System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20426
- **State**: PUBLISHED
- **Published Date**: December 22, 2021 at 22:29 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in /function/booksave.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.s-cms.cn/)
2. [](http://government.com)
3. [](https://github.com/Sea0o/vulnerability/issues/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4284
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:13 UTC
- **Last Updated**: June 11, 2021 at 21:13 UTC
- **Reserved Date**: December 10, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53931
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 00:00 UTC
- **Last Updated**: January 23, 2025 at 17:35 UTC
- **Reserved Date**: November 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The com.glitter.caller.screen (aka iCaller, Caller Theme & Dialer) application through 1.1 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.glitter.caller.screen.DialerActivity component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/actuator/com.glitter.caller.screen/blob/main/CVE-2024-53931) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32341
- **State**: PUBLISHED
- **Published Date**: February 09, 2024 at 00:58 UTC
- **Last Updated**: August 02, 2024 at 15:10 UTC
- **Reserved Date**: May 08, 2023 at 18:32 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 255827.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**IBM - Sterling B2B Integrator**
Affected versions:
- 6.0.0.0 (Status: affected)
- 6.1.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7116081)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/255827) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3953
- **State**: PUBLISHED
- **Published Date**: August 12, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 20:21 UTC
- **Reserved Date**: July 11, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/index.php in phpList before 2.10.19 allows remote administrators to execute arbitrary SQL commands via the delete parameter to the editattributes page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.phplist.com/?lid=579)
2. [](https://www.htbridge.com/advisory/HTB23100)
3. [20120808 Multiple Vulnerabilities in phpList](http://archives.neohapsis.com/archives/bugtraq/2012-08/0059.html)
4. [84483](http://osvdb.org/84483)
5. [phplist-delete-sql-injection(77527)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77527) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2911
- **State**: PUBLISHED
- **Published Date**: March 26, 2024 at 21:31 UTC
- **Last Updated**: September 09, 2024 at 15:26 UTC
- **Reserved Date**: March 26, 2024 at 13:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Tianjin - PubliCMS**
Affected versions:
- 4.0.202302.e (Status: affected)
### References
1. [VDB-257979 | Tianjin PubliCMS cross-site request forgery](https://vuldb.com/?id.257979)
2. [VDB-257979 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.257979)
3. [Submit #300339 | TIANJIN Heycore Technology Co.Ltd publiccms V4.0.202302.e CSRF](https://vuldb.com/?submit.300339)
4. [](https://github.com/sweatxi/BugHub/blob/main/publiccms_csrf.pdf)
### Credits
- hexixi (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6833
- **State**: PUBLISHED
- **Published Date**: November 21, 2013 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 20, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The qls_eioctl function in sys/dev/qlxge/qls_ioctl.c in the kernel in FreeBSD 10 and earlier does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20131115 XADV-2013006 FreeBSD <= 10 kernel qlxge/qlxgbe Driver IOCTL Multiple Kernel Memory Leak Bugs](http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0107.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5522
- **State**: PUBLISHED
- **Published Date**: March 15, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 15:04 UTC
- **Reserved Date**: January 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in MapServer before 6.0.6, 6.2.x before 6.2.4, 6.4.x before 6.4.5, and 7.0.x before 7.0.4 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving WFS get feature requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mapserver/mapserver/commit/e52a436c0e1c5e9f7ef13428dba83194a800f4df)
2. [](http://www.mapserver.org/development/changelog/changelog-6-4.html#changelog-6-4-5)
3. [](http://www.mapserver.org/development/changelog/changelog-6-0-6.html#changelog-6-0-6)
4. [[mapserver-dev] 20170118 MapServer 6.0.6, 6.2.4, 6.4.5 and 7.0.4 are released](https://lists.osgeo.org/pipermail/mapserver-dev/2017-January/015007.html)
5. [](http://www.mapserver.org/development/changelog/changelog-7-0.html#changelog-7-0-4)
6. [DSA-3766](http://www.debian.org/security/2017/dsa-3766)
7. [](http://www.mapserver.org/development/changelog/changelog-6-2-4.html#changelog-6-2-4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39356
- **State**: PUBLISHED
- **Published Date**: October 21, 2021 at 19:38 UTC
- **Last Updated**: February 14, 2025 at 17:54 UTC
- **Reserved Date**: August 20, 2021 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Content Staging WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via several parameters that are echo'd out via the ~/templates/settings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Content Staging - Content Staging**
Affected versions:
- 2.0.1 (Status: affected)
### References
1. [](https://plugins.trac.wordpress.org/browser/content-staging/trunk/templates/settings.php)
2. [](https://wordfence.com/vulnerability-advisories/#CVE-2021-39356)
3. [](https://github.com/BigTiger2020/word-press/blob/main/Content%20Staging.md)
### Credits
- Thinkland Security Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1400
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 06:32 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1401, CVE-2020-1407.
### Affected Products
**Microsoft - Windows 10 Version 2004 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 2004 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1400)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-924/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12195
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: June 11, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0442
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:22 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 12.1.0.4 and 12.1.0.5 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Loader Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034734](http://www.securitytracker.com/id/1034734) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47241
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 03, 2025 at 19:00 UTC
- **Reserved Date**: November 03, 2023 at 23:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in CoCart Headless, LLC CoCart – Headless ecommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CoCart – Headless ecommerce: from n/a through 3.11.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**CoCart Headless, LLC - CoCart – Headless ecommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cart-rest-api-for-woocommerce/vulnerability/wordpress-cocart-headless-ecommerce-plugin-3-9-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28016
- **State**: PUBLISHED
- **Published Date**: May 06, 2021 at 03:51 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 30, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26831
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 09:43 UTC
- **Last Updated**: May 04, 2025 at 12:54 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net/handshake: Fix handshake_req_destroy_test1
Recently, handshake_req_destroy_test1 started failing:
Expected handshake_req_destroy_test == req, but
handshake_req_destroy_test == 0000000000000000
req == 0000000060f99b40
not ok 11 req_destroy works
This is because "sock_release(sock)" was replaced with "fput(filp)"
to address a memory leak. Note that sock_release() is synchronous
but fput() usually delays the final close and clean-up.
The delay is not consequential in the other cases that were changed
but handshake_req_destroy_test1 is testing that handshake_req_cancel()
followed by closing the file actually does call the ->hp_destroy
method. Thus the PTR_EQ test at the end has to be sure that the
final close is complete before it checks the pointer.
We cannot use a completion here because if ->hp_destroy is never
called (ie, there is an API bug) then the test will hang.
Reported by: Guenter Roeck <linux@roeck-us.net>
### Affected Products
**Linux - Linux**
Affected versions:
- 4a0f07d71b0483cc08c03cefa7c85749e187c214 (Status: affected)
- 4a0f07d71b0483cc08c03cefa7c85749e187c214 (Status: affected)
- 4a0f07d71b0483cc08c03cefa7c85749e187c214 (Status: affected)
- 1751e44980466e3ebc246d22d3ebd422197704b6 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6 (Status: affected)
- 0 (Status: unaffected)
- 6.6.18 (Status: unaffected)
- 6.7.6 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d74226e03df1bf19848f18344401f254345af912)
2. [](https://git.kernel.org/stable/c/7f97805b8df6e33850e225e6bd3ebd9e246920af)
3. [](https://git.kernel.org/stable/c/4e1d71cabb19ec2586827adfc60d68689c68c194) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23001
- **State**: PUBLISHED
- **Published Date**: July 29, 2022 at 18:51 UTC
- **Last Updated**: August 03, 2024 at 03:28 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: WDC PSIRT
### Vulnerability Description
When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-682: Security Weakness
### Affected Products
**Western Digital - Sweet B Library**
Affected versions:
- Sweet B Library (Status: affected)
### References
1. [](https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6390
- **State**: PUBLISHED
- **Published Date**: January 29, 2024 at 14:44 UTC
- **Last Updated**: August 02, 2024 at 08:28 UTC
- **Reserved Date**: November 29, 2023 at 20:33 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WordPress Users WordPress plugin through 1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WordPress Users**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a0ca68d3-f885-46c9-9f6b-b77ad387d25d/)
2. [](https://magos-securitas.com/txt/2023-6390.txt)
### Credits
- Daniel Ruf
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8072
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9030
- **State**: PUBLISHED
- **Published Date**: February 17, 2020 at 03:02 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 17, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to the syslog.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sku11army.blogspot.com/2020/01/symmetricom-syncserver.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15787
- **State**: PUBLISHED
- **Published Date**: October 22, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:04 UTC
- **Reserved Date**: October 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "Data Execution Prevention Violation starting at xnview+0x0000000000580063."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15787) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27788
- **State**: PUBLISHED
- **Published Date**: March 12, 2025 at 13:51 UTC
- **Last Updated**: March 12, 2025 at 14:04 UTC
- **Reserved Date**: March 06, 2025 at 18:06 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
JSON is a JSON implementation for Ruby. Starting in version 2.10.0 and prior to version 2.10.2, a specially crafted document could cause an out of bound read, most likely resulting in a crash. Versions prior to 2.10.0 are not vulnerable. Version 2.10.2 fixes the problem. No known workarounds are available.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**ruby - json**
Affected versions:
- >= 2.10.0, < 2.10.2 (Status: affected)
### References
1. [https://github.com/ruby/json/security/advisories/GHSA-9m3q-rhmv-5q44](https://github.com/ruby/json/security/advisories/GHSA-9m3q-rhmv-5q44)
2. [https://github.com/ruby/json/commit/c56db31f800d5d508389793e69682f99749dbadf](https://github.com/ruby/json/commit/c56db31f800d5d508389793e69682f99749dbadf)
3. [https://github.com/ruby/json/releases/tag/v2.10.2](https://github.com/ruby/json/releases/tag/v2.10.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0682
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: August 29, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ZoneAlarm and ZoneAlarm Pro allows a local attacker to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001230 [DiamondCS Advisory] ZoneAlarm and ZoneAlarm Pro can be blocked from loading by setting a Mutex in memory](http://marc.info/?l=ntbugtraq&m=97818917222992&w=2)
2. [zonealarm-mutex-dos(5821)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5821) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40584
- **State**: PUBLISHED
- **Published Date**: September 07, 2023 at 22:14 UTC
- **Last Updated**: September 26, 2024 at 14:05 UTC
- **Reserved Date**: August 16, 2023 at 18:24 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Argo CD is a declarative continuous deployment for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file without validating the size of its inner files. As a result, a malicious, low-privileged user can send a malicious tar.gz file that exploits this vulnerability to the repo-server, thereby harming the system's functionality and availability. Additionally, the repo-server is susceptible to another vulnerability due to the fact that it does not check the extracted file permissions before attempting to delete them. Consequently, an attacker can craft a malicious tar.gz archive in a way that prevents the deletion of its inner files when the manifest generation process is completed. A patch for this vulnerability has been released in versions 2.6.15, 2.7.14, and 2.8.3. Users are advised to upgrade. The only way to completely resolve the issue is to upgrade, however users unable to upgrade should configure RBAC (Role-Based Access Control) and provide access for configuring applications only to a limited number of administrators. These administrators should utilize trusted and verified Helm charts.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**argoproj - argo-cd**
Affected versions:
- >= 2.4.0, < 2.6.15 (Status: affected)
- >= 2.7.0, < 2.7.14 (Status: affected)
- >= 2.8.0, < 2.8.3 (Status: affected)
### References
1. [https://github.com/argoproj/argo-cd/security/advisories/GHSA-g687-f2gx-6wm8](https://github.com/argoproj/argo-cd/security/advisories/GHSA-g687-f2gx-6wm8)
2. [https://github.com/argoproj/argo-cd/commit/b8f92c4ff226346624f43de3f25d81dac6386674](https://github.com/argoproj/argo-cd/commit/b8f92c4ff226346624f43de3f25d81dac6386674) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10450
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 15:00 UTC
- **Last Updated**: October 28, 2024 at 15:17 UTC
- **Reserved Date**: October 28, 2024 at 06:45 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /kortex_lite/control/edit_profile.php of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Kortex Lite Advocate Office Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-282010 | SourceCodester Kortex Lite Advocate Office Management System POST Parameter edit_profile.php sql injection](https://vuldb.com/?id.282010)
2. [VDB-282010 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282010)
3. [Submit #432614 | https://www.sourcecodester.com/php/17280/advocate-office-managem Advocate office management system 1 SQL Injection](https://vuldb.com/?submit.432614)
4. [](https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/Advocate-office-management-system.md)
5. [](https://www.sourcecodester.com/)
### Credits
- willdone1 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3906
- **State**: PUBLISHED
- **Published Date**: December 13, 2011 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 01, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14548](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14548)
2. [](http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html)
3. [](http://code.google.com/p/chromium/issues/detail?id=98809) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0417
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Portal Framework, a different vulnerability than CVE-2015-0388.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [72211](http://www.securityfocus.com/bid/72211)
2. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
3. [oracle-cpujan2015-cve20150417(100131)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100131)
4. [1031578](http://www.securitytracker.com/id/1031578) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5577
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The AVON Buy & Sell (aka com.AVONBeautyntheRep) application 0.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#286817](http://www.kb.cert.org/vuls/id/286817)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1455
- **State**: PUBLISHED
- **Published Date**: March 17, 2023 at 06:58 UTC
- **Last Updated**: August 02, 2024 at 05:49 UTC
- **Reserved Date**: March 17, 2023 at 06:58 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com' AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND 'jFNl'='jFNl leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Online Pizza Ordering System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.223300)
2. [](https://vuldb.com/?ctiid.223300)
### Credits
- WWesleywww (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22070
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 14:12 UTC
- **Last Updated**: May 26, 2025 at 05:17 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
fs/9p: fix NULL pointer dereference on mkdir
When a 9p tree was mounted with option 'posixacl', parent directory had a
default ACL set for its subdirectories, e.g.:
setfacl -m default:group:simpsons:rwx parentdir
then creating a subdirectory crashed 9p client, as v9fs_fid_add() call in
function v9fs_vfs_mkdir_dotl() sets the passed 'fid' pointer to NULL
(since dafbe689736) even though the subsequent v9fs_set_create_acl() call
expects a valid non-NULL 'fid' pointer:
[ 37.273191] BUG: kernel NULL pointer dereference, address: 0000000000000000
...
[ 37.322338] Call Trace:
[ 37.323043] <TASK>
[ 37.323621] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)
[ 37.324448] ? page_fault_oops (arch/x86/mm/fault.c:714)
[ 37.325532] ? search_module_extables (kernel/module/main.c:3733)
[ 37.326742] ? p9_client_walk (net/9p/client.c:1165) 9pnet
[ 37.328006] ? search_bpf_extables (kernel/bpf/core.c:804)
[ 37.329142] ? exc_page_fault (./arch/x86/include/asm/paravirt.h:686 arch/x86/mm/fault.c:1488 arch/x86/mm/fault.c:1538)
[ 37.330196] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:574)
[ 37.331330] ? p9_client_walk (net/9p/client.c:1165) 9pnet
[ 37.332562] ? v9fs_fid_xattr_get (fs/9p/xattr.c:30) 9p
[ 37.333824] v9fs_fid_xattr_set (fs/9p/fid.h:23 fs/9p/xattr.c:121) 9p
[ 37.335077] v9fs_set_acl (fs/9p/acl.c:276) 9p
[ 37.336112] v9fs_set_create_acl (fs/9p/acl.c:307) 9p
[ 37.337326] v9fs_vfs_mkdir_dotl (fs/9p/vfs_inode_dotl.c:411) 9p
[ 37.338590] vfs_mkdir (fs/namei.c:4313)
[ 37.339535] do_mkdirat (fs/namei.c:4336)
[ 37.340465] __x64_sys_mkdir (fs/namei.c:4354)
[ 37.341455] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
[ 37.342447] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
Fix this by simply swapping the sequence of these two calls in
v9fs_vfs_mkdir_dotl(), i.e. calling v9fs_set_create_acl() before
v9fs_fid_add().
### Affected Products
**Linux - Linux**
Affected versions:
- dafbe689736f62c696ac64809b17bdc752cfbe76 (Status: affected)
- dafbe689736f62c696ac64809b17bdc752cfbe76 (Status: affected)
- dafbe689736f62c696ac64809b17bdc752cfbe76 (Status: affected)
- dafbe689736f62c696ac64809b17bdc752cfbe76 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.0 (Status: affected)
- 0 (Status: unaffected)
- 6.12.23 (Status: unaffected)
- 6.13.11 (Status: unaffected)
- 6.14.2 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8522051c58d68146b93e8a5ba9987e83b3d64e7b)
2. [](https://git.kernel.org/stable/c/2139dea5c53e3bb63ac49a6901c85e525a80ee8a)
3. [](https://git.kernel.org/stable/c/6517b395cb1e43fbf3962dd93e6fb4a5e5ab100e)
4. [](https://git.kernel.org/stable/c/3f61ac7c65bdb26accb52f9db66313597e759821) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2481
- **State**: PUBLISHED
- **Published Date**: August 05, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 05, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ColdFusion Fusebox 4.1.0 allows remote attackers to obtain sensitive information via an invalid fuseaction parameter, which leaks the full server path in an error message, as demonstrated using the "?" (question mark) character.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050803 Coldfusion Fusebox V4.1.0 Vulnerability](http://marc.info/?l=bugtraq&m=112309656102615&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32849
- **State**: PUBLISHED
- **Published Date**: January 26, 2022 at 21:30 UTC
- **Last Updated**: April 22, 2025 at 18:27 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Gerapy - gerapy**
Affected versions:
- 0.9.9 (Status: affected)
### References
1. [](https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/)
2. [](https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j)
3. [](https://github.com/Gerapy/Gerapy/issues/197)
4. [](https://github.com/Gerapy/Gerapy/issues/217)
5. [](https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14895
- **State**: PUBLISHED
- **Published Date**: December 05, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:58 UTC
- **Reserved Date**: September 28, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, after a subsystem reset, iwpriv is not giving correct information.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-12-01)
2. [102073](http://www.securityfocus.com/bid/102073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42512
- **State**: PUBLISHED
- **Published Date**: December 16, 2022 at 00:00 UTC
- **Last Updated**: April 18, 2025 at 13:07 UTC
- **Reserved Date**: October 07, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2614
- **State**: PUBLISHED
- **Published Date**: July 01, 2011 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 19:24 UTC
- **Reserved Date**: July 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SVG implementation in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via vectors involving a path on which many characters are drawn.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.opera.com/docs/changelogs/windows/1150/)
2. [](http://www.opera.com/docs/changelogs/unix/1150/)
3. [](http://www.opera.com/docs/changelogs/mac/1150/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2219
- **State**: PUBLISHED
- **Published Date**: July 17, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: July 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 6 allows remote attackers to spoof the address bar to facilitate phishing attacks via Javascript that uses an invalid URI, modifies the Location field, then uses history.back to navigate to the previous domain, aka NullyFake.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040815 NullyFake - Site Spoofing in MSIE](http://archives.neohapsis.com/archives/bugtraq/2004-08/0215.html)
2. [12304](http://secunia.com/advisories/12304)
3. [8978](http://www.osvdb.org/8978)
4. [ie-address-bar-spoofing(17007)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17007)
5. [](http://umbrella.name/originalvuln/msie/NullyFake/nullyfake-content.txt)
6. [1010957](http://securitytracker.com/id?1010957) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18533
- **State**: REJECTED
- **Published Date**: October 28, 2019 at 14:42 UTC
- **Last Updated**: October 28, 2019 at 14:42 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21097
- **State**: PUBLISHED
- **Published Date**: April 19, 2023 at 00:00 UTC
- **Last Updated**: February 05, 2025 at 15:34 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In toUriInner of Intent.java, there is a possible way to launch an arbitrary activity due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261858325
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-04-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0629
- **State**: PUBLISHED
- **Published Date**: June 16, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 20, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Adobe ColdFusion 8.0, 8.0.1, 9.0, and 9.0.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [coldfusion-unspec-csrf(68027)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68027)
2. [](http://www.adobe.com/support/security/bulletins/apsb11-14.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0224
- **State**: PUBLISHED
- **Published Date**: March 16, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:10 UTC
- **Reserved Date**: March 15, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=5767)
2. [courier-codeset-converter-bo(15434)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15434)
3. [11087](http://secunia.com/advisories/11087/)
4. [9845](http://www.securityfocus.com/bid/9845) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30874
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:49 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15. A VPN configuration may be installed by an app without user permission.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212814)
2. [](https://support.apple.com/kb/HT212869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-43563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-43563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-43563
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 20:49 UTC
- **Last Updated**: May 15, 2025 at 04:01 UTC
- **Reserved Date**: April 16, 2025 at 16:23 UTC
- **Assigned By**: adobe
### Vulnerability Description
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Adobe - ColdFusion**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/coldfusion/apsb25-52.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36008
- **State**: PUBLISHED
- **Published Date**: June 03, 2021 at 22:16 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OBottle 2.0 in \c\t.php contains an arbitrary file write vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SomeBottle/OBottle/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20133
- **State**: PUBLISHED
- **Published Date**: July 16, 2022 at 06:15 UTC
- **Last Updated**: April 14, 2025 at 16:00 UTC
- **Reserved Date**: June 28, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Itech Job Portal Script 9.13. This affects an unknown part of the file /admin. The manipulation leads to improper authentication. It is possible to initiate the attack remotely.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Itech - Job Portal Script**
Affected versions:
- 9.13 (Status: affected)
### References
1. [](https://vuldb.com/?id.96285)
### Credits
- Kaan Kamis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23550
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 14:53 UTC
- **Last Updated**: August 02, 2024 at 10:35 UTC
- **Reserved Date**: January 19, 2023 at 14:56 UTC
- **Assigned By**: talos
### Vulnerability Description
An OS command injection vulnerability exists in the ys_thirdparty user_delete functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Milesight - UR32L**
Affected versions:
- v32.3.0.5 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2576
- **State**: PUBLISHED
- **Published Date**: August 16, 2010 at 18:25 UTC
- **Last Updated**: August 07, 2024 at 02:39 UTC
- **Reserved Date**: July 01, 2010 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Opera before 10.61 does not properly suppress clicks on download dialogs that became visible after a recent tab change, which allows remote attackers to conduct clickjacking attacks, and consequently execute arbitrary code, via vectors involving (1) closing a tab or (2) hiding a tab, a related issue to CVE-2005-2407.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:12084](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12084)
2. [](http://www.opera.com/docs/changelogs/unix/1061/)
3. [](http://www.opera.com/support/kb/view/967/)
4. [20100812 Secunia Research: Opera "Download" Dialog File Execution Security Issue](http://www.securityfocus.com/archive/1/513040/100/0/threaded)
5. [](http://www.opera.com/docs/changelogs/mac/1061/)
6. [](http://www.opera.com/docs/changelogs/windows/1061/)
7. [](http://secunia.com/secunia_research/2010-110/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0825
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 15:35 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: March 02, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other's booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Unknown - Amelia – Events & Appointments Booking Calendar**
Affected versions:
- 1.0.49 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e)
2. [](https://plugins.trac.wordpress.org/changeset/2693545)
### Credits
- Huli from Cymetrics |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9285
- **State**: PUBLISHED
- **Published Date**: April 04, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: April 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in-asus-router.html)
2. [](https://fortiguard.com/zeroday/FG-VD-17-216)
3. [](http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4907
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2015-4820.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
2. [1033881](http://www.securitytracker.com/id/1033881) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28547
- **State**: PUBLISHED
- **Published Date**: September 29, 2021 at 15:45 UTC
- **Last Updated**: April 23, 2025 at 19:25 UTC
- **Reserved Date**: March 16, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Creative Cloud Desktop Application for macOS version 5.3 (and earlier) is affected by a privilege escalation vulnerability that could allow a normal user to delete the OOBE directory and get permissions of any directory under the administrator authority.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Adobe - Creative Cloud (desktop component)**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5945
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 12:31 UTC
- **Last Updated**: February 05, 2025 at 18:51 UTC
- **Reserved Date**: November 03, 2023 at 00:19 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The video carousel slider with lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the responsive_video_gallery_with_lightbox_video_management_func() function. This makes it possible for unauthenticated attackers to delete videos hosted from the video slider via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**nik00726 - video carousel slider with lightbox**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/dc052b00-65a7-4668-8bdd-b06d69d12a4a?source=cve)
2. [](https://github.com/wp-plugins/wp-responsive-video-gallery-with-lightbox/blob/master/wp-responsive-video-gallery-with-lightbox.php)
3. [](https://plugins.trac.wordpress.org/browser/wp-responsive-video-gallery-with-lightbox/tags/1.0.1/wp-responsive-video-gallery-with-lightbox.php)
### Credits
- Ala Arfaoui |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1867
- **State**: PUBLISHED
- **Published Date**: December 13, 2019 at 13:08 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 03, 2014 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
suPHP before 0.7.2 source-highlighting feature allows security bypass which could lead to arbitrary code execution
### Affected Products
**suphp - suphp**
Affected versions:
- < 0.7.2 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2014-1867)
2. [](http://www.securityfocus.com/bid/65212)
3. [](http://www.openwall.com/lists/oss-security/2014/02/10/1)
4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/91315) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0146
- **State**: PUBLISHED
- **Published Date**: January 29, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:05 UTC
- **Reserved Date**: January 25, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Firefox before 1.0 and Mozilla before 1.7.5 allow remote attackers to obtain sensitive data from the clipboard via Javascript that generates a middle-click event on systems for which a middle-click performs a paste operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12407](http://www.securityfocus.com/bid/12407)
2. [](http://www.mozilla.org/security/announce/mfsa2005-08.html)
3. [RHSA-2005:335](http://www.redhat.com/support/errata/RHSA-2005-335.html)
4. [mozilla-middle-click-information-disclosure(19171)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19171)
5. [RHSA-2005:384](http://www.redhat.com/support/errata/RHSA-2005-384.html)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=265728)
7. [oval:org.mitre.oval:def:10362](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10362) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24295
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 00:00 UTC
- **Last Updated**: February 25, 2025 at 15:29 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 allows attackers to execute arbitrary code after opening a crafted PDF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sit.fraunhofer.de/CVE-2023-24295/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2818
- **State**: PUBLISHED
- **Published Date**: August 15, 2022 at 09:50 UTC
- **Last Updated**: August 03, 2024 at 00:52 UTC
- **Reserved Date**: August 15, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository cockpit-hq/cockpit prior to 2.2.2.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-212: Security Weakness
### Affected Products
**cockpit-hq - cockpit-hq/cockpit**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/ee27e5df-516b-4cf4-9f28-346d907b5491)
2. [](https://github.com/cockpit-hq/cockpit/commit/4bee1b903ee20818f4a8ecb9d974b9536cc54cb4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46761
- **State**: REJECTED
- **Last Updated**: April 29, 2025 at 02:55 UTC
- **Reserved Date**: April 29, 2025 at 00:20 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2748
- **State**: PUBLISHED
- **Published Date**: April 10, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002)
2. [57741](http://secunia.com/advisories/57741)
3. [](https://service.sap.com/sap/support/notes/1926485)
4. [sap-ehp-log-sec-bypass(92334)](https://exchange.xforce.ibmcloud.com/vulnerabilities/92334)
5. [](http://www.onapsis.com/research-advisories.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17240
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7628
- **State**: PUBLISHED
- **Published Date**: October 14, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 01, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [77063](http://www.securityfocus.com/bid/77063)
2. [RHSA-2015:2024](http://rhn.redhat.com/errata/RHSA-2015-2024.html)
3. [openSUSE-SU-2015:1744](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html)
4. [SUSE-SU-2015:1742](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html)
5. [JVNDB-2015-005234](http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-005234.html)
6. [RHSA-2015:1893](http://rhn.redhat.com/errata/RHSA-2015-1893.html)
7. [GLSA-201511-02](https://security.gentoo.org/glsa/201511-02)
8. [1033797](http://www.securitytracker.com/id/1033797)
9. [](https://helpx.adobe.com/security/products/flash-player/apsb15-25.html)
10. [SUSE-SU-2015:1740](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html)
11. [openSUSE-SU-2015:1781](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html)
12. [JVN#22533124](http://jvn.jp/en/jp/JVN22533124/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8588
- **State**: PUBLISHED
- **Published Date**: April 28, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 10, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The hotfix_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via shell metacharacters in the file name of an uploaded file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/142220/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-hotfix_upload.cgi-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42043
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:12 UTC
- **Last Updated**: August 02, 2024 at 19:16 UTC
- **Reserved Date**: September 06, 2023 at 21:13 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor PDF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20887.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 9.5.368.0 (Status: affected)
### References
1. [ZDI-23-1370](https://www.zerodayinitiative.com/advisories/ZDI-23-1370/)
2. [vendor-provided URL](https://www.tracker-software.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12197
- **State**: PUBLISHED
- **Published Date**: December 17, 2024 at 15:21 UTC
- **Last Updated**: February 10, 2025 at 20:34 UTC
- **Reserved Date**: December 04, 2024 at 17:05 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Autodesk - Navisworks Freedom**
Affected versions:
- 2025 (Status: affected)
**Autodesk - Navisworks Simulate**
Affected versions:
- 2025 (Status: affected)
**Autodesk - Navisworks Manage**
Affected versions:
- 2025 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0027) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34564
- **State**: PUBLISHED
- **Published Date**: August 31, 2021 at 10:32 UTC
- **Last Updated**: September 17, 2024 at 02:27 UTC
- **Reserved Date**: June 10, 2021 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-315: Security Weakness
### Affected Products
**Phoenix Contact - WHA-GW-F2D2-0-AS- Z2-ETH**
Affected versions:
- 3.0.9 (Status: affected)
**Phoenix Contact - WHA-GW-F2D2-0-AS- Z2-ETH.EIP**
Affected versions:
- 3.0.9 (Status: affected)
### References
1. [](https://cert.vde.com/en-us/advisories/vde-2021-027)
### Credits
- Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8310
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: April 28, 2017 at 00:00 UTC
- **Assigned By**: checkpoint
### Vulnerability Description
Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file.
### Affected Products
**VideoLAN - VLC**
Affected versions:
- 2.2.* (Status: affected)
### References
1. [GLSA-201707-10](https://security.gentoo.org/glsa/201707-10)
2. [98638](http://www.securityfocus.com/bid/98638)
3. [](http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29)
4. [DSA-3899](http://www.debian.org/security/2017/dsa-3899) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3192
- **State**: PUBLISHED
- **Published Date**: June 11, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 17:04 UTC
- **Reserved Date**: June 11, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Session Fixation in GitHub repository froxlor/froxlor prior to 2.1.0.
### Weakness Classification (CWE)
- CWE-384: Security Weakness
### Affected Products
**froxlor - froxlor/froxlor**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551)
2. [](https://github.com/froxlor/froxlor/commit/94d9c3eedf31bc8447e3aa349e32880dde02ee52) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43032
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 00:00 UTC
- **Last Updated**: August 23, 2024 at 17:50 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
autMan v2.9.6 allows attackers to bypass authentication via a crafted web request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hdbjlizhe/fanli/releases/tag/2.9.6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0775
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0378
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
readline prior to 4.1, in OpenBSD 2.8 and earlier, creates history files with insecure permissions, which allows a local attacker to recover potentially sensitive information via readline history files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch)
2. [5680](http://www.osvdb.org/5680)
3. [bsd-readline-permissions(6586)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6586) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1452
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19990205 Alert: MS releases GINA-fix for SP3, SP4, and TS](http://marc.info/?l=ntbugtraq&m=91822011021558&w=2)
2. [19990129 ole objects in a "secured" environment?](http://marc.info/?l=bugtraq&m=91788829326419&w=2)
3. [19990129 ole objects in a "secured" environment?](http://marc.info/?l=ntbugtraq&m=91764169410814&w=2)
4. [198](http://www.securityfocus.com/bid/198)
5. [nt-gina-clipboard(1975)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1975)
6. [Q214802](http://support.microsoft.com/support/kb/articles/q214/8/02.asp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27272
- **State**: PUBLISHED
- **Published Date**: February 24, 2025 at 14:48 UTC
- **Last Updated**: February 24, 2025 at 16:40 UTC
- **Reserved Date**: February 21, 2025 at 16:44 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in vinagecko VG PostCarousel allows PHP Local File Inclusion. This issue affects VG PostCarousel: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**vinagecko - VG PostCarousel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/vg-postcarousel/vulnerability/wordpress-vg-postcarousel-plugin-1-1-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5615
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: July 22, 2015 at 00:00 UTC
- **Assigned By**: larry_cashdollar
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46802
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 16:07 UTC
- **Last Updated**: September 04, 2024 at 19:04 UTC
- **Reserved Date**: December 08, 2022 at 09:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Formula Elements in a CSV File vulnerability in WebToffee Product Reviews Import Export for WooCommerce.This issue affects Product Reviews Import Export for WooCommerce: from n/a through 1.4.8.
### Weakness Classification (CWE)
- CWE-1236: Security Weakness
### Affected Products
**WebToffee - Product Reviews Import Export for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/product-reviews-import-export-for-woocommerce/wordpress-product-reviews-import-export-for-woocommerce-plugin-1-4-8-unauth-csv-injection-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1737
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 20:41 UTC
- **Last Updated**: April 16, 2025 at 16:15 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Pyramid Solutions' affected products, the Developer and DLL kits for EtherNet/IP Adapter and EtherNet/IP Scanner, are vulnerable to an out-of-bounds write, which may allow an unauthorized attacker to send a specially crafted packet that may result in a denial-of-service condition.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Pyramid Solutions - EtherNet/IP Adapter Development Kit (EADK)**
Affected versions:
- all (Status: affected)
**Pyramid Solutions - EtherNet/IP Adapter DLL Kit (EIPA)**
Affected versions:
- all (Status: affected)
**Pyramid Solutions - EtherNet/IP Scanner Development Kit (EDKS)**
Affected versions:
- all 4.4.0 (Status: affected)
**Pyramid Solutions - EtherNet/IP Scanner DLL Kit (EIPS)**
Affected versions:
- all 4.4.0 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-04)
### Credits
- Weidmueller reported this vulnerability to CERT@VDE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18062
- **State**: PUBLISHED
- **Published Date**: October 10, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 11:01 UTC
- **Reserved Date**: October 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in dialog.php in tecrail Responsive FileManager 9.8.1. A reflected XSS vulnerability allows remote attackers to inject arbitrary web script or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20181009 Responsive Filemanager 9.8.1 Reflected Cross Site Scripting (XSS)](https://seclists.org/bugtraq/2018/Oct/26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2310
- **State**: PUBLISHED
- **Published Date**: October 26, 2007 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:10 UTC
- **Reserved Date**: October 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ClickCartPro 4.0 stores the admin_user.db data file under the web document root with insufficient access control on servers other than Apache, which allows remote attackers to obtain usernames and passwords.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [clickcartpro-unauth-database-access-access(9648)](http://www.iss.net/security_center/static/9648.php)
2. [1004825](http://securitytracker.com/id?1004825)
3. [](http://www.securiteam.com/securitynews/5DP0T0K7PY.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3623
- **State**: PUBLISHED
- **Published Date**: November 17, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:45 UTC
- **Reserved Date**: August 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in CoreGraphics in Apple Safari before 3.2 on Windows, in iPhone OS 1.0 through 2.2.1, and in iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted image, related to improper handling of color spaces.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT3639)
2. [APPLE-SA-2008-11-13](http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html)
3. [ADV-2009-1621](http://www.vupen.com/english/advisories/2009/1621)
4. [ADV-2008-3444](http://www.vupen.com/english/advisories/2008/3444)
5. [TA08-350A](http://www.us-cert.gov/cas/techalerts/TA08-350A.html)
6. [33179](http://secunia.com/advisories/33179)
7. [1021225](http://www.securitytracker.com/id?1021225)
8. [APPLE-SA-2009-06-17-1](http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html)
9. [32706](http://secunia.com/advisories/32706)
10. [32291](http://www.securityfocus.com/bid/32291)
11. [](http://support.apple.com/kb/HT3338)
12. [](http://support.apple.com/kb/HT3298)
13. [APPLE-SA-2008-12-15](http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43459
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 15:01 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the (1) domain and (2) path parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/49254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36132
- **State**: PUBLISHED
- **Published Date**: August 07, 2024 at 03:54 UTC
- **Last Updated**: March 19, 2025 at 20:07 UTC
- **Reserved Date**: May 21, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Insufficient verification of authentication controls in EPMM prior to 12.1.0.1 allows a remote attacker to bypass authentication and access sensitive resources.
### Affected Products
**Ivanti - EPMM**
Affected versions:
- 12.1.0.1 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30686
- **State**: PUBLISHED
- **Published Date**: August 10, 2023 at 01:18 UTC
- **Last Updated**: October 10, 2024 at 17:24 UTC
- **Reserved Date**: April 14, 2023 at 01:59 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Out-of-bounds Write in ReqDataRaw of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Aug-2023 Release 1 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1899
- **State**: PUBLISHED
- **Published Date**: July 09, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in myWebland myBloggie 2.1.6 allow remote attackers to execute arbitrary SQL commands via (1) the user_id parameter in a viewuser action to index.php, and allow remote authenticated administrators to execute arbitrary SQL commands via (2) the post_id parameter in an edit action to admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30892](http://secunia.com/advisories/30892)
2. [5975](https://www.exploit-db.com/exploits/5975)
3. [](http://descriptions.securescout.com/tc/17969)
4. [](http://www.netvigilance.com/advisory0040) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33902
- **State**: PUBLISHED
- **Published Date**: February 16, 2023 at 19:59 UTC
- **Last Updated**: January 27, 2025 at 18:22 UTC
- **Reserved Date**: June 18, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - Intel(R) Quartus Prime Pro and Standard edition software**
Affected versions:
- See references (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2185
- **State**: PUBLISHED
- **Published Date**: May 02, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: January 29, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2971-2](http://www.ubuntu.com/usn/USN-2971-2)
2. [SUSE-SU-2016:1690](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html)
3. [84341](http://www.securityfocus.com/bid/84341)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1283363)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1317014)
6. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d)
7. [SUSE-SU-2016:1696](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html)
8. [USN-2970-1](http://www.ubuntu.com/usn/USN-2970-1)
9. [](https://bugzilla.redhat.com/show_bug.cgi?id=1283362)
10. [20160310 oss-2016-18: Multiple Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver)](http://seclists.org/bugtraq/2016/Mar/90)
11. [USN-2969-1](http://www.ubuntu.com/usn/USN-2969-1)
12. [USN-2968-1](http://www.ubuntu.com/usn/USN-2968-1)
13. [USN-2971-3](http://www.ubuntu.com/usn/USN-2971-3)
14. [USN-2997-1](http://www.ubuntu.com/usn/USN-2997-1)
15. [SUSE-SU-2016:1764](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html)
16. [DSA-3607](http://www.debian.org/security/2016/dsa-3607)
17. [USN-2971-1](http://www.ubuntu.com/usn/USN-2971-1)
18. [SUSE-SU-2016:1707](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html)
19. [USN-2996-1](http://www.ubuntu.com/usn/USN-2996-1)
20. [SUSE-SU-2016:1672](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html)
21. [USN-2968-2](http://www.ubuntu.com/usn/USN-2968-2)
22. [openSUSE-SU-2016:1382](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html)
23. [SUSE-SU-2016:2074](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html)
24. [](https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d)
25. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1)
26. [20160315 Re: oss-2016-18: Multiple Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver)](http://seclists.org/bugtraq/2016/Mar/116) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27619
- **State**: PUBLISHED
- **Published Date**: October 22, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.python.org/issue41944)
2. [](https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8)
3. [](https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794)
4. [](https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33)
5. [](https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9)
6. [](https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b)
7. [[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar](https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E)
8. [FEDORA-2021-98720f3785](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/)
9. [FEDORA-2021-12df7f7382](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/)
10. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E)
11. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E)
12. [](https://www.oracle.com/security-alerts/cpujul2022.html)
13. [](https://security.netapp.com/advisory/ntap-20201123-0004/)
14. [GLSA-202402-04](https://security.gentoo.org/glsa/202402-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37143
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 16:34 UTC
- **Reserved Date**: June 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function BackwardPass::IsEmptyLoopAfterMemOp().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chakra-core/ChakraCore/issues/6888) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1086
- **State**: PUBLISHED
- **Published Date**: March 25, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 25, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35013](http://secunia.com/advisories/35013)
2. [[oss-security] 20090324 CVE id request: ldns](http://www.openwall.com/lists/oss-security/2009/03/24/4)
3. [34233](http://www.securityfocus.com/bid/34233)
4. [](http://www.nlnetlabs.nl/svn/ldns/tags/release-1.5.0/Changelog)
5. [35065](http://secunia.com/advisories/35065)
6. [](http://www.nlnetlabs.nl/bugs/show_bug.cgi?id=232)
7. [SUSE-SR:2009:010](http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html)
8. [DSA-1795](http://www.debian.org/security/2009/dsa-1795) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25624
- **State**: PUBLISHED
- **Published Date**: November 30, 2020 at 06:28 UTC
- **Last Updated**: August 04, 2024 at 15:40 UTC
- **Reserved Date**: September 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05492.html)
2. [](https://security.netapp.com/advisory/ntap-20201210-0005/)
3. [[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update](https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5640
- **State**: PUBLISHED
- **Published Date**: August 03, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:07 UTC
- **Reserved Date**: June 16, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Directory traversal vulnerability in cgi-bin/rftest.cgi on Crestron AirMedia AM-100 devices with firmware before 1.4.0.13 allows remote attackers to execute arbitrary commands via a .. (dot dot) in the ATE_COMMAND parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2016-05-002.md)
2. [92216](http://www.securityfocus.com/bid/92216)
3. [VU#603047](http://www.kb.cert.org/vuls/id/603047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1762
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:57 UTC
- **Last Updated**: August 03, 2024 at 16:18 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212147)
2. [](https://support.apple.com/en-us/HT212146) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32973
- **State**: PUBLISHED
- **Published Date**: April 30, 2025 at 14:55 UTC
- **Last Updated**: April 30, 2025 at 15:15 UTC
- **Reserved Date**: April 14, 2025 at 21:47 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, when a user with programming rights edits a document in XWiki that was last edited by a user without programming rights and contains an XWiki.ComponentClass, there is no warning that this will grant programming rights to this object. An attacker who created such a malicious object could use this to gain programming rights on the wiki. For this, the attacker needs to have edit rights on at least one page to place this object and then get an admin user to edit that document. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 15.9-rc-1, < 15.10.12 (Status: affected)
- >= 16.0.0-rc-1, < 16.4.3 (Status: affected)
- >= 16.5.0-rc-1, < 16.8.0-rc-1 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x7wv-5qg4-vmr6](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x7wv-5qg4-vmr6)
2. [https://github.com/xwiki/xwiki-platform/commit/1a6f1b2e050770331c9a63d12a3fd8a36d199f62](https://github.com/xwiki/xwiki-platform/commit/1a6f1b2e050770331c9a63d12a3fd8a36d199f62)
3. [https://jira.xwiki.org/browse/XWIKI-22460](https://jira.xwiki.org/browse/XWIKI-22460) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0720
- **State**: PUBLISHED
- **Published Date**: August 09, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 01:41 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37430213.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 5.0.2 (Status: affected)
- 5.1.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
### References
1. [100204](http://www.securityfocus.com/bid/100204)
2. [](https://source.android.com/security/bulletin/2017-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17397
- **State**: PUBLISHED
- **Published Date**: September 28, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 10:47 UTC
- **Reserved Date**: September 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection exists in the AlphaIndex Dictionaries 1.0 component for Joomla! via the letter parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45476](https://www.exploit-db.com/exploits/45476/)
2. [](http://packetstormsecurity.com/files/149532/Joomla-AlphaIndex-Dictionaries-1.0-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4602
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 18:10 UTC
- **Last Updated**: September 17, 2024 at 03:49 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Guardium Insights 2.0.2 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184836.
### Affected Products
**IBM - Security Guardium Insights**
Affected versions:
- 2.0.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6403463)
2. [ibm-guardium-cve20204602-info-disc (184836)](https://exchange.xforce.ibmcloud.com/vulnerabilities/184836) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41464
- **State**: PUBLISHED
- **Published Date**: October 01, 2021 at 15:42 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/concrete5/concrete5-legacy/issues/2006)
2. [](https://github.com/concrete5/concrete5-legacy) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15292
- **State**: PUBLISHED
- **Published Date**: December 17, 2020 at 16:45 UTC
- **Last Updated**: September 16, 2024 at 18:19 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: Bitdefender
### Vulnerability Description
Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Bitdefender - Hypervisor Introspection**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.bitdefender.com/support/security-advisories/lack-validation-data-read-guest-memory-bitdefender-hvi-va-9333/)
### Credits
- Ilja Van Sprundel from IOActive |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51395
- **State**: PUBLISHED
- **Published Date**: March 07, 2024 at 04:50 UTC
- **Last Updated**: September 25, 2024 at 16:03 UTC
- **Reserved Date**: December 18, 2023 at 20:56 UTC
- **Assigned By**: Silabs
### Vulnerability Description
The vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
- CWE-125: Out-of-bounds Read
### Affected Products
**Silicon Labs - Z-Wave SDK**
Affected versions:
- 7.20.0 (Status: unaffected)
- 7.19.3 (Status: unaffected)
- 7.18.8 (Status: unaffected)
- 7.17.5 (Status: unaffected)
### References
1. [](https://community.silabs.com/068Vm0000029Xq5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3688
- **State**: PUBLISHED
- **Published Date**: July 10, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 04:50 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Unquoted service paths in Intel Quartus Prime Programmer and Tools in versions 15.1 - 18.0 allow a local attacker to potentially execute arbitrary code.
### Affected Products
**Intel Corporation - Intel Quartus Prime Programmer and Tools**
Affected versions:
- 15.1 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00151.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15301
- **State**: PUBLISHED
- **Published Date**: September 18, 2019 at 20:59 UTC
- **Last Updated**: August 05, 2024 at 00:42 UTC
- **Reserved Date**: August 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in the method Terrasoft.Core.DB.Column.Const() in Terrasoft Bpm'online CRM-System SDK 7.13 allows attackers to execute arbitrary SQL commands via the value parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40sorokinpf/bpmonline-sql-injection-607916447e30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6170
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 23, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
A bad cast in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html)
2. [RHSA-2018:2282](https://access.redhat.com/errata/RHSA-2018:2282)
3. [GLSA-201808-01](https://security.gentoo.org/glsa/201808-01)
4. [DSA-4256](https://www.debian.org/security/2018/dsa-4256)
5. [](https://crbug.com/862059)
6. [104887](http://www.securityfocus.com/bid/104887) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3561
- **State**: PUBLISHED
- **Published Date**: April 14, 2025 at 10:00 UTC
- **Last Updated**: April 14, 2025 at 12:15 UTC
- **Reserved Date**: April 13, 2025 at 22:36 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in ghostxbh uzy-ssm-mall 1.0.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-862: Missing Authorization
### Affected Products
**ghostxbh - uzy-ssm-mall**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [VDB-304602 | ghostxbh uzy-ssm-mall cross-site request forgery](https://vuldb.com/?id.304602)
2. [VDB-304602 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.304602)
3. [Submit #549268 | ghostxbh uzy-ssm-mall v1.0.0 CSRF](https://vuldb.com/?submit.549268)
4. [](https://wiki.shikangsi.com/post/share/4ccab5f6-4f54-4bac-b0fc-a436884432ff)
### Credits
- XingYue_Mstir (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3010
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: September 30, 2024 at 17:06 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Solaris Operating System**
Affected versions:
- 11 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
2. [20191018 CVE-2019-3010 - Local privilege escalation on Solaris 11.x via xscreensaver](http://seclists.org/fulldisclosure/2019/Oct/39)
3. [](http://packetstormsecurity.com/files/154960/Solaris-xscreensaver-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6401
- **State**: PUBLISHED
- **Published Date**: September 16, 2024 at 14:55 UTC
- **Last Updated**: September 16, 2024 at 15:19 UTC
- **Reserved Date**: June 28, 2024 at 12:02 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SFS Consulting InsureE GL allows SQL Injection.This issue affects InsureE GL: before 4.6.2.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SFS Consulting - InsureE GL**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-1475)
### Credits
- Yağız KOÇER
- Secure Future Inc. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.