System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5910
- **State**: PUBLISHED
- **Published Date**: July 02, 2020 at 12:25 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
### Affected Products
**n/a - NGINX Controller**
Affected versions:
- 3.0.0-3.5.0, 2.0.0-2.9.0, 1.0.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K59209532) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1832
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0870
- **State**: PUBLISHED
- **Published Date**: October 22, 2021 at 13:27 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262
### Affected Products
**n/a - Android**
Affected versions:
- Android-9 Android-10 Android-11 Android-8.1 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-10-01)
2. [](http://packetstormsecurity.com/files/164704/Android-NFC-Type-Confusion.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4952
- **State**: PUBLISHED
- **Published Date**: September 02, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 23, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3047-1](http://www.ubuntu.com/usn/USN-3047-1)
2. [[oss-security] 20160523 CVE request: Qemu: scsi: pvscsi: out-of-bounds access issue in pvsci_ring_init_msg/data routines](http://www.openwall.com/lists/oss-security/2016/05/23/1)
3. [[oss-security] 20160523 Re: CVE request: Qemu: scsi: pvscsi: out-of-bounds access issue in pvsci_ring_init_msg/data routines](http://www.openwall.com/lists/oss-security/2016/05/23/4)
4. [[qemu-devel] 20160523 [Qemu-devel] [PATCH] scsi: pvscsi: check command descriptor ring buffer](https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03774.html)
5. [USN-3047-2](http://www.ubuntu.com/usn/USN-3047-2)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1334384)
7. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31994
- **State**: PUBLISHED
- **Published Date**: May 23, 2023 at 00:00 UTC
- **Last Updated**: January 17, 2025 at 16:42 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain Hanwha products are vulnerable to Denial of Service (DoS). ck vector is: When an empty UDP packet is sent to the listening service, the service thread results in a non-functional service (DoS) via WS Discovery and Hanwha proprietary discovery services. This affects IP Camera ANE-L7012R 1.41.01 and IP Camera XNV-9082R 2.10.02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf)
2. [](https://hanwhavisionamerica.com/download/50042/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0113
- **State**: PUBLISHED
- **Published Date**: January 07, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Enhanced Simple PHP Gallery 1.7 allows remote attackers to obtain the full path of the application via a direct request to sp_helper_functions.php, which leaks the pathname in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18310](http://secunia.com/advisories/18310)
2. [22417](http://www.osvdb.org/22417)
3. [](http://osvdb.org/ref/22/22201-espg.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2931
- **State**: PUBLISHED
- **Published Date**: July 09, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: June 30, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-1630](http://www.debian.org/security/2008/dsa-1630)
2. [linux-kernel-dochangetype-priv-escalation(43696)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43696)
3. [RHSA-2008:0885](http://www.redhat.com/support/errata/RHSA-2008-0885.html)
4. [SUSE-SA:2008:038](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html)
5. [USN-637-1](https://usn.ubuntu.com/637-1/)
6. [oval:org.mitre.oval:def:10437](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10437)
7. [SUSE-SA:2008:035](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html)
8. [31614](http://secunia.com/advisories/31614)
9. [30982](http://secunia.com/advisories/30982)
10. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=ee6f958291e2a768fd727e7a67badfff0b67711a)
11. [[oss-security] 20080708 Re: CVE-2008-2931 kernel: missing check before setting mount propagation](http://www.openwall.com/lists/oss-security/2008/07/08/4)
12. [31551](http://secunia.com/advisories/31551)
13. [30126](http://www.securityfocus.com/bid/30126)
14. [32023](http://secunia.com/advisories/32023)
15. [](https://bugzilla.redhat.com/show_bug.cgi?id=454388)
16. [32759](http://secunia.com/advisories/32759)
17. [](http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22)
18. [[oss-security] 20080708 CVE-2008-2931 kernel: missing check before setting mount propagation](http://www.openwall.com/lists/oss-security/2008/07/08/3)
19. [SUSE-SA:2008:049](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html)
20. [SUSE-SR:2008:025](http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12557
- **State**: REJECTED
- **Last Updated**: December 30, 2022 at 00:00 UTC
- **Reserved Date**: April 30, 2020 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32610
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 19:14 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In vcu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203476; Issue ID: ALPS07203476.
### Affected Products
**MediaTek, Inc. - MT6762, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8185, MT8365, MT8696, MT8768, MT8786, MT8789, MT8791, MT8797, MT8798**
Affected versions:
- Android 11.0, 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/November-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20177
- **State**: PUBLISHED
- **Published Date**: May 26, 2021 at 20:48 UTC
- **Last Updated**: August 03, 2024 at 17:30 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.5-rc1 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1914719) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0386
- **State**: PUBLISHED
- **Published Date**: March 29, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The SSHv2 implementation in Cisco IOS 12.2, 12.4, 15.0, 15.1, and 15.2 and IOS XE 2.3.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.2S allows remote attackers to cause a denial of service (device reload) via a crafted username in a reverse SSH login attempt, aka Bug ID CSCtr49064.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1026866](http://www.securitytracker.com/id?1026866)
2. [48609](http://secunia.com/advisories/48609)
3. [48641](http://secunia.com/advisories/48641)
4. [80695](http://osvdb.org/80695)
5. [52752](http://www.securityfocus.com/bid/52752)
6. [20120328 Cisco IOS Software Reverse SSH Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ssh)
7. [ciscoios-sshv2-dos(74404)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74404) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6071
- **State**: PUBLISHED
- **Published Date**: February 06, 2009 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the DecodeImage function in coders/pict.c in GraphicsMagick before 1.1.14, and 1.2.x before 1.2.3, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted PICT image. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=604837)
2. [30549](http://secunia.com/advisories/30549)
3. [29583](http://www.securityfocus.com/bid/29583)
4. [](http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485)
5. [](http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/pict.c)
6. [graphicsmagick-decodeimage-bo(42906)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42906)
7. [](http://sourceforge.net/project/shownotes.php?release_id=604785) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3111
- **State**: PUBLISHED
- **Published Date**: September 09, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36263](http://www.securityfocus.com/bid/36263)
2. [SUSE-SR:2009:018](http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html)
3. [](http://github.com/alandekok/freeradius-server/commit/860cad9e02ba344edb0038419e415fe05a9a01f4)
4. [[freeradius-users] 20090909 Version 1.1.8 has been released](https://lists.freeradius.org/pipermail/freeradius-users/2009-September/msg00242.html)
5. [36509](http://secunia.com/advisories/36509)
6. [oval:org.mitre.oval:def:9919](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9919)
7. [](http://intevydis.com/vd-list.shtml)
8. [ADV-2009-3184](http://www.vupen.com/english/advisories/2009/3184)
9. [SUSE-SR:2009:016](http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html)
10. [APPLE-SA-2009-11-09-1](http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html)
11. [[oss-security] 20090909 CVE Request -- FreeRADIUS 1.1.8](http://www.openwall.com/lists/oss-security/2009/09/09/1)
12. [RHSA-2009:1451](http://www.redhat.com/support/errata/RHSA-2009-1451.html)
13. [](http://support.apple.com/kb/HT3937) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1933
- **State**: PUBLISHED
- **Published Date**: April 10, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in PcP-Guestbook (PcP-Book) 3.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to (1) index.php, (2) gb.php, or (3) faq.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38460](http://osvdb.org/38460)
2. [pcpguestbook-lang-file-include(33491)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33491)
3. [38461](http://osvdb.org/38461)
4. [3689](https://www.exploit-db.com/exploits/3689)
5. [38459](http://osvdb.org/38459) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4853
- **State**: PUBLISHED
- **Published Date**: September 19, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in kategorix.asp in Haberx 1.02 through 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter in kategorihaberx.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [haberx-kategori-sql-injection(28988)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28988)
2. [20038](http://www.securityfocus.com/bid/20038)
3. [21960](http://secunia.com/advisories/21960)
4. [2371](https://www.exploit-db.com/exploits/2371)
5. [](http://packetstorm.linuxsecurity.com/0609-exploits/haberx.txt)
6. [ADV-2006-3661](http://www.vupen.com/english/advisories/2006/3661) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24837
- **State**: PUBLISHED
- **Published Date**: January 23, 2023 at 14:31 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 15:03 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Passster WordPress plugin before 3.5.5.8 does not escape the area parameter of its shortcode, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Passster**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5fea3ac3-d599-41f3-8f76-08f0d3552af1)
### Credits
- apple502j
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8477
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 05, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Redmine before 2.6.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving flash message rendering.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.redmine.org/projects/redmine/repository/entry/tags/2.6.2/doc/CHANGELOG)
2. [[oss-security] 20151205 Re: CVE request: Redmine: cross-site scripting vulnerability fixed in 3.0.0 and 2.6.2](http://www.openwall.com/lists/oss-security/2015/12/05/8)
3. [[oss-security] 20151205 Re: CVE request: Redmine: cross-site scripting vulnerability fixed in 3.0.0 and 2.6.2](http://www.openwall.com/lists/oss-security/2015/12/05/7)
4. [](http://www.redmine.org/projects/redmine/wiki/Security_Advisories)
5. [](https://www.redmine.org/issues/19117) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3789
- **State**: PUBLISHED
- **Published Date**: August 27, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 09:53 UTC
- **Reserved Date**: August 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073)
2. [30837](http://www.securityfocus.com/bid/30837)
3. [31601](http://secunia.com/advisories/31601)
4. [1020770](http://www.securitytracker.com/id?1020770)
5. [samba-groupmapping-security-bypass(44678)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44678)
6. [ADV-2008-2440](http://www.vupen.com/english/advisories/2008/2440)
7. [](http://samba.org/samba/security/CVE-2008-3789.html)
8. [[oss-security] 20080826 CVE Request (samba)](http://www.openwall.com/lists/oss-security/2008/08/26/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6795
- **State**: PUBLISHED
- **Published Date**: March 02, 2020 at 04:05 UTC
- **Last Updated**: August 04, 2024 at 09:11 UTC
- **Reserved Date**: January 10, 2020 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When processing a message that contains multiple S/MIME signatures, a bug in the MIME processing code caused a null pointer dereference, leading to an unexploitable crash. This vulnerability affects Thunderbird < 68.5.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2020-07/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1611105)
3. [GLSA-202003-10](https://security.gentoo.org/glsa/202003-10)
4. [USN-4328-1](https://usn.ubuntu.com/4328-1/)
5. [USN-4335-1](https://usn.ubuntu.com/4335-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32711
- **State**: PUBLISHED
- **Published Date**: June 01, 2023 at 16:34 UTC
- **Last Updated**: February 28, 2025 at 11:03 UTC
- **Reserved Date**: May 11, 2023 at 20:55 UTC
- **Assigned By**: Splunk
### Vulnerability Description
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Splunk - Splunk Enterprise**
Affected versions:
- 8.1 (Status: affected)
- 8.2 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://advisory.splunk.com/advisories/SVD-2023-0605)
2. [](https://research.splunk.com/application/8a43558f-a53c-4ee4-86c1-30b1e8ef3606/)
### Credits
- Danylo Dmytriiev (DDV_UA) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0287
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
pforum 1.14 and earlier does not explicitly enable PHP magic quotes, which allows remote attackers to bypass authentication and gain administrator privileges via an SQL injection attack when the PHP server is not configured to use magic quotes by default.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020216 pforum: mysql-injection-bug](http://marc.info/?l=bugtraq&m=101389284625019&w=2)
2. [pforum-quotes-sql-injection(8203)](http://www.iss.net/security_center/static/8203.php)
3. [](http://www.powie.de/news/index.php)
4. [4114](http://www.securityfocus.com/bid/4114) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49595
- **State**: PUBLISHED
- **Published Date**: November 26, 2024 at 02:46 UTC
- **Last Updated**: November 26, 2024 at 15:08 UTC
- **Reserved Date**: October 17, 2024 at 05:03 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Wyse Management Suite, version WMS 4.4 and before, contain an Authentication Bypass by Capture-replay vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-294: Security Weakness
### Affected Products
**Dell - Wyse Management Suite**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000244453/dsa-2024-440)
### Credits
- Dell Technologies would like to thank Harm Blankers, Jasper Westerman, Yanick de Pater of REQON B.V. for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1050
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka 'Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability'. This CVE ID is unique from CVE-2020-1049.
### Affected Products
**Microsoft - Dynamics 365 Server, version 9.0 (on-premises)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1050) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39706
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:04 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onResume of CredentialStorage.java, there is a possible way to cleanup content of credentials storage due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-200164168
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4130
- **State**: PUBLISHED
- **Published Date**: December 18, 2021 at 04:40 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: December 17, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**snipe - snipe/snipe-it**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e)
2. [](https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0012
- **State**: PUBLISHED
- **Published Date**: January 13, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Microsoft Office ASLR Bypass."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-004](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-004)
2. [1034651](http://www.securitytracker.com/id/1034651) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2830
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:15 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [GLSA-201805-08](https://security.gentoo.org/glsa/201805-08)
2. [103856](http://www.securityfocus.com/bid/103856)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
4. [1040707](http://www.securitytracker.com/id/1040707) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7950
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 21:35 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An access control bypass vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An unauthenticated user can bypass access controls via REST API calls to assign themselves to an arbitrary company, thereby gaining read access to potentially confidental information.
### Affected Products
**n/a - Magento 2**
Affected versions:
- Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 (Status: affected)
### References
1. [](https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1998
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10553
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Multiple Read overflows due to improper length checks while decoding authentication in Cs domain/RAU Reject and TC cmd in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2084
- **State**: PUBLISHED
- **Published Date**: April 29, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in FarsiNews 2.5.3 Pro and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) month and (2) year parameters in (a) index.php, and the (3) mod parameter in (b) admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [812](http://securityreason.com/securityalert/812)
2. [](http://www.aria-security.net/advisory/farsinews/farsinews0420062.txt)
3. [farsinews-index-admin-xss(26097)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26097)
4. [17701](http://www.securityfocus.com/bid/17701)
5. [20060426 XXS Attack On FarsiNews](http://www.securityfocus.com/archive/1/432109/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52273
- **State**: PUBLISHED
- **Published Date**: December 04, 2024 at 10:19 UTC
- **Last Updated**: December 04, 2024 at 21:03 UTC
- **Reserved Date**: November 06, 2024 at 08:35 UTC
- **Assigned By**: VULSec
### Vulnerability Description
Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Shenzhen Tenda Technology Co - Tenda AC6V2**
Affected versions:
- 0 (Status: affected)
- 15.03.06.51 (Status: unaffected)
### References
1. [](https://www.vulsec.org/advisories)
### Credits
- Ba1100n |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3253, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3253
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 11:00 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 03, 2024 at 05:17 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in SourceCodester Internship Portal Management System 1.0. This vulnerability affects unknown code of the file admin/add_admin.php. The manipulation of the argument name/username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259102 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Internship Portal Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-259102 | SourceCodester Internship Portal Management System add_admin.php sql injection](https://vuldb.com/?id.259102)
2. [VDB-259102 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259102)
3. [Submit #309214 | https://www.sourcecodester.com/ Internship Portal Management System 1.0 SQL Injection](https://vuldb.com/?submit.309214)
4. [](https://github.com/thisissuperann/Vul/blob/main/Internship-Portal-Management-System-03)
### Credits
- liuann (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7371, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7371
- **State**: PUBLISHED
- **Published Date**: December 11, 2019 at 14:04 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: April 21, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
node-connects before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370)
### Affected Products
**node-connect - node-connect**
Affected versions:
- < 2.8.2 (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting)
2. [](http://www.openwall.com/lists/oss-security/2014/05/13/1)
3. [](https://security-tracker.debian.org/tracker/CVE-2013-7371)
4. [](https://access.redhat.com/security/cve/cve-2013-7371)
5. [](http://www.openwall.com/lists/oss-security/2014/04/21/2)
6. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/92710) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6642
- **State**: PUBLISHED
- **Published Date**: July 01, 2019 at 20:21 UTC
- **Last Updated**: August 04, 2024 at 20:23 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In BIG-IP 15.0.0, 14.0.0-14.1.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.2, and 11.5.2-11.6.4, BIG-IQ 6.0.0-6.1.0 and 5.1.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, authenticated users with the ability to upload files (via scp, for example) can escalate their privileges to allow root shell access from within the TMOS Shell (tmsh) interface. The tmsh interface allows users to execute a secondary program via tools like sftp or scp.
### Affected Products
**F5 - BIG-IP, BIG-IQ, iWorkflow, Enterprise Manager**
Affected versions:
- BIG-IP 15.0.0 (Status: affected)
- 14.0.0-14.1.0.5 (Status: affected)
- 13.0.0-13.1.1.5 (Status: affected)
- 12.1.0-12.1.4.2 (Status: affected)
- 11.5.2-11.6.4 (Status: affected)
- BIG-IQ 6.0.0-6.1.0 (Status: affected)
- 5.1.0-5.4.0 (Status: affected)
- iWorkflow 2.3.0 (Status: affected)
- Enterprise Manager 3.1.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K40378764)
2. [](https://support.f5.com/csp/article/K40378764?utm_source=f5support&%3Butm_medium=RSS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2211
- **State**: PUBLISHED
- **Published Date**: November 22, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 19:47 UTC
- **Reserved Date**: April 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in phpgwapi/inc/common_functions_inc.php in eGroupware before 1.8.004.20120405 allows remote attackers to inject arbitrary web script or HTML via the menuaction parameter to etemplate/process_exec.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [48703](http://secunia.com/advisories/48703)
2. [](http://www.egroupware.org/changelog)
3. [](http://packetstormsecurity.org/files/111626/egroupware-xss.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3722
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 04:14 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
merge-deep node module before 3.0.1 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
### Weakness Classification (CWE)
- CWE-471: Security Weakness
### Affected Products
**HackerOne - merge-deep node module**
Affected versions:
- Versions before 3.0.1 (Status: affected)
### References
1. [](https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5)
2. [](https://hackerone.com/reports/310708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30787
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An integer underflow in fuse_lib_readdir enables arbitrary memory read operations in NTFS-3G through 2021.8.22 when using libfuse-lite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tuxera/ntfs-3g/releases)
2. [](https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58)
3. [[oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool](http://www.openwall.com/lists/oss-security/2022/06/07/4)
4. [DSA-5160](https://www.debian.org/security/2022/dsa-5160)
5. [FEDORA-2022-8f775872c9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JPX6OUCQKZX4PN5DQPVDUFZCOOZUX7Z/)
6. [FEDORA-2022-13bc8c91b0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECDCISL24TYH4CTDFCUVF24WAKRSYF7F/)
7. [[debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update](https://lists.debian.org/debian-lts-announce/2022/06/msg00017.html)
8. [FEDORA-2022-8fa7e5aeaf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAXFYIJWT5SHHRNPOJETM77EIMJ6ZP6I/)
9. [FEDORA-2022-1176b501f0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEXHDCUSLJD2HSPMAAVZ5AWMPUOG6UI7/)
10. [GLSA-202301-01](https://security.gentoo.org/glsa/202301-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15338
- **State**: PUBLISHED
- **Published Date**: June 26, 2020 at 15:00 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: June 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /cnr requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2020-03-09-zyxel-secumanager-0day-vulnerabilities.html)
2. [](https://www.zyxel.com/support/vulnerabilities-of-CloudCNM-SecuManager.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5741, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5741
- **State**: PUBLISHED
- **Published Date**: November 06, 2006 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in AirMagnet Enterprise before 7.5 build 6307 allow remote attackers to inject arbitrary web script or HTML via (1) the 404 error page of the Smart Sensor Edge Sensor; (2) the user name for a failed logon, when displayed in the audit journals reviewing interface (/AirMagnetSensor/AMSensor.dll/XH) by the Smart Sensor Edge Sensor log viewer; and (3) an SSID of an AP, when displayed on an ACL page (/Amom/Amom.dll/BD) of the Enterprise Server Status Overview in the Enterprise Server Web interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061018 Airmagnet management interfaces multiple vulnerabilities](http://www.securityfocus.com/archive/1/449119/100/200/threaded)
2. [29919](http://www.osvdb.org/29919)
3. [29918](http://www.osvdb.org/29918)
4. [29920](http://www.osvdb.org/29920)
5. [20602](http://www.securityfocus.com/bid/20602)
6. [20061025 Web-style Wireless IDS attacks](http://www.securityfocus.com/archive/1/449739/100/100/threaded)
7. [20061117 Re: Airmagnet management interfaces multiple vulnerabilities](http://www.securityfocus.com/archive/1/451978/100/100/threaded)
8. [22475](http://secunia.com/advisories/22475) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0621
- **State**: REJECTED
- **Published Date**: January 31, 2007 at 17:00 UTC
- **Last Updated**: February 03, 2007 at 10:00 UTC
- **Reserved Date**: January 31, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32872
- **State**: PUBLISHED
- **Published Date**: April 24, 2024 at 14:46 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 19, 2024 at 14:07 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Umbraco workflow provides workflows for the Umbraco content management system. Prior to versions 10.3.9, 12.2.6, and 13.0.6, an Umbraco Backoffice user can modify requests to a particular API endpoint to include SQL, which will be executed by the server. Umbraco Workflow versions 10.3.9, 12.2.6, 13.0.6, as well as Umbraco Plumber version 10.1.2, contain a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**umbraco - Umbraco.Workflow.Issues**
Affected versions:
- < 10.3.9 (Status: affected)
- >= 11.0.0-rc1, < 12.2.6 (Status: affected)
- >= 13.0.0-rc1, < 13.0.6 (Status: affected)
### References
1. [https://github.com/umbraco/Umbraco.Workflow.Issues/security/advisories/GHSA-287f-46j7-j4wh](https://github.com/umbraco/Umbraco.Workflow.Issues/security/advisories/GHSA-287f-46j7-j4wh) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17296
- **State**: PUBLISHED
- **Published Date**: October 07, 2019 at 15:05 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows SQL injection in the Contacts module by a Regular user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-023/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37042
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 19:37 UTC
- **Last Updated**: January 29, 2025 at 16:27 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories)
2. [](https://wiki.zimbra.com/wiki/Security_Center)
3. [](http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4596
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 15:31 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: May 07, 2024 at 05:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Kimai up to 2.15.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Session Handler. The manipulation of the argument PHPSESSIONID leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.16.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-263318 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Kimai**
Affected versions:
- 2.0 (Status: affected)
- 2.1 (Status: affected)
- 2.2 (Status: affected)
- 2.3 (Status: affected)
- 2.4 (Status: affected)
- 2.5 (Status: affected)
- 2.6 (Status: affected)
- 2.7 (Status: affected)
- 2.8 (Status: affected)
- 2.9 (Status: affected)
- 2.10 (Status: affected)
- 2.11 (Status: affected)
- 2.12 (Status: affected)
- 2.13 (Status: affected)
- 2.14 (Status: affected)
- 2.15 (Status: affected)
### References
1. [VDB-263318 | Kimai Session information disclosure](https://vuldb.com/?id.263318)
2. [VDB-263318 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263318)
3. [Submit #328639 | Kimai Kimai time tracker < 2.16.0 Insecure direct object references](https://vuldb.com/?submit.328639)
4. [](https://github.com/kimai/kimai/releases/tag/2.16.0)
### Credits
- DeepCove (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1187
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 18:13 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application.
The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1703**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Systems Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1187) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47972
- **State**: PUBLISHED
- **Published Date**: October 07, 2024 at 19:26 UTC
- **Last Updated**: December 11, 2024 at 19:15 UTC
- **Reserved Date**: October 07, 2024 at 18:03 UTC
- **Assigned By**: Solidigm
### Vulnerability Description
Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially control the performance of the resource.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Solidigm - D7-P5510**
Affected versions:
- JCV10300 (Status: unaffected)
**Solidigm - D5-P5316**
Affected versions:
- ACV10340 (Status: affected)
**Solidigm - D7-P5520**
Affected versions:
- 9CV10410 (Status: unaffected)
**Solidigm - D7-P5620**
Affected versions:
- 9CV10410 (Status: unaffected)
### References
1. [](https://www.solidigm.com/support-page/support-security.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26302
- **State**: PUBLISHED
- **Published Date**: February 22, 2023 at 22:02 UTC
- **Last Updated**: March 11, 2025 at 18:23 UTC
- **Reserved Date**: February 21, 2023 at 22:36 UTC
- **Assigned By**: canonical
### Vulnerability Description
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-173: Security Weakness
### Affected Products
**Executable Books - markdown-it-py**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/executablebooks/markdown-it-py/commit/53ca3e9c2b9e9b295f6abf7f4ad2730a9b70f68c)
### Credits
- Mark Esler
- Chris Sewell |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2649
- **State**: PUBLISHED
- **Published Date**: December 04, 2005 at 22:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: December 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Eudora 6.1.0.6 allows remote attackers to obfuscate URLs displayed in the status bar by inserting a large number of characters (e.g. spaces coded as " ") in the middle of the URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10305](http://www.securityfocus.com/bid/10305)
2. [eudora-url-spoofing(16105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16105)
3. [6009](http://www.osvdb.org/6009)
4. [20040508 Status bar exploit hides spoofed URLs Eudora, possibly other e-mail clients](http://archives.neohapsis.com/archives/bugtraq/2004-05/0066.html)
5. [11581](http://secunia.com/advisories/11581)
6. [](http://www.eudora.com/download/eudora/windows/6.1.2/RelNotes.txt)
7. [1010117](http://securitytracker.com/alerts/2004/May/1010117.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2244
- **State**: PUBLISHED
- **Published Date**: July 20, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 22:53 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Security Framework component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2; and Enterprise Manager Grid Control 10.1.0.6, 10.2.0.5, and 11.1.0.1; allows remote attackers to affect confidentiality and integrity via unknown vectors related to Authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20099
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 18:11 UTC
- **Last Updated**: April 15, 2025 at 14:12 UTC
- **Reserved Date**: June 25, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Analytics Stats Counter Statistics Plugin 1.2.2.5 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**unspecified - Analytics Stats Counter Statistics Plugin**
Affected versions:
- 1.2.2.5 (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Feb/74)
2. [](https://vuldb.com/?id.97367)
### Credits
- Yorick Koster |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42142
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: May 14, 2025 at 20:38 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Tours & Travels Management System v1.0 is vulnerable to Arbitrary code execution via ip/tour/admin/operations/update_settings.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xd201qaz/bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/RCE-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0674
- **State**: PUBLISHED
- **Published Date**: July 13, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: July 12, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Enterasys XSR-1800 series Security Routers, when running firmware 7.0.0.0 and using Policy-Based Routing, allow remote attackers to cause a denial of service (crash) via a packet with the IP record route option set.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10653](http://www.securityfocus.com/bid/10653)
2. [xsr-ip-record-dos(16616)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16616)
3. [20040702 Enterasys XSR Security Routers DoS](http://marc.info/?l=bugtraq&m=108886995627906&w=2)
4. [](http://www.enterasys.com/support/security/incidents/2004/07/11036.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0279
- **State**: PUBLISHED
- **Published Date**: March 07, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP Multifunction Peripheral (MFP) Digital Sending Software (DSS) 4.91.00 does not properly configure authentication settings of managed devices within device templates, which allows attackers to access these devices via actions that were intended to require authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBPI02640](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02738104)
2. [ADV-2011-0561](http://www.vupen.com/english/advisories/2011/0561)
3. [hp-mfpdigitalsending-sec-bypass(65866)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65866)
4. [1025155](http://www.securitytracker.com/id?1025155)
5. [SSRT100410](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02738104)
6. [43618](http://secunia.com/advisories/43618)
7. [46679](http://www.securityfocus.com/bid/46679) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27373
- **State**: PUBLISHED
- **Published Date**: June 05, 2024 at 18:40 UTC
- **Last Updated**: March 25, 2025 at 17:57 UTC
- **Reserved Date**: February 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on disc_attr->mesh_id_len coming from userspace, which can lead to a heap overwrite.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5319
- **State**: PUBLISHED
- **Published Date**: January 03, 2015 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 04:00 UTC
- **Reserved Date**: January 02, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Kandidat CMS 1.4.2 allow remote attackers to hijack the authentication of administrators for requests that (1) modify settings via a validate action to admin/settings.php, (2) modify pages via the what parameter to admin/edit.php, or (3) modify articles via the edit parameter to admin/news.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.htbridge.com/advisory/HTB22648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36458
- **State**: PUBLISHED
- **Published Date**: August 08, 2021 at 05:14 UTC
- **Last Updated**: August 04, 2024 at 17:30 UTC
- **Reserved Date**: August 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the lexer crate through 2020-11-10 for Rust. For ReaderResult<T, E>, there is an implementation of Sync with a trait bound of T: Send, E: Send.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0138.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lexer/RUSTSEC-2020-0138.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6890
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 10, 2015 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10484
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 01:32 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, and SDX20, if a RPMB listener is registered with a very small buffer size, the calculation of the maximum transfer size for read and write operations may underflow, resulting in buffer overflow.
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3038
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 11:11 UTC
- **Last Updated**: September 19, 2024 at 19:19 UTC
- **Reserved Date**: June 01, 2023 at 14:15 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**HelpDezk - HelpDezk Community**
Affected versions:
- 1.1.10 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community)
### Credits
- David Utón Amaya (m3n0sd0n4ld) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12412
- **State**: PUBLISHED
- **Published Date**: February 07, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 18:36 UTC
- **Reserved Date**: August 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ccn-lite-ccnb2xml in CCN-lite before 2.0.0 allows context-dependent attackers to have unspecified impact via a crafted file, which triggers infinite recursion and a stack overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0)
2. [](https://github.com/cn-uofbasel/ccn-lite/issues/128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47611
- **State**: PUBLISHED
- **Published Date**: November 10, 2023 at 16:38 UTC
- **Last Updated**: August 02, 2024 at 21:09 UTC
- **Reserved Date**: November 07, 2023 at 10:06 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to "manufacturer" level on the targeted system.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Telit Cinterion - BGS5**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS5-E**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS5-US**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS5-US Rel.4**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS6**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS6 Rel.2**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS6 Rel.3**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS6 Rel.4**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS6-A Rel.4**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS8**
Affected versions:
- * (Status: affected)
**Telit Cinterion - EHS8 Rel.4**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-AUS**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-AUS Rel.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-AUS Rel.1 MR**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E Rel.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E Rel.1 MR**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E Rel.2**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E Rel.2**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E2 Rel.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-E2 Rel.1 MR**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-US Rel.1 MR**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS61-US Rel.2**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS81-E**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS81-E Rel.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS81-E Rel.1.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS81-US**
Affected versions:
- * (Status: affected)
**Telit Cinterion - ELS81-US Rel.1.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - PDS5-E**
Affected versions:
- * (Status: affected)
**Telit Cinterion - PDS5-E Rel.1**
Affected versions:
- * (Status: affected)
**Telit Cinterion - PDS5-E Rel.4**
Affected versions:
- * (Status: affected)
**Telit Cinterion - PDS5-US**
**Telit Cinterion - PDS6**
**Telit Cinterion - PDS8**
**Telit Cinterion - PLS62-W**
Affected versions:
- * (Status: affected)
**Telit Cinterion - PLS62-W Rel.1**
Affected versions:
- * (Status: affected)
### References
1. [KLCERT-22-216: Telit Cinterion (Thales/Gemalto) modules. Improper Privilege Management vulnerability](https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/)
### Credits
- Alexander Kozlov from Kaspersky
- Sergey Anufrienko from Kaspersky |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4806
- **State**: PUBLISHED
- **Published Date**: May 25, 2006 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: May 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1014875](http://securitytracker.com/id?1014875)
2. [ADV-2005-1689](http://www.vupen.com/english/advisories/2005/1689)
3. [16757](http://secunia.com/advisories/16757)
4. [101913](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28446
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 14:05 UTC
- **Last Updated**: September 17, 2024 at 04:20 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package ntesseract before 0.2.9 are vulnerable to Command Injection via lib/tesseract.js.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - ntesseract**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-NTESSERACT-1050982)
2. [](https://github.com/taoyuan/ntesseract/commit/fcbc36f381798b4362179c0cdf9961b437c7b619)
### Credits
- JHU System Security Lab |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1966
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) FID parameter in board.php, (2) sortorder, perpage, or id parameters in member.php, (3) forums parameter in search.php, or (4) PID or FID parameters in post.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openbb-multiplescripts-sql-injection(15964)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15964)
2. [10214](http://www.securityfocus.com/bid/10214)
3. [20040425 Multiple Vulnerabilities In OpenBB](http://marc.info/?l=bugtraq&m=108301983206107&w=2)
4. [11481](http://secunia.com/advisories/11481)
5. [1009935](http://securitytracker.com/id?1009935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8422
- **State**: PUBLISHED
- **Published Date**: January 12, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:20 UTC
- **Reserved Date**: October 05, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Qualcomm bootloader could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31471220. References: QC-CR#979426.
### Affected Products
**Google Inc. - Android**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-01-01.html)
2. [95241](http://www.securityfocus.com/bid/95241) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9460
- **State**: PUBLISHED
- **Published Date**: April 14, 2020 at 14:32 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: February 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter CampaignName in Campaign.Create is vulnerable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.octeth.com/)
2. [](https://github.com/Guilherme-Rubert/CVE-2020-9460)
3. [](https://guilhermerubert.com/blog/cve-2020-9461/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23451
- **State**: PUBLISHED
- **Published Date**: September 06, 2022 at 17:18 UTC
- **Last Updated**: August 03, 2024 at 03:43 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of service by consuming protected resources.
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**n/a - openstack/barbican**
Affected versions:
- Fixed in v14.0.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2025089)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=2022878)
3. [](https://storyboard.openstack.org/#%21/story/2009253)
4. [](https://review.opendev.org/c/openstack/barbican/+/811236)
5. [](https://access.redhat.com/security/cve/CVE-2022-23451) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7782
- **State**: PUBLISHED
- **Published Date**: December 30, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 09, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Let's PHP! Frame high-speed chat before 2015-09-22 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#35845584](http://jvn.jp/en/jp/JVN35845584/index.html)
2. [JVNDB-2015-000188](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000188) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10000
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 05:32 UTC
- **Last Updated**: October 29, 2024 at 13:49 UTC
- **Reserved Date**: October 15, 2024 at 14:17 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Masteriyo LMS – eLearning and Online Course Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the question's content parameter in all versions up to, and including, 1.13.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with student-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**masteriyo - Masteriyo LMS – eLearning and Online Course Builder for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/575f103e-cfc7-4efd-a592-658a3e919671?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/learning-management-system/tags/1.13.3)
### Credits
- Flo |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4165
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 12:28 UTC
- **Last Updated**: April 11, 2025 at 23:20 UTC
- **Reserved Date**: November 28, 2022 at 15:03 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_order POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
### Weakness Classification (CWE)
- CWE-89 SQL Injection: SQL Injection
### Affected Products
**Unknown - Contest Gallery**
Affected versions:
- 0 (Status: affected)
**Unknown - Contest Gallery Pro**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0)
2. [](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17)
### Credits
- Kunal Sharma (University of Kaiserslautern)
- Daniel Krohmer (Fraunhofer IESE)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0047
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1005
- **State**: PUBLISHED
- **Published Date**: February 24, 2023 at 08:00 UTC
- **Last Updated**: August 02, 2024 at 05:32 UTC
- **Reserved Date**: February 24, 2023 at 07:59 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**JP1016 - Markdown-Electron**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.221738)
2. [](https://vuldb.com/?ctiid.221738)
3. [](https://github.com/JP1016/Markdown-Electron/issues/3)
### Credits
- Tom23 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24394
- **State**: PUBLISHED
- **Published Date**: May 17, 2022 at 19:22 UTC
- **Last Updated**: September 17, 2024 at 03:59 UTC
- **Reserved Date**: February 03, 2022 at 00:00 UTC
- **Assigned By**: Fidelis
### Vulnerability Description
Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface using the “update_checkfile” value for the “filename” parameter. The vulnerability could allow a specially crafted HTTP request to execute system commands on the CommandPost and return results in an HTTP response via an authenticated session. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Fidelis Cybersecurity - Fidelis Network**
Affected versions:
- Fidelis Network (Status: affected)
**Fidelis Cybersecurity - Fidelis Deception**
Affected versions:
- Fidelis Deception (Status: affected)
### References
1. [](https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411)
### Credits
- Ryan Wincey, Securifera |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5127
- **State**: PUBLISHED
- **Published Date**: August 29, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:34 UTC
- **Reserved Date**: July 30, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open redirect vulnerability in Innovative Interfaces Encore Discovery Solution 4.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in an unspecified parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [encore-discovery-cve20145127-open-redirect(95568)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95568)
2. [](http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html)
3. [20140827 Encore Discovery Solution Multiple Vulnerability Disclosure](http://www.securityfocus.com/archive/1/533233/100/0/threaded)
4. [69427](http://www.securityfocus.com/bid/69427) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2318
- **State**: PUBLISHED
- **Published Date**: March 10, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:06 UTC
- **Reserved Date**: March 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ATCOM Netvolution 3 allows remote attackers to execute arbitrary SQL commands via the m parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [netvolution-m-sql-injection(91543)](https://exchange.xforce.ibmcloud.com/vulnerabilities/91543)
2. [65942](http://www.securityfocus.com/bid/65942)
3. [](http://packetstormsecurity.com/files/125507) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17610
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
E-commerce MLM Software 1.0 has SQL Injection via the service_detail.php pid parameter, event_detail.php eventid parameter, or news_detail.php newid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/145305/E-commerce-MLM-Software-1.0-SQL-Injection.html)
2. [43277](https://www.exploit-db.com/exploits/43277/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39697
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 14:16 UTC
- **Last Updated**: August 02, 2024 at 04:26 UTC
- **Reserved Date**: June 27, 2024 at 18:44 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
phonenumber is a library for parsing, formatting and validating international phone numbers. Since 0.3.4, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form `+dwPAA;phone-context=AA`, where the "number" part potentially parses as a number larger than 2^56. This vulnerability is fixed in 0.3.6.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-392: Security Weakness
- CWE-1284: Security Weakness
- CWE-617: Security Weakness
### Affected Products
**whisperfish - rust-phonenumber**
Affected versions:
- >= 0.3.4, < 0.3.6 (Status: affected)
### References
1. [https://github.com/whisperfish/rust-phonenumber/security/advisories/GHSA-mjw4-jj88-v687](https://github.com/whisperfish/rust-phonenumber/security/advisories/GHSA-mjw4-jj88-v687)
2. [https://github.com/whisperfish/rust-phonenumber/issues/69](https://github.com/whisperfish/rust-phonenumber/issues/69)
3. [https://github.com/whisperfish/rust-phonenumber/pull/52](https://github.com/whisperfish/rust-phonenumber/pull/52)
4. [https://github.com/whisperfish/rust-phonenumber/commit/b792151b17fc90231c232a23935830c2266f3203](https://github.com/whisperfish/rust-phonenumber/commit/b792151b17fc90231c232a23935830c2266f3203)
5. [https://github.com/whisperfish/rust-phonenumber/commit/f69abee1481fac0d6d531407bae90020e39c6407](https://github.com/whisperfish/rust-phonenumber/commit/f69abee1481fac0d6d531407bae90020e39c6407) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7278
- **State**: PUBLISHED
- **Published Date**: December 31, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 18, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability on Amped Wireless R10000 devices with firmware 2.5.2.11 allows remote attackers to hijack the authentication of arbitrary users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [78818](http://www.securityfocus.com/bid/78818)
2. [VU#763576](https://www.kb.cert.org/vuls/id/763576) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2580
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 20, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect availability via vectors related to NFSv4.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
2. [1032914](http://www.securitytracker.com/id/1032914)
3. [75889](http://www.securityfocus.com/bid/75889) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26653
- **State**: PUBLISHED
- **Published Date**: April 16, 2022 at 15:23 UTC
- **Last Updated**: August 03, 2024 at 05:11 UTC
- **Reserved Date**: March 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine Remote Access Plus before 10.1.2137.15 allows guest users to view domain details (such as the username and GUID of an administrator).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/remote-desktop-management/advisory/cve-2022-26653.html)
2. [](https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8740
- **State**: PUBLISHED
- **Published Date**: September 13, 2017 at 01:00 UTC
- **Last Updated**: September 17, 2024 at 01:51 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
### Affected Products
**Microsoft Corporation - Microsoft Edge**
Affected versions:
- Microsoft Windows 10 1703 (Status: affected)
### References
1. [100763](http://www.securityfocus.com/bid/100763)
2. [1039342](http://www.securitytracker.com/id/1039342)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8740)
4. [42764](https://www.exploit-db.com/exploits/42764/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1891
- **State**: PUBLISHED
- **Published Date**: September 15, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 22:45 UTC
- **Reserved Date**: May 04, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Microsoft Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters in a request to a script, aka "Contact Details Reflected XSS Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:12864](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12864)
2. [MS11-074](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074)
3. [TA11-256A](http://www.us-cert.gov/cas/techalerts/TA11-256A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43462
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 17:53 UTC
- **Last Updated**: January 30, 2025 at 00:09 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
SQL Server Native Client Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Microsoft SQL Server 2019 (CU 29)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2017 (GDR)**
Affected versions:
- 14.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (GDR)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2016 Service Pack 3 (GDR)**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2017 (CU 31)**
Affected versions:
- 14.0.0 (Status: affected)
### References
1. [SQL Server Native Client Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18432, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18432
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in DESTOON B2B 7.0. CSRF exists via the admin.php URI in an action=add request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/AvaterXXX/DESTOON/blob/master/CSRF.md)
2. [](https://www.patec.cn/newsshow.php?cid=24&id=134) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21196
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 17:50 UTC
- **Last Updated**: April 16, 2025 at 16:45 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not perform proper authorization and authentication checks on multiple API routes. An attacker may gain access to these API routes and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Airspan Networks - MMP**
Affected versions:
- unspecified (Status: affected)
**Airspan Networks - PTP C-series**
Affected versions:
- unspecified (Status: affected)
**Airspan Networks - PTMP C-series and A5x**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-034-02)
### Credits
- Noam Moshe of Claroty reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0728
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: October 02, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Compaq Management Agents before 5.2, included in Compaq Web-enabled Management Software, allows local users to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT0758](http://www.compaq.com/products/servers/management/mgtsw-advisory2.html)
2. [VU#275979](http://www.kb.cert.org/vuls/id/275979)
3. [compaq-wbm-bo(7189)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7189)
4. [3376](http://www.securityfocus.com/bid/3376) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1002
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 21, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netscape Navigator uses weak encryption for storing a user's Netscape mail password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19991220 Netscape password scrambling](http://marc.info/?l=bugtraq&m=94570673523998&w=2)
2. [](http://www.rstcorp.com/news/bad-crypto.html)
3. [19991216 Reinventing the wheel (aka "Decoding Netscape Mail passwords")](http://marc.info/?l=bugtraq&m=94536309217214&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4207
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 13:53 UTC
- **Last Updated**: February 13, 2025 at 17:09 UTC
- **Reserved Date**: August 07, 2023 at 13:02 UTC
- **Assigned By**: Google
### Vulnerability Description
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.
When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.
We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Linux - Kernel**
Affected versions:
- 3.18 (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec)
2. [](https://kernel.dance/76e42ae831991c828cffa8c37736ebfb831ad5ec)
3. [](https://www.debian.org/security/2023/dsa-5492)
4. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html)
### Credits
- valis
- Bing-Jhong Billy Jheng |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27622
- **State**: PUBLISHED
- **Published Date**: March 05, 2025 at 22:33 UTC
- **Last Updated**: March 06, 2025 at 16:19 UTC
- **Reserved Date**: March 04, 2025 at 07:21 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.
### Affected Products
**Jenkins Project - Jenkins**
Affected versions:
- 2.492.2 (Status: unaffected)
- 2.500 (Status: unaffected)
### References
1. [Jenkins Security Advisory 2025-03-05](https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3495) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0325
- **State**: PUBLISHED
- **Published Date**: July 03, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site that triggers improper processing of CElement objects, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1751 and CVE-2014-1755. NOTE: MS14-018 originally had a typo of CVE-2014-0235 for this.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-018](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-018)
2. [](http://zerodayinitiative.com/advisories/ZDI-14-078/)
3. [66646](http://www.securityfocus.com/bid/66646) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1367
- **State**: PUBLISHED
- **Published Date**: May 02, 2022 at 18:02 UTC
- **Last Updated**: April 16, 2025 at 16:27 UTC
- **Reserved Date**: April 14, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in Handler_TCV.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01)
### Credits
- Michael Heinzl and Dusan Stevanovic of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5245
- **State**: PUBLISHED
- **Published Date**: December 03, 2015 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tracker.ceph.com/issues/12537)
2. [RHSA-2015:2512](https://access.redhat.com/errata/RHSA-2015:2512)
3. [[Ceph-announce] 20151019 v0.94.4 Hammer released](http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47340
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:21 UTC
- **Last Updated**: January 28, 2025 at 17:22 UTC
- **Reserved Date**: December 13, 2022 at 05:23 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In h265 codec firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28117
- **State**: PUBLISHED
- **Published Date**: March 20, 2021 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 18:08 UTC
- **Reserved Date**: March 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libdiscover/backends/KNSBackend/KNSResource.cpp in KDE Discover before 5.21.3 automatically creates links to potentially dangerous URLs (that are neither https:// nor http://) based on the content of the store.kde.org web site. (5.18.7 is also a fixed version.)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://userbase.kde.org/Discover)
2. [](https://github.com/KDE/discover/releases)
3. [](https://kde.org/info/security/advisory-20210310-1.txt)
4. [](https://invent.kde.org/plasma/discover/commit/94478827aab63d2e2321f0ca9ec5553718798e60)
5. [](https://github.com/KDE/discover/commit/fcd3b30552bf03a384b1a16f9bb8db029c111356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26930
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 21:53 UTC
- **Last Updated**: April 16, 2025 at 13:38 UTC
- **Reserved Date**: February 17, 2025 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in alleythemes Home Services allows DOM-Based XSS. This issue affects Home Services: from n/a through 1.2.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**alleythemes - Home Services**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/home-services/vulnerability/wordpress-home-services-plugin-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2126
- **State**: PUBLISHED
- **Published Date**: June 01, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: June 01, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Snipe Gallery 3.1.5 allow remote attackers to execute arbitrary PHP code via a URL in the cfg_admin_path parameter to (1) index.php, (2) view.php, (3) image.php, (4) search.php, (5) admin/index.php, (6) admin/gallery/index.php, (7) admin/gallery/view.php, (8) admin/gallery/gallery.php, (9) admin/gallery/image.php, and (10) admin/gallery/crop.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://eidelweiss-advisories.blogspot.com/2010/04/snipegallery-315-multiple-remote-file.html)
2. [40279](http://www.securityfocus.com/bid/40279)
3. [snipegallery-cfgadminpath-file-include(58806)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58806)
4. [](http://packetstormsecurity.org/1004-exploits/snipegallery-rfi.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38985
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 00:00 UTC
- **Last Updated**: April 01, 2025 at 18:29 UTC
- **Reserved Date**: June 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
janryWang products depath v1.0.6 and cool-path v1.1.2 were discovered to contain a prototype pollution via the set() method at setIn (lib/index.js:90). This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/mestrtee/32c0a48023036e51918f6a098f21953d)
2. [](https://github.com/janryWang/depath/issues/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16902
- **State**: PUBLISHED
- **Published Date**: November 20, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 20, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On the Vonage VDV-23 115 3.2.11-0.9.40 home router, sending a long string of characters in the loginPassword and/or loginUsername field to goform/login causes the router to reboot.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://gh0s7.net/vonage2)
2. [43164](https://www.exploit-db.com/exploits/43164/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0516
- **State**: PUBLISHED
- **Published Date**: February 23, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ImageGalleryPlugin (ImageGalleryPlugin.pm) in Twiki allows remote attackers to execute arbitrary commands via certain commands that generate thumbnails.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14384](http://secunia.com/advisories/14384)
2. [20050223 Robustness patch for TWiki, vulnerability in ImageGalleryPlugin](http://marc.info/?l=bugtraq&m=110918725225288&w=2)
3. [](http://www.enyo.de/fw/security/notes/twiki-robustness.html)
4. [](http://static.enyo.de/fw/patches/twiki/imagegallery-robustness-20041128.diff) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.