System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58107
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 03:33 UTC
- **Last Updated**: April 07, 2025 at 14:11 UTC
- **Reserved Date**: March 27, 2025 at 07:13 UTC
- **Assigned By**: huawei
### Vulnerability Description
Buffer overflow vulnerability in the codec module
Impact: Successful exploitation of this vulnerability may affect availability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-680: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2025/4/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2130
- **State**: PUBLISHED
- **Published Date**: May 27, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: May 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in privmsg.php in phpBB 2.0.6 allow remote attackers to execute arbitrary script or HTML via the (1) folder or (2) mode variables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040128 phpBB privmsg.php XSS vulnerability patch.](http://marc.info/?l=bugtraq&m=107530946123822&w=2)
2. [9290](http://www.securityfocus.com/bid/9290)
3. [](http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=161943) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23383
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 16:55 UTC
- **Last Updated**: January 01, 2025 at 00:47 UTC
- **Reserved Date**: January 11, 2023 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Service Fabric Explorer Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Microsoft - Azure Service Fabric 9.0 for Linux**
Affected versions:
- 9.0 (Status: affected)
**Microsoft - Azure Service Fabric 9.1 for Windows**
Affected versions:
- 9.0 (Status: affected)
**Microsoft - Azure Service Fabric 9.1 for Ubuntu**
Affected versions:
- 9.0 (Status: affected)
**Microsoft - Azure Service Fabric 9.0 for Windows**
Affected versions:
- 9.0 (Status: affected)
### References
1. [Service Fabric Explorer Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23383) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6971
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Easy Video Downloader (aka com.simon.padillar.EasyVideo) application 4.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#921561](http://www.kb.cert.org/vuls/id/921561)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2853
- **State**: PUBLISHED
- **Published Date**: July 09, 2023 at 16:39 UTC
- **Last Updated**: October 23, 2024 at 19:08 UTC
- **Reserved Date**: May 23, 2023 at 18:31 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Softmed SelfPatron allows Reflected XSS.This issue affects SelfPatron : before 2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Softmed - SelfPatron **
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-23-0388)
### Credits
- Omer Fatih YEGIN |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3811, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3811
- **State**: PUBLISHED
- **Published Date**: May 26, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2017:0631](http://rhn.redhat.com/errata/RHSA-2017-0631.html)
2. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978)
3. [DSA-3277](http://www.debian.org/security/2015/dsa-3277)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html)
5. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2)
6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
7. [GLSA-201510-03](https://security.gentoo.org/glsa/201510-03)
8. [](http://www.wireshark.org/security/wnpa-sec-2015-14.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40606
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: May 14, 2025 at 20:26 UTC
- **Reserved Date**: September 12, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40605.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mitre/caldera/releases/tag/4.1.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0500, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0500
- **State**: PUBLISHED
- **Published Date**: January 20, 2011 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 17:04 UTC
- **Reserved Date**: January 20, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42876](http://secunia.com/advisories/42876)
2. [42866](http://secunia.com/advisories/42866)
3. [15936](http://www.exploit-db.com/exploits/15936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43982, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43982
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 14:41 UTC
- **Reserved Date**: September 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bon Presta boninstagramcarousel between v5.2.1 to v7.0.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the url parameter at insta_parser.php. This vulnerability allows attackers to use the vulnerable website as proxy to attack other websites or exfiltrate data via a HTTP call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.friendsofpresta.org/modules/2023/11/02/boninstagramcarousel.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0795
- **State**: PUBLISHED
- **Published Date**: March 20, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HolaCMS 1.4.9 does not restrict file access to the holaDB/votes directory, which allows remote attackers to overwrite arbitrary files via a modified vote_filename parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050315 Virginity Security Advisory 2005-001 : Hola CMS - File destruction and System access](http://archives.neohapsis.com/archives/bugtraq/2005-03/0210.html)
2. [](http://www.holacms.de/?content=changelog)
3. [14566](http://secunia.com/advisories/14566)
4. [hola-votefilename-directory-traversal(19672)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19672) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13856
- **State**: PUBLISHED
- **Published Date**: March 22, 2025 at 06:41 UTC
- **Last Updated**: March 24, 2025 at 13:18 UTC
- **Reserved Date**: February 10, 2025 at 21:38 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Your Friendly Drag and Drop Page Builder — Make Builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.10 via the make_builder_ajax_subscribe() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**thethemefoundry - Your Friendly Drag and Drop Page Builder — Make Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7ffcb74b-230b-4629-b22d-5db96ac5fa06?source=cve)
2. [](https://wordpress.org/plugins/make-builder/#developers)
3. [](https://plugins.trac.wordpress.org/browser/make-builder/trunk/plugins-screen.php#L83)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3259333%40make-builder%2Ftrunk&old=2235851%40make-builder%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0398, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0398
- **State**: PUBLISHED
- **Published Date**: October 30, 2019 at 21:07 UTC
- **Last Updated**: August 07, 2024 at 00:45 UTC
- **Reserved Date**: January 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2010-0398)
2. [](https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/538471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24446
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 13:51 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account.
### Affected Products
**Jenkins Project - Jenkins OpenID Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 2.4 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2995) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36321
- **State**: PUBLISHED
- **Published Date**: April 23, 2021 at 16:05 UTC
- **Last Updated**: September 17, 2024 at 00:45 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: Vaadin
### Vulnerability Description
Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Vaadin - Vaadin**
Affected versions:
- 14.0.0 (Status: affected)
**Vaadin - flow-server**
Affected versions:
- 2.0.0 (Status: affected)
### References
1. [](https://vaadin.com/security/cve-2020-36321)
2. [](https://github.com/vaadin/flow/pull/9392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48236
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:20 UTC
- **Last Updated**: January 28, 2025 at 20:36 UTC
- **Reserved Date**: January 09, 2023 at 11:51 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In MP3 encoder, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27061
- **State**: PUBLISHED
- **Published Date**: March 11, 2021 at 15:49 UTC
- **Last Updated**: October 01, 2024 at 15:55 UTC
- **Reserved Date**: February 10, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
HEVC Video Extensions Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - HEVC Video Extensions**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35706
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 15:47 UTC
- **Last Updated**: April 23, 2025 at 16:57 UTC
- **Reserved Date**: July 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Adobe - Bridge**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb22-49.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1879
- **State**: PUBLISHED
- **Published Date**: January 29, 2016 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Stream Control Transmission Protocol (SCTP) module in FreeBSD 9.3 before p33, 10.1 before p26, and 10.2 before p9, when the kernel is configured for IPv6, allows remote attackers to cause a denial of service (assertion failure or NULL pointer dereference and kernel panic) via a crafted ICMPv6 packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39305](https://www.exploit-db.com/exploits/39305/)
2. [FreeBSD-SA-16:01](https://www.freebsd.org/security/advisories/FreeBSD-SA-16:01.sctp.asc)
3. [1034673](http://www.securitytracker.com/id/1034673)
4. [](http://packetstormsecurity.com/files/135369/FreeBSD-SCTP-ICMPv6-Denial-Of-Service.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0947
- **State**: PUBLISHED
- **Published Date**: June 02, 2021 at 15:58 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in the (1) cdf_read_property_info and (2) cdf_read_sat functions in file before 5.02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=498682) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4919
- **State**: PUBLISHED
- **Published Date**: July 28, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 16:29 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware vCenter Server 5.5, 6.0, 6.5 allows vSphere users with certain, limited vSphere privileges to use the VIX API to access Guest Operating Systems without the need to authenticate.
### Affected Products
**VMware - VMware vCenter Server**
Affected versions:
- VMware vCenter Server 5.5.x, 6.0.x, 6.5.x (Status: affected)
### References
1. [1039004](http://www.securitytracker.com/id/1039004)
2. [](http://www.vmware.com/security/advisories/VMSA-2017-0012.html)
3. [100102](http://www.securityfocus.com/bid/100102) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15441
- **State**: REJECTED
- **Published Date**: May 27, 2021 at 20:13 UTC
- **Last Updated**: May 27, 2021 at 20:13 UTC
- **Reserved Date**: June 30, 2020 at 00:00 UTC
- **Assigned By**: openEuler
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5827
- **State**: PUBLISHED
- **Published Date**: January 02, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: January 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Nokia 6131 Near Field Communication (NFC) phone with 05.12 firmware automatically installs software upon completing the download of a JAR file, which makes it easier for remote attackers to execute arbitrary code via a crafted URI record in an NDEF tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf)
2. [nokia-6131-ndef-recordparser-dos(44528)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44528)
3. [](http://events.ccc.de/congress/2008/Fahrplan/attachments/1109_collin_mulliner_eusecwest08_attacking_nfc_phones_slim.pdf)
4. [](http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html)
5. [](http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-7005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-7005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7005
- **State**: PUBLISHED
- **Published Date**: February 12, 2007 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 23:46 UTC
- **Reserved Date**: February 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in item.php in PSY Auction allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17974](http://www.securityfocus.com/bid/17974)
2. [](http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51546
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 08:44 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 20, 2023 at 19:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Privilege Management vulnerability in WebToffee WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels allows Privilege Escalation.This issue affects WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels: from n/a through 4.2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**WebToffee - WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/print-invoices-packing-slip-labels-for-woocommerce/wordpress-woocommerce-pdf-invoices-packing-slips-delivery-notes-and-shipping-labels-plugin-4-2-1-privilege-escalation-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7408
- **State**: PUBLISHED
- **Published Date**: October 26, 2014 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: October 26, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
F5 BIG-IP Analytics 11.x before 11.4.0 uses a predictable session cookie, which makes it easier for remote attackers to have unspecified impact by guessing the value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.f5.com/kb/en-us/solutions/public/14000/300/sol14334.html)
2. [68792](http://www.securityfocus.com/bid/68792) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22799
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 19:09 UTC
- **Last Updated**: August 03, 2024 at 18:51 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-331: Insufficient Entropy vulnerability exists that could cause unintended connection from an internal network to an external network when an attacker manages to decrypt the SESU proxy password from the registry. Affected Product: Schneider Electric Software Update, V2.3.0 through V2.5.1
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2165
- **State**: PUBLISHED
- **Published Date**: April 22, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 13:23 UTC
- **Reserved Date**: April 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255)
2. [](http://bugs.proftpd.org/show_bug.cgi?id=2922)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=237533)
4. [MDKSA-2007:130](http://www.mandriva.com/security/advisories?name=MDKSA-2007:130)
5. [25724](http://secunia.com/advisories/25724)
6. [23546](http://www.securityfocus.com/bid/23546)
7. [24867](http://secunia.com/advisories/24867)
8. [34602](http://osvdb.org/34602)
9. [ADV-2007-1444](http://www.vupen.com/english/advisories/2007/1444)
10. [1017931](http://securitytracker.com/id?1017931)
11. [FEDORA-2007-2613](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html)
12. [27516](http://secunia.com/advisories/27516)
13. [proftpd-authapi-security-bypass(33733)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33733) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36882
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 17:08 UTC
- **Last Updated**: February 27, 2025 at 21:08 UTC
- **Reserved Date**: June 27, 2023 at 20:28 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2568
- **State**: PUBLISHED
- **Published Date**: May 25, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: May 09, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
d41d8cd98f00b204e9800998ecf8427e.php in the management web server on the Seagate BlackArmor device allows remote attackers to change the administrator password via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53670](http://www.securityfocus.com/bid/53670)
2. [blackarmor-network-sec-bypass(75854)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75854)
3. [49282](http://secunia.com/advisories/49282)
4. [VU#515283](http://www.kb.cert.org/vuls/id/515283) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3844
- **State**: PUBLISHED
- **Published Date**: August 05, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
mediaserver in Android before 2016-08-05 on Nexus 9 and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 28299517.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-08-01.html)
2. [92241](http://www.securityfocus.com/bid/92241) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20637
- **State**: PUBLISHED
- **Published Date**: March 20, 2019 at 18:46 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1 allows remote attackers to cause a denial of service (unrecoverable blank profile) via crafted JavaScript code in the First Name and Last Name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gkaim.com/cve-2018-20637-vikas-chaudhary/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6924
- **State**: PUBLISHED
- **Published Date**: January 15, 2019 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:57 UTC
- **Reserved Date**: March 16, 2017 at 00:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
In Drupal 8 prior to 8.3.7; When using the REST API, users without the correct permission can post comments via REST that are approved even if the user does not have permission to post approved comments. This issue only affects sites that have the RESTful Web Services (rest) module enabled, the comment entity REST resource enabled, and where an attacker can access a user account on the site with permissions to post comments, or where anonymous users can post comments.
### Affected Products
**Drupal - Drupal Core**
Affected versions:
- Drupal 8 (Status: affected)
### References
1. [100368](http://www.securityfocus.com/bid/100368)
2. [](https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple)
3. [1039200](http://www.securitytracker.com/id/1039200) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2806
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 30, 2024 at 15:01 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.28 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.28 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
2. [](https://security.netapp.com/advisory/ntap-20200416-0003/)
3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5038
- **State**: PUBLISHED
- **Published Date**: September 27, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The FiWin SS28S WiFi VoIP SIP/Skype Phone, firmware version 01_02_07, has a hard-coded username and password, which allows remote attackers to gain administrative access via telnet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20154](http://www.securityfocus.com/bid/20154)
2. [](http://www.osnews.com/story.php/15923/Review-FiWin-SS28S-WiFi-VoIP-SIPSkype-Phone/)
3. [22041](http://secunia.com/advisories/22041)
4. [20060921 FiWin SS28S WiFi VoIP SIP/Skype Phone Hardcoded Telnet user/pass and debug access](http://archives.neohapsis.com/archives/fulldisclosure/2006-09/0391.html)
5. [fiwin-ss28s-default-account(29114)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29114) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4106
- **State**: PUBLISHED
- **Published Date**: September 30, 2019 at 15:20 UTC
- **Last Updated**: September 17, 2024 at 04:20 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere eXtreme Scale 8.6 Admin Console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158099.
### Affected Products
**IBM - WebSphere eXtreme Scale**
Affected versions:
- 8.6 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/1073864)
2. [ibm-websphere-cve20194106-xss (158099)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158099) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28837
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 17:59 UTC
- **Last Updated**: September 16, 2024 at 18:08 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-16.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4477
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 05:58 UTC
- **Last Updated**: May 19, 2025 at 13:33 UTC
- **Reserved Date**: May 09, 2025 at 03:30 UTC
- **Assigned By**: twcert
### Vulnerability Description
The ThreatSonar Anti-Ransomware from TeamT5 has a Privilege Escalation vulnerability, allowing remote attackers with intermediate privileges to escalate their privileges to highest administrator level through a specific API.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**TeamT5 - ThreatSonar Anti-Ransomware**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-10129-18ea3-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-10130-c0959-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0158
- **State**: PUBLISHED
- **Published Date**: December 27, 2019 at 17:03 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
thttpd 2007 has buffer underflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://taviso.decsystem.org/research.t2t) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0555
- **State**: PUBLISHED
- **Published Date**: May 03, 2012 at 18:17 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 11, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0556, and CVE-2012-0557.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660640)
2. [1026949](http://www.securitytracker.com/id?1026949)
3. [53070](http://www.securityfocus.com/bid/53070)
4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html)
5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1066
- **State**: PUBLISHED
- **Published Date**: March 02, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 03:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
### Affected Products
**n/a - Linux kernel 4.11**
Affected versions:
- Linux kernel 4.11 (Status: affected)
### References
1. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html)
2. [DSA-4187](https://www.debian.org/security/2018/dsa-4187)
3. [[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html)
4. [](https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebb)
5. [DSA-4188](https://www.debian.org/security/2018/dsa-4188)
6. [USN-3880-1](https://usn.ubuntu.com/3880-1/)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1539599)
8. [USN-3880-2](https://usn.ubuntu.com/3880-2/)
9. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3680f78981d26c078a26e5c748531257ebb)
10. [](https://patchwork.kernel.org/patch/10187633/)
11. [103378](http://www.securityfocus.com/bid/103378) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12217
- **State**: PUBLISHED
- **Published Date**: May 20, 2019 at 16:32 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL stdio_read function in file/SDL_rwops.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.libsdl.org/show_bug.cgi?id=4626)
2. [[debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html)
3. [[debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html)
4. [openSUSE-SU-2019:2070](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html)
5. [openSUSE-SU-2019:2108](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html)
6. [FEDORA-2019-a6bc0fb143](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ2VRD57UOBT72JUC2DIFHEFCH4N64SW/)
7. [USN-4238-1](https://usn.ubuntu.com/4238-1/)
8. [FEDORA-2020-ff2fe47ba4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50537
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:32 UTC
- **Last Updated**: November 20, 2024 at 14:54 UTC
- **Reserved Date**: October 24, 2024 at 07:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stefano Marra Smart Mockups allows Stored XSS.This issue affects Smart Mockups: from n/a through 1.2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Stefano Marra - Smart Mockups**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/smart-mockups/wordpress-smart-mockups-plugin-1-2-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12384
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 13:52 UTC
- **Last Updated**: August 04, 2024 at 11:56 UTC
- **Reserved Date**: April 28, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper access control in some Intel(R) Graphics Drivers before version 26.20.100.8476 may allow an authenticated user to potentially enable an escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) Graphics Drivers**
Affected versions:
- before version 26.20.100.8476 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46572
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:44 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15366.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Bentley - MicroStation CONNECT**
Affected versions:
- 10.16.0.80 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-159/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33019
- **State**: PUBLISHED
- **Published Date**: August 05, 2024 at 14:21 UTC
- **Last Updated**: August 05, 2024 at 15:29 UTC
- **Reserved Date**: April 23, 2024 at 04:42 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Transient DOS while parsing the received TID-to-link mapping action frame.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSR8811 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5300 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9574 (Status: affected)
- QAM8255P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA4024 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCC2073 (Status: affected)
- QCC2076 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN9000 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9160 (Status: affected)
- QCN9274 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- QCS8550 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- QXM8083 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SDX55 (Status: affected)
- SDX65M (Status: affected)
- SM8550P (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9340 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29725
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 13:31 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload in the image upload component of wityCMS v0.6.2 allows attackers to execute arbitrary code via a crafted PHP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Creatiwity/wityCMS/issues/161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8596
- **State**: PUBLISHED
- **Published Date**: November 17, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:26 UTC
- **Reserved Date**: November 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in PHP-Fusion 7.02.07 allow remote authenticated users to execute arbitrary SQL commands via the (1) submit_id parameter in a 2 action to files/administration/submissions.php or (2) status parameter to files/administration/members.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [php-fusion-cve20148596-sql-injection(98583)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98583)
2. [](http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html)
3. [112419](http://osvdb.org/show/osvdb/112419)
4. [35206](http://www.exploit-db.com/exploits/35206)
5. [71053](http://www.securityfocus.com/bid/71053)
6. [](https://www.xlabs.com.br/blog/?p=282)
7. [](http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html)
8. [20151005 Blind SQL Injection in admin panel PHP-Fusion <= v7.02.07](http://seclists.org/fulldisclosure/2015/Oct/23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3714
- **State**: PUBLISHED
- **Published Date**: January 29, 2020 at 18:49 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Illustrator CC**
Affected versions:
- 24.0 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/illustrator/apsb20-03.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6708
- **State**: PUBLISHED
- **Published Date**: April 10, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 11:41 UTC
- **Reserved Date**: April 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x and 4.x, allows remote authenticated administrators to gain root privileges via unknown vectors related to configuration of "data viewing or restoring parameters."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-1943](http://www.vupen.com/english/advisories/2008/1943/references)
2. [30751](http://secunia.com/advisories/30751)
3. [](http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm)
4. [avaya-ses-parameters-code-execution(43390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43390)
5. [](http://www.voipshield.com/research-details.php?id=77)
6. [29939](http://www.securityfocus.com/bid/29939)
7. [46604](http://osvdb.org/46604) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7636
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in QNAP NAS application Proxy Server through version 1.2.0 allows remote attackers to inject arbitrary web script or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/nas-201806-01)
2. [1041025](http://www.securitytracker.com/id/1041025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3668
- **State**: PUBLISHED
- **Published Date**: October 11, 2009 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 03:08 UTC
- **Reserved Date**: October 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in ardguest.php in Ardguest 1.8 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36630](http://secunia.com/advisories/36630)
2. [](http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2756
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22732
- **State**: PUBLISHED
- **Published Date**: August 05, 2021 at 16:24 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMS Made Simple (CMSMS) 2.2.14 allows stored XSS via the Extensions > Fie Picker..
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://dev.cmsmadesimple.org/bug/view/12288) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36829
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 15:16 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 27, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
PendingIntent hijacking vulnerability in releaseAlarm in Charm by Samsung prior to version 1.2.3 allows local attackers to access files without permission via implicit intent.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-927: Security Weakness
### Affected Products
**Samsung Mobile - Charm by Samsung**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18766
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 15:40 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects DST6501 before 1.1.0.6 and WNR2000v2 before 1.2.0.8.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000051479/Security-Advisory-for-Arbitrary-File-Read-on-DST6501-and-WNR2000v2-PSV-2017-0425) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5093
- **State**: PUBLISHED
- **Published Date**: August 07, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: May 26, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1)
2. [[oss-security] 20160526 Re: Fwd: CVE for PHP 5.5.36 issues](http://www.openwall.com/lists/oss-security/2016/05/26/3)
3. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
4. [](https://bugs.php.net/bug.php?id=72241)
5. [DSA-3602](http://www.debian.org/security/2016/dsa-3602)
6. [](http://php.net/ChangeLog-5.php)
7. [](http://php.net/ChangeLog-7.php)
8. [90946](http://www.securityfocus.com/bid/90946)
9. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34814
- **State**: PUBLISHED
- **Published Date**: June 30, 2022 at 17:49 UTC
- **Last Updated**: August 03, 2024 at 09:22 UTC
- **Reserved Date**: June 29, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view an administrative configuration page listing pending requests.
### Affected Products
**Jenkins project - Jenkins Request Rename Or Delete Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.1.0 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1996) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32068
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 20:53 UTC
- **Last Updated**: January 22, 2025 at 21:37 UTC
- **Reserved Date**: May 01, 2023 at 16:47 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 14.10.4 it's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect. The issue has now been patched against all patterns that are known for performing redirects. This issue has been patched in XWiki 14.10.4 and 15.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- < 14.10.4 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j)
2. [https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e](https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e)
3. [https://jira.xwiki.org/browse/XWIKI-20096](https://jira.xwiki.org/browse/XWIKI-20096)
4. [https://jira.xwiki.org/browse/XWIKI-20549](https://jira.xwiki.org/browse/XWIKI-20549) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37790
- **State**: PUBLISHED
- **Published Date**: November 08, 2023 at 00:00 UTC
- **Last Updated**: September 04, 2024 at 15:19 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jaspersoft Clarity PPM version 14.3.0.298 was discovered to contain an arbitrary file upload vulnerability via the Profile Picture Upload function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4735
- **State**: PUBLISHED
- **Published Date**: October 24, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in header.php in Concord Asset, Software, and Ticket system (CoAST) 0.95 allows remote attackers to execute arbitrary PHP code via a URL in the sections_file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32050](http://secunia.com/advisories/32050)
2. [6598](https://www.exploit-db.com/exploits/6598)
3. [31461](http://www.securityfocus.com/bid/31461) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1729
- **State**: PUBLISHED
- **Published Date**: May 28, 2021 at 13:09 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 27, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**n/a - SmallRye**
Affected versions:
- SmallRye 1.6.1 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1802444) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37858
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 06:42 UTC
- **Last Updated**: May 26, 2025 at 05:22 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
fs/jfs: Prevent integer overflow in AG size calculation
The JFS filesystem calculates allocation group (AG) size using 1 <<
l2agsize in dbExtendFS(). When l2agsize exceeds 31 (possible with >2TB
aggregates on 32-bit systems), this 32-bit shift operation causes undefined
behavior and improper AG sizing.
On 32-bit architectures:
- Left-shifting 1 by 32+ bits results in 0 due to integer overflow
- This creates invalid AG sizes (0 or garbage values) in
sbi->bmap->db_agsize
- Subsequent block allocations would reference invalid AG structures
- Could lead to:
- Filesystem corruption during extend operations
- Kernel crashes due to invalid memory accesses
- Security vulnerabilities via malformed on-disk structures
Fix by casting to s64 before shifting:
bmp->db_agsize = (s64)1 << l2agsize;
This ensures 64-bit arithmetic even on 32-bit architectures. The cast
matches the data type of db_agsize (s64) and follows similar patterns in
JFS block calculation code.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4.293 (Status: unaffected)
- 5.10.237 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/dd07a985e2ded47b6c7d69fc93c1fe02977c8454)
2. [](https://git.kernel.org/stable/c/8bb29629a5e4090e1ef7199cb42db04a52802239)
3. [](https://git.kernel.org/stable/c/3d8a45f87010a802aa214bf39702ca9d99cbf3ba)
4. [](https://git.kernel.org/stable/c/55edbf5dbf60a8195c21e92124c4028939ae16b2)
5. [](https://git.kernel.org/stable/c/7ccf3b35274512b60ecb614e0637e76bd6f2d829)
6. [](https://git.kernel.org/stable/c/c802a6a4009f585111f903e810b3be9c6d0da329)
7. [](https://git.kernel.org/stable/c/211ed8f5e39e61f9e4d18edd64ce8005a67a1b2a)
8. [](https://git.kernel.org/stable/c/ec34cdf4f917cc6abd306cf091f8b8361fedac88)
9. [](https://git.kernel.org/stable/c/7fcbf789629cdb9fbf4e2172ce31136cfed11e5e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0366
- **State**: PUBLISHED
- **Published Date**: June 18, 2003 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: June 01, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lyskom-server 2.0.7 and earlier allows unauthenticated users to cause a denial of service (CPU consumption) via a large query.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-318](http://www.debian.org/security/2003/dsa-318) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1655
- **State**: PUBLISHED
- **Published Date**: May 16, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in myaccount.php in Easy Scripts Answer and Question Script allow remote authenticated users to execute arbitrary SQL commands via the (1) user name (userid parameter) and (2) password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34975](http://www.securityfocus.com/bid/34975)
2. [8690](https://www.exploit-db.com/exploits/8690)
3. [35067](http://secunia.com/advisories/35067)
4. [54502](http://osvdb.org/54502) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3476
- **State**: PUBLISHED
- **Published Date**: March 30, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: March 29, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**n/a - OpenEXR**
Affected versions:
- OpenEXR 3.0.0-beta (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939145)
2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787)
3. [[debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html)
4. [GLSA-202107-27](https://security.gentoo.org/glsa/202107-27)
5. [[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7554
- **State**: REJECTED
- **Published Date**: September 26, 2016 at 19:00 UTC
- **Last Updated**: September 26, 2016 at 19:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2039
- **State**: PUBLISHED
- **Published Date**: July 14, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:51 UTC
- **Reserved Date**: July 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
/bin/su in QNX realtime operating system (RTOS) 4.25 and 6.1.0 allows local users to obtain sensitive information from core dump files by sending the SIGSERV (invalid memory reference) signal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [qnx-rtos-su-core-dump(9256)](http://www.iss.net/security_center/static/9256.php)
2. [4914](http://www.securityfocus.com/bid/4914)
3. [20020603 QNX](http://marc.info/?l=bugtraq&m=102312549511726&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6516
- **State**: PUBLISHED
- **Published Date**: July 22, 2020 at 16:16 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1092449)
3. [openSUSE-SU-2020:1061](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html)
4. [GLSA-202007-08](https://security.gentoo.org/glsa/202007-08)
5. [FEDORA-2020-bf684961d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/)
6. [FEDORA-2020-84d87cbd50](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/)
7. [openSUSE-SU-2020:1148](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html)
8. [openSUSE-SU-2020:1172](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html)
9. [openSUSE-SU-2020:1048](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html)
10. [DSA-4824](https://www.debian.org/security/2021/dsa-4824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2434
- **State**: PUBLISHED
- **Published Date**: April 02, 2017 at 01:36 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "HomeKit" component. It allows attackers to have an unspecified impact by leveraging the presence of Home Control on Control Center.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1038139](http://www.securitytracker.com/id/1038139)
2. [97138](http://www.securityfocus.com/bid/97138)
3. [](https://support.apple.com/HT207617) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1925
- **State**: PUBLISHED
- **Published Date**: July 16, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Chaos Tool Suite (ctools) module 7.x-1.x before 7.x-1.3 for Drupal does not properly restrict node access, which allows remote authenticated users with the "access content" permission to read restricted node titles via an autocomplete list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/121072/Drupal-Chaos-Tool-Suite-7.x-Access-Bypass.html)
2. [](https://drupal.org/node/1960406)
3. [91986](http://osvdb.org/91986)
4. [drupal-chaostool-node-security-bypass(83254)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83254)
5. [](https://drupal.org/node/1960424)
6. [20130403 [Security-news] SA-CONTRIB-2013-041 - Chaos tool suite (ctools) - Access bypass](http://seclists.org/fulldisclosure/2013/Apr/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5807
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 10, 2024 at 18:25 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Business Card WordPress plugin through 1.0.0 does not prevent high privilege users like administrators from uploading malicious PHP files, which could allow them to run arbitrary code on servers hosting their site, even in MultiSite configurations.
### Weakness Classification (CWE)
- CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness
### Affected Products
**Unknown - Business Card**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/)
### Credits
- Anjo Rev Tingson
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4845
- **State**: PUBLISHED
- **Published Date**: October 20, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The FTP client in IBM AIX 6.1 and 7.1, and VIOS 2.2.1.4-FP-25 SP-02, does not properly manage privileges in an RBAC environment, which allows attackers to bypass intended file-read restrictions by leveraging the setuid installation of the ftp executable file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IV28715](http://www.ibm.com/support/docview.wss?uid=isg1IV28715)
2. [IV23331](http://www.ibm.com/support/docview.wss?uid=isg1IV23331)
3. [](http://aix.software.ibm.com/aix/efixes/security/ftp_advisory1.asc)
4. [oval:org.mitre.oval:def:19695](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19695)
5. [IV28785](http://www.ibm.com/support/docview.wss?uid=isg1IV28785)
6. [IV28787](http://www.ibm.com/support/docview.wss?uid=isg1IV28787)
7. [56134](http://www.securityfocus.com/bid/56134)
8. [aix-ftp-setuid(79279)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79279) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0967
- **State**: PUBLISHED
- **Published Date**: February 02, 2025 at 15:31 UTC
- **Last Updated**: February 12, 2025 at 20:41 UTC
- **Reserved Date**: February 01, 2025 at 18:52 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/add_chatroom.php. The manipulation of the argument chatname/chatpass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Chat System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-294359 | code-projects Chat System add_chatroom.php sql injection](https://vuldb.com/?id.294359)
2. [VDB-294359 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.294359)
3. [Submit #492911 | code-projects Chat System Using PHP With Source Code 1.0 SQL Injection](https://vuldb.com/?submit.492911)
4. [](https://github.com/Team-intN18-SoybeanSeclab/CVE/blob/main/sqlinject1.md)
5. [](https://code-projects.org/)
### Credits
- HDSEC (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46088
- **State**: PUBLISHED
- **Published Date**: January 27, 2022 at 15:43 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/paalbra/zabbix-zbxsec-7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48767
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 16:43 UTC
- **Last Updated**: August 02, 2024 at 21:37 UTC
- **Reserved Date**: November 18, 2023 at 22:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Raghu Goriya MyTube PlayList allows Reflected XSS.This issue affects MyTube PlayList: from n/a through 2.0.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Raghu Goriya - MyTube PlayList**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/mytube/wordpress-mytube-playlist-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Abu Hurayra (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3392
- **State**: PUBLISHED
- **Published Date**: October 22, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 06:22 UTC
- **Reserved Date**: September 25, 2009 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Agile Engineering Data Management (EDM) component in Oracle E-Business Suite 6.1.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36770](http://www.securityfocus.com/bid/36770)
2. [TA09-294A](http://www.us-cert.gov/cas/techalerts/TA09-294A.html)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html)
4. [1023059](http://www.securitytracker.com/id?1023059) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39585
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 15:27 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/issues/133) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0291
- **State**: PUBLISHED
- **Published Date**: February 28, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM BigFix Platform 9.0, 9.1 before 9.1.8, and 9.2 before 9.2.8 allow remote authenticated users to execute arbitrary commands by leveraging report server access. IBM X-Force ID: 111302.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21985748)
2. [ibm-mdm-cve20160291-command-injection(111302)](https://exchange.xforce.ibmcloud.com/vulnerabilities/111302) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4457
- **State**: PUBLISHED
- **Published Date**: December 30, 2009 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in the Vsftpd Webmin module before 1.3b for the Vsftpd server have unknown impact and attack vectors related to "Some security issues."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37991](http://secunia.com/advisories/37991)
2. [41443](http://www.securityfocus.com/bid/41443)
3. [](http://freshmeat.net/projects/vsftpdwebmin/releases/310064)
4. [ADV-2009-3650](http://www.vupen.com/english/advisories/2009/3650)
5. [61362](http://osvdb.org/61362) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5569
- **State**: PUBLISHED
- **Published Date**: October 25, 2016 at 14:00 UTC
- **Last Updated**: October 10, 2024 at 18:25 UTC
- **Reserved Date**: June 16, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component in Oracle Financial Services Applications 12.0.0 and 12.1.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1037049](http://www.securitytracker.com/id/1037049)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html)
3. [93681](http://www.securityfocus.com/bid/93681) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11951
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 13:00 UTC
- **Last Updated**: August 04, 2024 at 11:42 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. There is a Backdoor root account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0004
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: January 02, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [linux-at-exetime-heap-corruption(7909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7909)
2. [HPSBTL0302-034](http://online.securityfocus.com/advisories/3969)
3. [DSA-102](http://www.debian.org/security/2002/dsa-102)
4. [RHSA-2002:015](http://www.redhat.com/support/errata/RHSA-2002-015.html)
5. [HPSBTL0201-021](http://online.securityfocus.com/advisories/3833)
6. [20020117 '/usr/bin/at 31337 + vuln' problem + exploit](http://marc.info/?l=bugtraq&m=101128661602088&w=2)
7. [3886](http://www.securityfocus.com/bid/3886)
8. [SuSE-SA:2002:003](http://www.novell.com/linux/security/advisories/2002_003_at_txt.html)
9. [MDKSA-2002:007](http://marc.info/?l=bugtraq&m=101147632721031&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1537
- **State**: PUBLISHED
- **Published Date**: March 28, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in pb_inc/admincenter/index.php in PowerScripts PowerBook 1.21 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080324 [DSECRG-08-019] LFI in PowerBook 1.21](http://www.securityfocus.com/archive/1/490008/100/0/threaded)
2. [5302](https://www.exploit-db.com/exploits/5302)
3. [powerbook-index-file-include(41393)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41393)
4. [3783](http://securityreason.com/securityalert/3783)
5. [29480](http://secunia.com/advisories/29480)
6. [28418](http://www.securityfocus.com/bid/28418) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0409
- **State**: PUBLISHED
- **Published Date**: February 08, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 13:03 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in libstagefright could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-31999646.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-6.0 (Status: affected)
- Android-6.0.1 (Status: affected)
- Android-7.0 (Status: affected)
- Android-7.1.1 (Status: affected)
### References
1. [1037798](http://www.securitytracker.com/id/1037798)
2. [96091](http://www.securityfocus.com/bid/96091)
3. [](https://source.android.com/security/bulletin/2017-02-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3918
- **State**: PUBLISHED
- **Published Date**: November 12, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA13-317A](http://www.us-cert.gov/ncas/alerts/TA13-317A)
2. [](http://www.darkreading.com/vulnerability/new-ie-vulnerability-found-in-the-wild-s/240163814/)
3. [MS13-090](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090)
4. [](http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-hole-attack.html)
5. [oval:org.mitre.oval:def:19089](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19089)
6. [](https://isc.sans.edu/forums/diary/16985)
7. [](http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-being-addressed-in-update-tuesday.aspx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20366
- **State**: PUBLISHED
- **Published Date**: January 08, 2020 at 16:26 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue was discovered in Ignite Realtime Openfire 4.4.4 via isTrustStore to Manage Store Contents.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://issues.igniterealtime.org/browse/OF-1955)
2. [](https://github.com/igniterealtime/Openfire/pull/1561)
3. [](https://cybersecurityworks.com/zerodays/cve-2019-20366-openfire.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34226
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 17:42 UTC
- **Last Updated**: February 13, 2025 at 15:53 UTC
- **Reserved Date**: May 02, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in SourceCodester Visitor Management System 1.0 allow attackers to execute arbitrary SQL commands via the id parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dovankha/CVE-2024-34226) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32592
- **State**: PUBLISHED
- **Published Date**: November 09, 2023 at 21:08 UTC
- **Last Updated**: September 03, 2024 at 18:09 UTC
- **Reserved Date**: May 10, 2023 at 09:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel by Edward Bock, Katharina Rompf Sunny Search plugin <= 1.0.2 versions.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Palasthotel by Edward Bock, Katharina Rompf - Sunny Search**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/fast-search-powered-by-solr/wordpress-sunny-search-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Lokesh Dachepalli (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22263
- **State**: PUBLISHED
- **Published Date**: October 11, 2021 at 16:47 UTC
- **Last Updated**: August 03, 2024 at 18:37 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab affecting all versions starting from 13.0 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. A user account with 'external' status which is granted 'Maintainer' role on any project on the GitLab instance where 'project tokens' are allowed may elevate its privilege to 'Internal' and access Internal projects.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=13.0, <14.0.9 (Status: affected)
- >=14.1, <14.1.4 (Status: affected)
- >=14.2, <14.2.2 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/331473)
2. [](https://hackerone.com/reports/1193062)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22263.json)
### Credits
- Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15028
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 03:57 UTC
- **Last Updated**: August 05, 2024 at 00:34 UTC
- **Reserved Date**: August 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2092
- **State**: PUBLISHED
- **Published Date**: December 06, 2019 at 16:19 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 04, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A Security Bypass vulnerability exists in Ubuntu Cobbler before 2,2,2 in the cobbler-ubuntu-import script due to an error when verifying the GPG signature.
### Affected Products
**Ubuntu - Cobbler**
Affected versions:
- before 2.2.2 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2012-2092)
2. [](http://www.securityfocus.com/bid/52971)
3. [](http://www.openwall.com/lists/oss-security/2012/04/10/14)
4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/74789) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6259
- **State**: PUBLISHED
- **Published Date**: August 31, 2018 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 01:20 UTC
- **Reserved Date**: January 25, 2018 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GeForce Experience all versions prior to 3.14.1 contains a potential vulnerability when GameStream is enabled, an attacker has system access, and certain system features are enabled, where limited information disclosure may be possible.
### Affected Products
**Nvidia Corporation - NVIDIA GeForce Experience**
Affected versions:
- All versions prior to 3.14.1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/4685) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6728
- **State**: PUBLISHED
- **Published Date**: July 14, 2024 at 00:31 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: July 13, 2024 at 05:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file typeedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271401 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**itsourcecode - Tailoring Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-271401 | itsourcecode Tailoring Management System typeedit.php sql injection](https://vuldb.com/?id.271401)
2. [VDB-271401 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.271401)
3. [Submit #372856 | itsourcecode Tailoring Management System Project In PHP 1.0 SQL Injection](https://vuldb.com/?submit.372856)
4. [](https://github.com/jeery0/cve/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10643
- **State**: PUBLISHED
- **Published Date**: July 27, 2020 at 21:20 UTC
- **Last Updated**: September 16, 2024 at 23:51 UTC
- **Reserved Date**: March 16, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An authenticated remote attacker could use specially crafted URLs to send a victim using PI Vision 2019 mobile to a vulnerable web page due to a known issue in a third-party component.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**OSIsoft - PI Vision**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02)
### Credits
- William Knowles, Senior Security Consultant at Applied Risk, reported these vulnerabilities to OSIsoft |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29274
- **State**: PUBLISHED
- **Published Date**: May 11, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:03 UTC
- **Reserved Date**: April 04, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Substance3D - Painter**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1675
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 07:22 UTC
- **Last Updated**: February 28, 2025 at 17:02 UTC
- **Reserved Date**: February 25, 2025 at 06:02 UTC
- **Assigned By**: zephyr
### Vulnerability Description
The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**zephyrproject-rtos - Zephyr**
Affected versions:
- * (Status: affected)
### References
1. [](https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2m84-5hfw-m8v4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5757
- **State**: PUBLISHED
- **Published Date**: March 21, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: November 02, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Web Client in IBM Rational ClearQuest 7.1.x before 7.1.2.10 and 8.x before 8.0.0.6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [PM77153](http://www-01.ibm.com/support/docview.wss?uid=swg1PM77153)
2. [rcq-reflected-xss(80061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80061)
3. [](http://www.ibm.com/support/docview.wss?uid=swg21619993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4264
- **State**: PUBLISHED
- **Published Date**: April 03, 2019 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 05:11 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
### Affected Products
**n/a - iOS, tvOS, watchOS, Safari, iTunes for Windows, iCloud for Windows**
Affected versions:
- Versions prior to: iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6 (Status: affected)
### References
1. [](https://support.apple.com/kb/HT208933)
2. [](https://support.apple.com/kb/HT208938)
3. [](https://support.apple.com/kb/HT208935)
4. [](https://support.apple.com/kb/HT208936)
5. [](https://support.apple.com/kb/HT208934)
6. [](https://support.apple.com/kb/HT208932) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4715
- **State**: PUBLISHED
- **Published Date**: May 10, 2024 at 12:00 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: May 10, 2024 at 05:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /model/update_grade.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263793 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Campcodes - Complete Web-Based School Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-263793 | Campcodes Complete Web-Based School Management System update_grade.php cross site scripting](https://vuldb.com/?id.263793)
2. [VDB-263793 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263793)
3. [Submit #331881 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.331881)
4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2038.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0637
- **State**: PUBLISHED
- **Published Date**: February 12, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 14:33 UTC
- **Reserved Date**: December 18, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2013:0296](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html)
2. [RHSA-2013:0254](http://rhn.redhat.com/errata/RHSA-2013-0254.html)
3. [openSUSE-SU-2013:0295](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html)
4. [openSUSE-SU-2013:0298](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html)
5. [TA13-043A](http://www.us-cert.gov/cas/techalerts/TA13-043A.html)
6. [](http://www.adobe.com/support/security/bulletins/apsb13-05.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.