lenovo - BIOS**
Affected versions:
- various (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-30042)
### Credits
- Lenovo thanks Zoltan Harmath |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30462
- **State**: PUBLISHED
- **Published Date**: April 08, 2021 at 13:54 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VestaCP through 0.9.8-24 allows the admin user to escalate privileges to root because the Sudo configuration does not require a password to run /usr/local/vesta/bin scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ssd-disclosure.com/ssd-advisory-vestacp-lpe-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45109
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 09:37 UTC
- **Last Updated**: September 18, 2024 at 14:13 UTC
- **Reserved Date**: August 21, 2024 at 23:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - Photoshop Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb24-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9376
- **State**: PUBLISHED
- **Published Date**: November 17, 2016 at 05:48 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 16, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1037313](http://www.securitytracker.com/id/1037313)
2. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071)
3. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f2a7af8d3928e18ef15778e63b9b6c78f8bd1bef)
4. [](https://www.wireshark.org/security/wnpa-sec-2016-60.html)
5. [DSA-3719](http://www.debian.org/security/2016/dsa-3719)
6. [94369](http://www.securityfocus.com/bid/94369) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38439
- **State**: PUBLISHED
- **Published Date**: June 16, 2024 at 00:00 UTC
- **Last Updated**: August 22, 2024 at 16:49 UTC
- **Reserved Date**: June 16, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19 are also fixed versions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Netatalk/netatalk/issues/1096)
2. [](https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316)
3. [](https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc)
4. [](https://netatalk.io/security/CVE-2024-38439) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22305
- **State**: PUBLISHED
- **Published Date**: September 01, 2023 at 11:43 UTC
- **Last Updated**: September 27, 2024 at 18:40 UTC
- **Reserved Date**: January 03, 2022 at 09:39 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C`
### Weakness Classification (CWE)
- CWE-297: Security Weakness
### Affected Products
**Fortinet - FortiAnalyzer**
Affected versions:
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
**Fortinet - FortiSandbox**
Affected versions:
- 4.0.0 (Status: affected)
- 3.2.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
**Fortinet - FortiManager**
Affected versions:
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-18-292](https://fortiguard.com/psirt/FG-IR-18-292) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7094
- **State**: PUBLISHED
- **Published Date**: December 25, 2023 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 16:09 UTC
- **Reserved Date**: December 24, 2023 at 08:06 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected by this vulnerability is an unknown functionality of the file /protocol/nsasg6.0.tgz. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248941 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Netentsec - NS-ASG Application Security Gateway**
Affected versions:
- 6.3 (Status: affected)
### References
1. [](https://vuldb.com/?id.248941)
2. [](https://vuldb.com/?ctiid.248941)
3. [](https://www.yuque.com/wangjie-0l1rh/prbq8b/iyxa0t8rntyve4s0?singleDoc#%20%E3%80%8AThe%20information%20disclosure%20vulnerability%20in%20the%20Netentsec%20NS-ASG%20Application%20Security%20Gateway%E3%80%8B)
### Credits
- Jie Wang (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11754
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 08:24 UTC
- **Last Updated**: December 16, 2024 at 20:07 UTC
- **Reserved Date**: November 26, 2024 at 14:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Booking System Trafft plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trafftbooking' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ameliabooking - Booking System Trafft**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/84adbde0-9a9b-4a76-9333-56880fcc139d?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207016%40booking-system-trafft&new=3207016%40booking-system-trafft&sfp_email=&sfph_mail=)
### Credits
- SOPROBRO |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47134
- **State**: PUBLISHED
- **Published Date**: October 03, 2024 at 02:53 UTC
- **Last Updated**: October 03, 2024 at 15:34 UTC
- **Reserved Date**: September 18, 2024 at 23:29 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Out-of-bounds write vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.14.0 and earlier. Having a user open a specially crafted project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier may cause a denial-of-service (DoS) condition, arbitrary code execution, and/or information disclosure because the issues exist in parsing of KPP project files.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**JTEKT ELECTRONICS CORPORATION - Kostac PLC Programming Software (Former name: Koyo PLC Programming Software)**
Affected versions:
- 1.6.14.0 and earlier (Status: affected)
### References
1. [](https://www.electronics.jtekt.co.jp/en/topics/202410026928/)
2. [](https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/)
3. [](https://jvn.jp/en/vu/JVNVU92808077/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2897
- **State**: PUBLISHED
- **Published Date**: September 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WEB//NEWS 1.4 allows remote attackers to obtain sensitive information via a direct request to files in the actions directory, which reveal the path in an error message, as demonstrated using cat.add.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050907 [NewAngels Advisory #5] Stylemotion WEB//NEWS 1.4 Vulnerabilities](http://marc.info/?l=bugtraq&m=112611504519410&w=2)
2. [16727](http://secunia.com/advisories/16727/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41680
- **State**: PUBLISHED
- **Published Date**: October 13, 2023 at 14:51 UTC
- **Last Updated**: October 22, 2024 at 20:55 UTC
- **Reserved Date**: August 30, 2023 at 13:42 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Fortinet - FortiSandbox**
Affected versions:
- 4.4.0 (Status: affected)
- 4.2.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.2.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.5.0 (Status: affected)
- 2.4.1 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-23-311](https://fortiguard.com/psirt/FG-IR-23-311) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20338
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 02:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In HierarchicalUri.readFrom of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to a local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-171966843
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-12 Android-12L (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1586
- **State**: PUBLISHED
- **Published Date**: February 12, 2010 at 21:00 UTC
- **Last Updated**: August 08, 2024 at 04:58 UTC
- **Reserved Date**: February 11, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in SimpleServer:WWW 1.13 and earlier allows remote attackers to execute arbitrary programs via encoded ../ ("%2E%2E%2F%") sequences in a request to the cgi-bin/ directory, a different vulnerability than CVE-2000-0664.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [simpleserverwww-cgibin-directory-traversal(56631)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56631)
2. [20010727 SimpleServer:WWW Command Execution Vulnerability Exploit Code Released](http://seclists.org/bugtraq/2001/Jul/660)
3. [](http://www.securiteam.com/windowsntfocus/5TP0B1P4UK.html)
4. [3112](http://www.securityfocus.com/bid/3112)
5. [](http://www.analogx.com/contents/download/network/sswww.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14483
- **State**: PUBLISHED
- **Published Date**: September 15, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
flower.initd in the Gentoo dev-python/flower package before 0.9.1-r1 for Celery Flower sets PID file ownership to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.gentoo.org/631020) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0751
- **State**: PUBLISHED
- **Published Date**: February 08, 2023 at 19:25 UTC
- **Last Updated**: March 25, 2025 at 13:47 UTC
- **Reserved Date**: February 08, 2023 at 15:34 UTC
- **Assigned By**: freebsd
### Vulnerability Description
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- 13.1-RELEASE (Status: affected)
- 12.4-RELEASE (Status: affected)
- 12.3-RELEASE (Status: affected)
### References
1. [](https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23374
- **State**: PUBLISHED
- **Published Date**: January 30, 2025 at 04:14 UTC
- **Last Updated**: January 30, 2025 at 15:10 UTC
- **Reserved Date**: January 15, 2025 at 06:04 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**Dell - Enterprise SONiC OS**
Affected versions:
- N/A (Status: affected)
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000278568/dsa-2025-057-security-update-for-dell-enterprise-sonic-distribution-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39448
- **State**: PUBLISHED
- **Published Date**: September 05, 2023 at 08:28 UTC
- **Last Updated**: September 30, 2024 at 15:46 UTC
- **Reserved Date**: August 09, 2023 at 02:20 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution.
### Affected Products
**SHIRASAGI Project - SHIRASAGI**
Affected versions:
- prior to v1.18.0 (Status: affected)
### References
1. [](https://www.ss-proj.org/support/954.html)
2. [](https://jvn.jp/en/jp/JVN82758000/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42904
- **State**: PUBLISHED
- **Published Date**: November 18, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 13:58 UTC
- **Reserved Date**: October 13, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine ADManager Plus through 7151 allows authenticated admin users to execute the commands in proxy settings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2022-42904.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.