System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58107 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 03:33 UTC - **Last Updated**: April 07, 2025 at 14:11 UTC - **Reserved Date**: March 27, 2025 at 07:13 UTC - **Assigned By**: huawei ### Vulnerability Description Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-680: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 5.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2025/4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2130 - **State**: PUBLISHED - **Published Date**: May 27, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 27, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in privmsg.php in phpBB 2.0.6 allow remote attackers to execute arbitrary script or HTML via the (1) folder or (2) mode variables. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040128 phpBB privmsg.php XSS vulnerability patch.](http://marc.info/?l=bugtraq&m=107530946123822&w=2) 2. [9290](http://www.securityfocus.com/bid/9290) 3. [](http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=161943)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23383, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23383 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23383 - **State**: PUBLISHED - **Published Date**: March 14, 2023 at 16:55 UTC - **Last Updated**: January 01, 2025 at 00:47 UTC - **Reserved Date**: January 11, 2023 at 22:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Service Fabric Explorer Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Microsoft - Azure Service Fabric 9.0 for Linux** Affected versions: - 9.0 (Status: affected) **Microsoft - Azure Service Fabric 9.1 for Windows** Affected versions: - 9.0 (Status: affected) **Microsoft - Azure Service Fabric 9.1 for Ubuntu** Affected versions: - 9.0 (Status: affected) **Microsoft - Azure Service Fabric 9.0 for Windows** Affected versions: - 9.0 (Status: affected) ### References 1. [Service Fabric Explorer Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23383)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6971, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6971 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6971 - **State**: PUBLISHED - **Published Date**: October 16, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Easy Video Downloader (aka com.simon.padillar.EasyVideo) application 4.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#921561](http://www.kb.cert.org/vuls/id/921561) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2853, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2853 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2853 - **State**: PUBLISHED - **Published Date**: July 09, 2023 at 16:39 UTC - **Last Updated**: October 23, 2024 at 19:08 UTC - **Reserved Date**: May 23, 2023 at 18:31 UTC - **Assigned By**: TR-CERT ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Softmed SelfPatron allows Reflected XSS.This issue affects SelfPatron : before 2.0. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Softmed - SelfPatron ** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.usom.gov.tr/bildirim/tr-23-0388) ### Credits - Omer Fatih YEGIN
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3811, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3811 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3811 - **State**: PUBLISHED - **Published Date**: May 26, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 05:56 UTC - **Reserved Date**: May 07, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2017:0631](http://rhn.redhat.com/errata/RHSA-2017-0631.html) 2. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978) 3. [DSA-3277](http://www.debian.org/security/2015/dsa-3277) 4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html) 5. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2) 6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html) 7. [GLSA-201510-03](https://security.gentoo.org/glsa/201510-03) 8. [](http://www.wireshark.org/security/wnpa-sec-2015-14.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40606, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40606 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40606 - **State**: PUBLISHED - **Published Date**: October 17, 2022 at 00:00 UTC - **Last Updated**: May 14, 2025 at 20:26 UTC - **Reserved Date**: September 12, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MITRE CALDERA before 4.1.0 allows XSS in the Operations tab and/or Debrief plugin via a crafted operation name, a different vulnerability than CVE-2022-40605. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mitre/caldera/releases/tag/4.1.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0500, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0500 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0500 - **State**: PUBLISHED - **Published Date**: January 20, 2011 at 18:00 UTC - **Last Updated**: September 16, 2024 at 17:04 UTC - **Reserved Date**: January 20, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42876](http://secunia.com/advisories/42876) 2. [42866](http://secunia.com/advisories/42866) 3. [15936](http://www.exploit-db.com/exploits/15936)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43982, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43982 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43982 - **State**: PUBLISHED - **Published Date**: November 03, 2023 at 00:00 UTC - **Last Updated**: September 05, 2024 at 14:41 UTC - **Reserved Date**: September 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bon Presta boninstagramcarousel between v5.2.1 to v7.0.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the url parameter at insta_parser.php. This vulnerability allows attackers to use the vulnerable website as proxy to attack other websites or exfiltrate data via a HTTP call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.friendsofpresta.org/modules/2023/11/02/boninstagramcarousel.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0795 - **State**: PUBLISHED - **Published Date**: March 20, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:28 UTC - **Reserved Date**: March 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HolaCMS 1.4.9 does not restrict file access to the holaDB/votes directory, which allows remote attackers to overwrite arbitrary files via a modified vote_filename parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050315 Virginity Security Advisory 2005-001 : Hola CMS - File destruction and System access](http://archives.neohapsis.com/archives/bugtraq/2005-03/0210.html) 2. [](http://www.holacms.de/?content=changelog) 3. [14566](http://secunia.com/advisories/14566) 4. [hola-votefilename-directory-traversal(19672)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19672)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13856 - **State**: PUBLISHED - **Published Date**: March 22, 2025 at 06:41 UTC - **Last Updated**: March 24, 2025 at 13:18 UTC - **Reserved Date**: February 10, 2025 at 21:38 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Your Friendly Drag and Drop Page Builder — Make Builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.10 via the make_builder_ajax_subscribe() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **thethemefoundry - Your Friendly Drag and Drop Page Builder — Make Builder** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7ffcb74b-230b-4629-b22d-5db96ac5fa06?source=cve) 2. [](https://wordpress.org/plugins/make-builder/#developers) 3. [](https://plugins.trac.wordpress.org/browser/make-builder/trunk/plugins-screen.php#L83) 4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3259333%40make-builder%2Ftrunk&old=2235851%40make-builder%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0398 - **State**: PUBLISHED - **Published Date**: October 30, 2019 at 21:07 UTC - **Last Updated**: August 07, 2024 at 00:45 UTC - **Reserved Date**: January 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2010-0398) 2. [](https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/538471)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24446, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24446 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24446 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 13:51 UTC - **Reserved Date**: January 23, 2023 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account. ### Affected Products **Jenkins Project - Jenkins OpenID Plugin** Affected versions: - unspecified (Status: affected) - next of 2.4 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2995)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36321, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36321 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36321 - **State**: PUBLISHED - **Published Date**: April 23, 2021 at 16:05 UTC - **Last Updated**: September 17, 2024 at 00:45 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: Vaadin ### Vulnerability Description Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Vaadin - Vaadin** Affected versions: - 14.0.0 (Status: affected) **Vaadin - flow-server** Affected versions: - 2.0.0 (Status: affected) ### References 1. [](https://vaadin.com/security/cve-2020-36321) 2. [](https://github.com/vaadin/flow/pull/9392)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48236 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 01:20 UTC - **Last Updated**: January 28, 2025 at 20:36 UTC - **Reserved Date**: January 09, 2023 at 11:51 UTC - **Assigned By**: Unisoc ### Vulnerability Description In MP3 encoder, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27061 - **State**: PUBLISHED - **Published Date**: March 11, 2021 at 15:49 UTC - **Last Updated**: October 01, 2024 at 15:55 UTC - **Reserved Date**: February 10, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description HEVC Video Extensions Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - HEVC Video Extensions** Affected versions: - N/A (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27061)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35706 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 15:47 UTC - **Last Updated**: April 23, 2025 at 16:57 UTC - **Reserved Date**: July 12, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Adobe - Bridge** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb22-49.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1879 - **State**: PUBLISHED - **Published Date**: January 29, 2016 at 19:00 UTC - **Last Updated**: August 05, 2024 at 23:10 UTC - **Reserved Date**: January 13, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Stream Control Transmission Protocol (SCTP) module in FreeBSD 9.3 before p33, 10.1 before p26, and 10.2 before p9, when the kernel is configured for IPv6, allows remote attackers to cause a denial of service (assertion failure or NULL pointer dereference and kernel panic) via a crafted ICMPv6 packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39305](https://www.exploit-db.com/exploits/39305/) 2. [FreeBSD-SA-16:01](https://www.freebsd.org/security/advisories/FreeBSD-SA-16:01.sctp.asc) 3. [1034673](http://www.securitytracker.com/id/1034673) 4. [](http://packetstormsecurity.com/files/135369/FreeBSD-SCTP-ICMPv6-Denial-Of-Service.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0947 - **State**: PUBLISHED - **Published Date**: June 02, 2021 at 15:58 UTC - **Last Updated**: August 07, 2024 at 04:57 UTC - **Reserved Date**: March 18, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple integer overflows in the (1) cdf_read_property_info and (2) cdf_read_sat functions in file before 5.02. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=498682)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4919 - **State**: PUBLISHED - **Published Date**: July 28, 2017 at 22:00 UTC - **Last Updated**: September 16, 2024 at 16:29 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware vCenter Server 5.5, 6.0, 6.5 allows vSphere users with certain, limited vSphere privileges to use the VIX API to access Guest Operating Systems without the need to authenticate. ### Affected Products **VMware - VMware vCenter Server** Affected versions: - VMware vCenter Server 5.5.x, 6.0.x, 6.5.x (Status: affected) ### References 1. [1039004](http://www.securitytracker.com/id/1039004) 2. [](http://www.vmware.com/security/advisories/VMSA-2017-0012.html) 3. [100102](http://www.securityfocus.com/bid/100102)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15441 - **State**: REJECTED - **Published Date**: May 27, 2021 at 20:13 UTC - **Last Updated**: May 27, 2021 at 20:13 UTC - **Reserved Date**: June 30, 2020 at 00:00 UTC - **Assigned By**: openEuler ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5827 - **State**: PUBLISHED - **Published Date**: January 02, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 11:04 UTC - **Reserved Date**: January 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Nokia 6131 Near Field Communication (NFC) phone with 05.12 firmware automatically installs software upon completing the download of a JAR file, which makes it easier for remote attackers to execute arbitrary code via a crafted URI record in an NDEF tag. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf) 2. [nokia-6131-ndef-recordparser-dos(44528)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44528) 3. [](http://events.ccc.de/congress/2008/Fahrplan/attachments/1109_collin_mulliner_eusecwest08_attacking_nfc_phones_slim.pdf) 4. [](http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html) 5. [](http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7005, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7005 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7005 - **State**: PUBLISHED - **Published Date**: February 12, 2007 at 23:00 UTC - **Last Updated**: September 16, 2024 at 23:46 UTC - **Reserved Date**: February 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in item.php in PSY Auction allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17974](http://www.securityfocus.com/bid/17974) 2. [](http://www.securityfocus.com/data/vulnerabilities/exploits/PSYAuction-0515-sql-html.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51546, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51546 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51546 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 08:44 UTC - **Last Updated**: August 02, 2024 at 22:40 UTC - **Reserved Date**: December 20, 2023 at 19:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Privilege Management vulnerability in WebToffee WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels allows Privilege Escalation.This issue affects WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels: from n/a through 4.2.1. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **WebToffee - WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/print-invoices-packing-slip-labels-for-woocommerce/wordpress-woocommerce-pdf-invoices-packing-slips-delivery-notes-and-shipping-labels-plugin-4-2-1-privilege-escalation-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7408, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7408 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7408 - **State**: PUBLISHED - **Published Date**: October 26, 2014 at 20:00 UTC - **Last Updated**: September 17, 2024 at 02:16 UTC - **Reserved Date**: October 26, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description F5 BIG-IP Analytics 11.x before 11.4.0 uses a predictable session cookie, which makes it easier for remote attackers to have unspecified impact by guessing the value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.f5.com/kb/en-us/solutions/public/14000/300/sol14334.html) 2. [68792](http://www.securityfocus.com/bid/68792)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22799 - **State**: PUBLISHED - **Published Date**: January 28, 2022 at 19:09 UTC - **Last Updated**: August 03, 2024 at 18:51 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-331: Insufficient Entropy vulnerability exists that could cause unintended connection from an internal network to an external network when an attacker manages to decrypt the SESU proxy password from the registry. Affected Product: Schneider Electric Software Update, V2.3.0 through V2.5.1 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2165, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2165 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2165 - **State**: PUBLISHED - **Published Date**: April 22, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255) 2. [](http://bugs.proftpd.org/show_bug.cgi?id=2922) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=237533) 4. [MDKSA-2007:130](http://www.mandriva.com/security/advisories?name=MDKSA-2007:130) 5. [25724](http://secunia.com/advisories/25724) 6. [23546](http://www.securityfocus.com/bid/23546) 7. [24867](http://secunia.com/advisories/24867) 8. [34602](http://osvdb.org/34602) 9. [ADV-2007-1444](http://www.vupen.com/english/advisories/2007/1444) 10. [1017931](http://securitytracker.com/id?1017931) 11. [FEDORA-2007-2613](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html) 12. [27516](http://secunia.com/advisories/27516) 13. [proftpd-authapi-security-bypass(33733)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36882, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36882 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36882 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 17:08 UTC - **Last Updated**: February 27, 2025 at 21:08 UTC - **Reserved Date**: June 27, 2023 at 20:28 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2568 - **State**: PUBLISHED - **Published Date**: May 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:34 UTC - **Reserved Date**: May 09, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description d41d8cd98f00b204e9800998ecf8427e.php in the management web server on the Seagate BlackArmor device allows remote attackers to change the administrator password via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [53670](http://www.securityfocus.com/bid/53670) 2. [blackarmor-network-sec-bypass(75854)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75854) 3. [49282](http://secunia.com/advisories/49282) 4. [VU#515283](http://www.kb.cert.org/vuls/id/515283)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3844 - **State**: PUBLISHED - **Published Date**: August 05, 2016 at 20:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description mediaserver in Android before 2016-08-05 on Nexus 9 and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 28299517. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-08-01.html) 2. [92241](http://www.securityfocus.com/bid/92241)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20637 - **State**: PUBLISHED - **Published Date**: March 20, 2019 at 18:46 UTC - **Last Updated**: August 05, 2024 at 12:05 UTC - **Reserved Date**: December 31, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1 allows remote attackers to cause a denial of service (unrecoverable blank profile) via crafted JavaScript code in the First Name and Last Name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gkaim.com/cve-2018-20637-vikas-chaudhary/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6924 - **State**: PUBLISHED - **Published Date**: January 15, 2019 at 20:00 UTC - **Last Updated**: September 16, 2024 at 16:57 UTC - **Reserved Date**: March 16, 2017 at 00:00 UTC - **Assigned By**: drupal ### Vulnerability Description In Drupal 8 prior to 8.3.7; When using the REST API, users without the correct permission can post comments via REST that are approved even if the user does not have permission to post approved comments. This issue only affects sites that have the RESTful Web Services (rest) module enabled, the comment entity REST resource enabled, and where an attacker can access a user account on the site with permissions to post comments, or where anonymous users can post comments. ### Affected Products **Drupal - Drupal Core** Affected versions: - Drupal 8 (Status: affected) ### References 1. [100368](http://www.securityfocus.com/bid/100368) 2. [](https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple) 3. [1039200](http://www.securitytracker.com/id/1039200)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2806, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2806 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2806 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 30, 2024 at 15:01 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.28 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.7.28 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 2. [](https://security.netapp.com/advisory/ntap-20200416-0003/) 3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5038 - **State**: PUBLISHED - **Published Date**: September 27, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 19:32 UTC - **Reserved Date**: September 27, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The FiWin SS28S WiFi VoIP SIP/Skype Phone, firmware version 01_02_07, has a hard-coded username and password, which allows remote attackers to gain administrative access via telnet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20154](http://www.securityfocus.com/bid/20154) 2. [](http://www.osnews.com/story.php/15923/Review-FiWin-SS28S-WiFi-VoIP-SIPSkype-Phone/) 3. [22041](http://secunia.com/advisories/22041) 4. [20060921 FiWin SS28S WiFi VoIP SIP/Skype Phone Hardcoded Telnet user/pass and debug access](http://archives.neohapsis.com/archives/fulldisclosure/2006-09/0391.html) 5. [fiwin-ss28s-default-account(29114)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29114)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4106 - **State**: PUBLISHED - **Published Date**: September 30, 2019 at 15:20 UTC - **Last Updated**: September 17, 2024 at 04:20 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM WebSphere eXtreme Scale 8.6 Admin Console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158099. ### Affected Products **IBM - WebSphere eXtreme Scale** Affected versions: - 8.6 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/1073864) 2. [ibm-websphere-cve20194106-xss (158099)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158099)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28837 - **State**: PUBLISHED - **Published Date**: May 11, 2022 at 17:59 UTC - **Last Updated**: September 16, 2024 at 18:08 UTC - **Reserved Date**: April 08, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Adobe - Acrobat Reader** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-16.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4477, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4477 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4477 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 05:58 UTC - **Last Updated**: May 19, 2025 at 13:33 UTC - **Reserved Date**: May 09, 2025 at 03:30 UTC - **Assigned By**: twcert ### Vulnerability Description The ThreatSonar Anti-Ransomware from TeamT5 has a Privilege Escalation vulnerability, allowing remote attackers with intermediate privileges to escalate their privileges to highest administrator level through a specific API. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **TeamT5 - ThreatSonar Anti-Ransomware** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-10129-18ea3-1.html) 2. [](https://www.twcert.org.tw/en/cp-139-10130-c0959-2.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0158 - **State**: PUBLISHED - **Published Date**: December 27, 2019 at 17:03 UTC - **Last Updated**: August 07, 2024 at 12:12 UTC - **Reserved Date**: January 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description thttpd 2007 has buffer underflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://taviso.decsystem.org/research.t2t)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0555 - **State**: PUBLISHED - **Published Date**: May 03, 2012 at 18:17 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: January 11, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0556, and CVE-2012-0557. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660640) 2. [1026949](http://www.securitytracker.com/id?1026949) 3. [53070](http://www.securityfocus.com/bid/53070) 4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html) 5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1066 - **State**: PUBLISHED - **Published Date**: March 02, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 03:51 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery. ### Affected Products **n/a - Linux kernel 4.11** Affected versions: - Linux kernel 4.11 (Status: affected) ### References 1. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html) 2. [DSA-4187](https://www.debian.org/security/2018/dsa-4187) 3. [[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html) 4. [](https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebb) 5. [DSA-4188](https://www.debian.org/security/2018/dsa-4188) 6. [USN-3880-1](https://usn.ubuntu.com/3880-1/) 7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1539599) 8. [USN-3880-2](https://usn.ubuntu.com/3880-2/) 9. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3680f78981d26c078a26e5c748531257ebb) 10. [](https://patchwork.kernel.org/patch/10187633/) 11. [103378](http://www.securityfocus.com/bid/103378)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12217 - **State**: PUBLISHED - **Published Date**: May 20, 2019 at 16:32 UTC - **Last Updated**: August 04, 2024 at 23:17 UTC - **Reserved Date**: May 20, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL stdio_read function in file/SDL_rwops.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.libsdl.org/show_bug.cgi?id=4626) 2. [[debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html) 3. [[debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html) 4. [openSUSE-SU-2019:2070](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html) 5. [openSUSE-SU-2019:2108](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html) 6. [FEDORA-2019-a6bc0fb143](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ2VRD57UOBT72JUC2DIFHEFCH4N64SW/) 7. [USN-4238-1](https://usn.ubuntu.com/4238-1/) 8. [FEDORA-2020-ff2fe47ba4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50537 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:32 UTC - **Last Updated**: November 20, 2024 at 14:54 UTC - **Reserved Date**: October 24, 2024 at 07:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stefano Marra Smart Mockups allows Stored XSS.This issue affects Smart Mockups: from n/a through 1.2.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Stefano Marra - Smart Mockups** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/smart-mockups/wordpress-smart-mockups-plugin-1-2-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12384, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12384 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12384 - **State**: PUBLISHED - **Published Date**: February 17, 2021 at 13:52 UTC - **Last Updated**: August 04, 2024 at 11:56 UTC - **Reserved Date**: April 28, 2020 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper access control in some Intel(R) Graphics Drivers before version 26.20.100.8476 may allow an authenticated user to potentially enable an escalation of privilege via local access. ### Affected Products **n/a - Intel(R) Graphics Drivers** Affected versions: - before version 26.20.100.8476 (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46572 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 19:44 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: January 26, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15366. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Bentley - MicroStation CONNECT** Affected versions: - 10.16.0.80 (Status: affected) ### References 1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-159/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33019, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33019 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33019 - **State**: PUBLISHED - **Published Date**: August 05, 2024 at 14:21 UTC - **Last Updated**: August 05, 2024 at 15:29 UTC - **Reserved Date**: April 23, 2024 at 04:42 UTC - **Assigned By**: qualcomm ### Vulnerability Description Transient DOS while parsing the received TID-to-link mapping action frame. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AR8035 (Status: affected) - CSR8811 (Status: affected) - FastConnect 6700 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Immersive Home 214 Platform (Status: affected) - Immersive Home 216 Platform (Status: affected) - Immersive Home 316 Platform (Status: affected) - Immersive Home 318 Platform (Status: affected) - Immersive Home 3210 Platform (Status: affected) - Immersive Home 326 Platform (Status: affected) - IPQ5010 (Status: affected) - IPQ5028 (Status: affected) - IPQ5300 (Status: affected) - IPQ5302 (Status: affected) - IPQ5312 (Status: affected) - IPQ5332 (Status: affected) - IPQ6000 (Status: affected) - IPQ6010 (Status: affected) - IPQ6018 (Status: affected) - IPQ6028 (Status: affected) - IPQ8070A (Status: affected) - IPQ8071A (Status: affected) - IPQ8072A (Status: affected) - IPQ8074A (Status: affected) - IPQ8076 (Status: affected) - IPQ8076A (Status: affected) - IPQ8078 (Status: affected) - IPQ8078A (Status: affected) - IPQ8173 (Status: affected) - IPQ8174 (Status: affected) - IPQ9008 (Status: affected) - IPQ9554 (Status: affected) - IPQ9574 (Status: affected) - QAM8255P (Status: affected) - QAM8620P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QAMSRV1H (Status: affected) - QAMSRV1M (Status: affected) - QCA4024 (Status: affected) - QCA6554A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6678AQ (Status: affected) - QCA6688AQ (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA8075 (Status: affected) - QCA8081 (Status: affected) - QCA8082 (Status: affected) - QCA8084 (Status: affected) - QCA8085 (Status: affected) - QCA8337 (Status: affected) - QCA8386 (Status: affected) - QCA9888 (Status: affected) - QCA9889 (Status: affected) - QCC2073 (Status: affected) - QCC2076 (Status: affected) - QCC710 (Status: affected) - QCF8000 (Status: affected) - QCF8001 (Status: affected) - QCM5430 (Status: affected) - QCM6490 (Status: affected) - QCM8550 (Status: affected) - QCN5022 (Status: affected) - QCN5024 (Status: affected) - QCN5052 (Status: affected) - QCN5122 (Status: affected) - QCN5124 (Status: affected) - QCN5152 (Status: affected) - QCN5154 (Status: affected) - QCN5164 (Status: affected) - QCN6023 (Status: affected) - QCN6024 (Status: affected) - QCN6112 (Status: affected) - QCN6122 (Status: affected) - QCN6132 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN6402 (Status: affected) - QCN6412 (Status: affected) - QCN6422 (Status: affected) - QCN6432 (Status: affected) - QCN9000 (Status: affected) - QCN9022 (Status: affected) - QCN9024 (Status: affected) - QCN9070 (Status: affected) - QCN9072 (Status: affected) - QCN9074 (Status: affected) - QCN9100 (Status: affected) - QCN9160 (Status: affected) - QCN9274 (Status: affected) - QCS5430 (Status: affected) - QCS6490 (Status: affected) - QCS8550 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - Qualcomm Video Collaboration VC3 Platform (Status: affected) - QXM8083 (Status: affected) - SA6155P (Status: affected) - SA7255P (Status: affected) - SA7775P (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8255P (Status: affected) - SA8620P (Status: affected) - SA8650P (Status: affected) - SA8770P (Status: affected) - SA8775P (Status: affected) - SA9000P (Status: affected) - SDX55 (Status: affected) - SDX65M (Status: affected) - SM8550P (Status: affected) - Snapdragon 8 Gen 2 Mobile Platform (Status: affected) - Snapdragon 8 Gen 3 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 2 Mobile Platform (Status: affected) - Snapdragon AR2 Gen 1 Platform (Status: affected) - Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon X72 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - SRV1H (Status: affected) - SRV1L (Status: affected) - SRV1M (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SXR1230P (Status: affected) - SXR2230P (Status: affected) - SXR2250P (Status: affected) - WCD9340 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29725 - **State**: PUBLISHED - **Published Date**: May 31, 2022 at 13:31 UTC - **Last Updated**: August 03, 2024 at 06:33 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload in the image upload component of wityCMS v0.6.2 allows attackers to execute arbitrary code via a crafted PHP file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Creatiwity/wityCMS/issues/161)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8596, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8596 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8596 - **State**: PUBLISHED - **Published Date**: November 17, 2014 at 16:00 UTC - **Last Updated**: August 06, 2024 at 13:26 UTC - **Reserved Date**: November 04, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in PHP-Fusion 7.02.07 allow remote authenticated users to execute arbitrary SQL commands via the (1) submit_id parameter in a 2 action to files/administration/submissions.php or (2) status parameter to files/administration/members.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [php-fusion-cve20148596-sql-injection(98583)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98583) 2. [](http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html) 3. [112419](http://osvdb.org/show/osvdb/112419) 4. [35206](http://www.exploit-db.com/exploits/35206) 5. [71053](http://www.securityfocus.com/bid/71053) 6. [](https://www.xlabs.com.br/blog/?p=282) 7. [](http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html) 8. [20151005 Blind SQL Injection in admin panel PHP-Fusion <= v7.02.07](http://seclists.org/fulldisclosure/2015/Oct/23)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3714, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3714 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3714 - **State**: PUBLISHED - **Published Date**: January 29, 2020 at 18:49 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Illustrator CC** Affected versions: - 24.0 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb20-03.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6708 - **State**: PUBLISHED - **Published Date**: April 10, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 11:41 UTC - **Reserved Date**: April 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x and 4.x, allows remote authenticated administrators to gain root privileges via unknown vectors related to configuration of "data viewing or restoring parameters." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-1943](http://www.vupen.com/english/advisories/2008/1943/references) 2. [30751](http://secunia.com/advisories/30751) 3. [](http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm) 4. [avaya-ses-parameters-code-execution(43390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43390) 5. [](http://www.voipshield.com/research-details.php?id=77) 6. [29939](http://www.securityfocus.com/bid/29939) 7. [46604](http://osvdb.org/46604)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7636, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7636 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7636 - **State**: PUBLISHED - **Published Date**: June 05, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in QNAP NAS application Proxy Server through version 1.2.0 allows remote attackers to inject arbitrary web script or HTML. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/nas-201806-01) 2. [1041025](http://www.securitytracker.com/id/1041025)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3668 - **State**: PUBLISHED - **Published Date**: October 11, 2009 at 22:00 UTC - **Last Updated**: September 17, 2024 at 03:08 UTC - **Reserved Date**: October 11, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in ardguest.php in Ardguest 1.8 allows remote attackers to inject arbitrary web script or HTML via the page parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36630](http://secunia.com/advisories/36630) 2. [](http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2756, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2756 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2756 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22732 - **State**: PUBLISHED - **Published Date**: August 05, 2021 at 16:24 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CMS Made Simple (CMSMS) 2.2.14 allows stored XSS via the Extensions > Fie Picker.. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://dev.cmsmadesimple.org/bug/view/12288)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36829 - **State**: PUBLISHED - **Published Date**: August 05, 2022 at 15:16 UTC - **Last Updated**: August 03, 2024 at 10:14 UTC - **Reserved Date**: July 27, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description PendingIntent hijacking vulnerability in releaseAlarm in Charm by Samsung prior to version 1.2.3 allows local attackers to access files without permission via implicit intent. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-927: Security Weakness ### Affected Products **Samsung Mobile - Charm by Samsung** Affected versions: - unspecified (Status: affected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=08)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18766 - **State**: PUBLISHED - **Published Date**: April 22, 2020 at 15:40 UTC - **Last Updated**: August 05, 2024 at 21:37 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects DST6501 before 1.1.0.6 and WNR2000v2 before 1.2.0.8. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000051479/Security-Advisory-for-Arbitrary-File-Read-on-DST6501-and-WNR2000v2-PSV-2017-0425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5093, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5093 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5093 - **State**: PUBLISHED - **Published Date**: August 07, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 00:53 UTC - **Reserved Date**: May 26, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/php/php-src/commit/97eff7eb57fc2320c267a949cffd622c38712484?w=1) 2. [[oss-security] 20160526 Re: Fwd: CVE for PHP 5.5.36 issues](http://www.openwall.com/lists/oss-security/2016/05/26/3) 3. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html) 4. [](https://bugs.php.net/bug.php?id=72241) 5. [DSA-3602](http://www.debian.org/security/2016/dsa-3602) 6. [](http://php.net/ChangeLog-5.php) 7. [](http://php.net/ChangeLog-7.php) 8. [90946](http://www.securityfocus.com/bid/90946) 9. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34814 - **State**: PUBLISHED - **Published Date**: June 30, 2022 at 17:49 UTC - **Last Updated**: August 03, 2024 at 09:22 UTC - **Reserved Date**: June 29, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view an administrative configuration page listing pending requests. ### Affected Products **Jenkins project - Jenkins Request Rename Or Delete Plugin** Affected versions: - unspecified (Status: affected) - next of 1.1.0 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1996)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32068, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32068 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32068 - **State**: PUBLISHED - **Published Date**: May 15, 2023 at 20:53 UTC - **Last Updated**: January 22, 2025 at 21:37 UTC - **Reserved Date**: May 01, 2023 at 16:47 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 14.10.4 it's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect. The issue has now been patched against all patterns that are known for performing redirects. This issue has been patched in XWiki 14.10.4 and 15.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **xwiki - xwiki-platform** Affected versions: - < 14.10.4 (Status: affected) ### References 1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j) 2. [https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e](https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e) 3. [https://jira.xwiki.org/browse/XWIKI-20096](https://jira.xwiki.org/browse/XWIKI-20096) 4. [https://jira.xwiki.org/browse/XWIKI-20549](https://jira.xwiki.org/browse/XWIKI-20549)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37790, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37790 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37790 - **State**: PUBLISHED - **Published Date**: November 08, 2023 at 00:00 UTC - **Last Updated**: September 04, 2024 at 15:19 UTC - **Reserved Date**: July 10, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jaspersoft Clarity PPM version 14.3.0.298 was discovered to contain an arbitrary file upload vulnerability via the Profile Picture Upload function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4735 - **State**: PUBLISHED - **Published Date**: October 24, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 24, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in header.php in Concord Asset, Software, and Ticket system (CoAST) 0.95 allows remote attackers to execute arbitrary PHP code via a URL in the sections_file parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32050](http://secunia.com/advisories/32050) 2. [6598](https://www.exploit-db.com/exploits/6598) 3. [31461](http://www.securityfocus.com/bid/31461)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1729, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1729 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1729 - **State**: PUBLISHED - **Published Date**: May 28, 2021 at 13:09 UTC - **Last Updated**: August 04, 2024 at 06:46 UTC - **Reserved Date**: November 27, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2 ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **n/a - SmallRye** Affected versions: - SmallRye 1.6.1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1802444)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-37858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-37858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-37858 - **State**: PUBLISHED - **Published Date**: May 09, 2025 at 06:42 UTC - **Last Updated**: May 26, 2025 at 05:22 UTC - **Reserved Date**: April 16, 2025 at 04:51 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: fs/jfs: Prevent integer overflow in AG size calculation The JFS filesystem calculates allocation group (AG) size using 1 << l2agsize in dbExtendFS(). When l2agsize exceeds 31 (possible with >2TB aggregates on 32-bit systems), this 32-bit shift operation causes undefined behavior and improper AG sizing. On 32-bit architectures: - Left-shifting 1 by 32+ bits results in 0 due to integer overflow - This creates invalid AG sizes (0 or garbage values) in sbi->bmap->db_agsize - Subsequent block allocations would reference invalid AG structures - Could lead to: - Filesystem corruption during extend operations - Kernel crashes due to invalid memory accesses - Security vulnerabilities via malformed on-disk structures Fix by casting to s64 before shifting: bmp->db_agsize = (s64)1 << l2agsize; This ensures 64-bit arithmetic even on 32-bit architectures. The cast matches the data type of db_agsize (s64) and follows similar patterns in JFS block calculation code. Found by Linux Verification Center (linuxtesting.org) with SVACE. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.4.293 (Status: unaffected) - 5.10.237 (Status: unaffected) - 5.15.181 (Status: unaffected) - 6.1.135 (Status: unaffected) - 6.6.88 (Status: unaffected) - 6.12.24 (Status: unaffected) - 6.13.12 (Status: unaffected) - 6.14.3 (Status: unaffected) - 6.15 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/dd07a985e2ded47b6c7d69fc93c1fe02977c8454) 2. [](https://git.kernel.org/stable/c/8bb29629a5e4090e1ef7199cb42db04a52802239) 3. [](https://git.kernel.org/stable/c/3d8a45f87010a802aa214bf39702ca9d99cbf3ba) 4. [](https://git.kernel.org/stable/c/55edbf5dbf60a8195c21e92124c4028939ae16b2) 5. [](https://git.kernel.org/stable/c/7ccf3b35274512b60ecb614e0637e76bd6f2d829) 6. [](https://git.kernel.org/stable/c/c802a6a4009f585111f903e810b3be9c6d0da329) 7. [](https://git.kernel.org/stable/c/211ed8f5e39e61f9e4d18edd64ce8005a67a1b2a) 8. [](https://git.kernel.org/stable/c/ec34cdf4f917cc6abd306cf091f8b8361fedac88) 9. [](https://git.kernel.org/stable/c/7fcbf789629cdb9fbf4e2172ce31136cfed11e5e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0366 - **State**: PUBLISHED - **Published Date**: June 18, 2003 at 04:00 UTC - **Last Updated**: September 17, 2024 at 00:46 UTC - **Reserved Date**: June 01, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lyskom-server 2.0.7 and earlier allows unauthenticated users to cause a denial of service (CPU consumption) via a large query. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-318](http://www.debian.org/security/2003/dsa-318)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1655 - **State**: PUBLISHED - **Published Date**: May 16, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 16, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in myaccount.php in Easy Scripts Answer and Question Script allow remote authenticated users to execute arbitrary SQL commands via the (1) user name (userid parameter) and (2) password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34975](http://www.securityfocus.com/bid/34975) 2. [8690](https://www.exploit-db.com/exploits/8690) 3. [35067](http://secunia.com/advisories/35067) 4. [54502](http://osvdb.org/54502)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3476, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3476 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3476 - **State**: PUBLISHED - **Published Date**: March 30, 2021 at 00:00 UTC - **Last Updated**: August 03, 2024 at 16:53 UTC - **Reserved Date**: March 29, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability. ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **n/a - OpenEXR** Affected versions: - OpenEXR 3.0.0-beta (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939145) 2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787) 3. [[debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html) 4. [GLSA-202107-27](https://security.gentoo.org/glsa/202107-27) 5. [[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7554, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7554 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7554 - **State**: REJECTED - **Published Date**: September 26, 2016 at 19:00 UTC - **Last Updated**: September 26, 2016 at 19:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2039 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:51 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description /bin/su in QNX realtime operating system (RTOS) 4.25 and 6.1.0 allows local users to obtain sensitive information from core dump files by sending the SIGSERV (invalid memory reference) signal. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [qnx-rtos-su-core-dump(9256)](http://www.iss.net/security_center/static/9256.php) 2. [4914](http://www.securityfocus.com/bid/4914) 3. [20020603 QNX](http://marc.info/?l=bugtraq&m=102312549511726&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6516 - **State**: PUBLISHED - **Published Date**: July 22, 2020 at 16:16 UTC - **Last Updated**: August 04, 2024 at 09:02 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1092449) 3. [openSUSE-SU-2020:1061](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html) 4. [GLSA-202007-08](https://security.gentoo.org/glsa/202007-08) 5. [FEDORA-2020-bf684961d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/) 6. [FEDORA-2020-84d87cbd50](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/) 7. [openSUSE-SU-2020:1148](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html) 8. [openSUSE-SU-2020:1172](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html) 9. [openSUSE-SU-2020:1048](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html) 10. [DSA-4824](https://www.debian.org/security/2021/dsa-4824)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2434 - **State**: PUBLISHED - **Published Date**: April 02, 2017 at 01:36 UTC - **Last Updated**: August 05, 2024 at 13:55 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "HomeKit" component. It allows attackers to have an unspecified impact by leveraging the presence of Home Control on Control Center. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1038139](http://www.securitytracker.com/id/1038139) 2. [97138](http://www.securityfocus.com/bid/97138) 3. [](https://support.apple.com/HT207617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1925, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1925 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1925 - **State**: PUBLISHED - **Published Date**: July 16, 2013 at 18:00 UTC - **Last Updated**: August 06, 2024 at 15:20 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Chaos Tool Suite (ctools) module 7.x-1.x before 7.x-1.3 for Drupal does not properly restrict node access, which allows remote authenticated users with the "access content" permission to read restricted node titles via an autocomplete list. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/121072/Drupal-Chaos-Tool-Suite-7.x-Access-Bypass.html) 2. [](https://drupal.org/node/1960406) 3. [91986](http://osvdb.org/91986) 4. [drupal-chaostool-node-security-bypass(83254)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83254) 5. [](https://drupal.org/node/1960424) 6. [20130403 [Security-news] SA-CONTRIB-2013-041 - Chaos tool suite (ctools) - Access bypass](http://seclists.org/fulldisclosure/2013/Apr/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5807 - **State**: PUBLISHED - **Published Date**: July 30, 2024 at 06:00 UTC - **Last Updated**: August 01, 2024 at 21:25 UTC - **Reserved Date**: June 10, 2024 at 18:25 UTC - **Assigned By**: WPScan ### Vulnerability Description The Business Card WordPress plugin through 1.0.0 does not prevent high privilege users like administrators from uploading malicious PHP files, which could allow them to run arbitrary code on servers hosting their site, even in MultiSite configurations. ### Weakness Classification (CWE) - CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness ### Affected Products **Unknown - Business Card** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/) ### Credits - Anjo Rev Tingson - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4845 - **State**: PUBLISHED - **Published Date**: October 20, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:50 UTC - **Reserved Date**: September 06, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The FTP client in IBM AIX 6.1 and 7.1, and VIOS 2.2.1.4-FP-25 SP-02, does not properly manage privileges in an RBAC environment, which allows attackers to bypass intended file-read restrictions by leveraging the setuid installation of the ftp executable file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IV28715](http://www.ibm.com/support/docview.wss?uid=isg1IV28715) 2. [IV23331](http://www.ibm.com/support/docview.wss?uid=isg1IV23331) 3. [](http://aix.software.ibm.com/aix/efixes/security/ftp_advisory1.asc) 4. [oval:org.mitre.oval:def:19695](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19695) 5. [IV28785](http://www.ibm.com/support/docview.wss?uid=isg1IV28785) 6. [IV28787](http://www.ibm.com/support/docview.wss?uid=isg1IV28787) 7. [56134](http://www.securityfocus.com/bid/56134) 8. [aix-ftp-setuid(79279)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79279)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0967, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0967 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0967 - **State**: PUBLISHED - **Published Date**: February 02, 2025 at 15:31 UTC - **Last Updated**: February 12, 2025 at 20:41 UTC - **Reserved Date**: February 01, 2025 at 18:52 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/add_chatroom.php. The manipulation of the argument chatname/chatpass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **code-projects - Chat System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-294359 | code-projects Chat System add_chatroom.php sql injection](https://vuldb.com/?id.294359) 2. [VDB-294359 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.294359) 3. [Submit #492911 | code-projects Chat System Using PHP With Source Code 1.0 SQL Injection](https://vuldb.com/?submit.492911) 4. [](https://github.com/Team-intN18-SoybeanSeclab/CVE/blob/main/sqlinject1.md) 5. [](https://code-projects.org/) ### Credits - HDSEC (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46088 - **State**: PUBLISHED - **Published Date**: January 27, 2022 at 15:43 UTC - **Last Updated**: August 04, 2024 at 05:02 UTC - **Reserved Date**: January 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/paalbra/zabbix-zbxsec-7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48767 - **State**: PUBLISHED - **Published Date**: December 14, 2023 at 16:43 UTC - **Last Updated**: August 02, 2024 at 21:37 UTC - **Reserved Date**: November 18, 2023 at 22:25 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Raghu Goriya MyTube PlayList allows Reflected XSS.This issue affects MyTube PlayList: from n/a through 2.0.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Raghu Goriya - MyTube PlayList** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/mytube/wordpress-mytube-playlist-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Abu Hurayra (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3392, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3392 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3392 - **State**: PUBLISHED - **Published Date**: October 22, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 06:22 UTC - **Reserved Date**: September 25, 2009 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Agile Engineering Data Management (EDM) component in Oracle E-Business Suite 6.1.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36770](http://www.securityfocus.com/bid/36770) 2. [TA09-294A](http://www.us-cert.gov/cas/techalerts/TA09-294A.html) 3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html) 4. [1023059](http://www.securitytracker.com/id?1023059)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39585 - **State**: PUBLISHED - **Published Date**: September 20, 2021 at 15:27 UTC - **Last Updated**: August 04, 2024 at 02:13 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/matthiaskramm/swftools/issues/133)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0291 - **State**: PUBLISHED - **Published Date**: February 28, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 22:15 UTC - **Reserved Date**: December 08, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM BigFix Platform 9.0, 9.1 before 9.1.8, and 9.2 before 9.2.8 allow remote authenticated users to execute arbitrary commands by leveraging report server access. IBM X-Force ID: 111302. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21985748) 2. [ibm-mdm-cve20160291-command-injection(111302)](https://exchange.xforce.ibmcloud.com/vulnerabilities/111302)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4457 - **State**: PUBLISHED - **Published Date**: December 30, 2009 at 00:00 UTC - **Last Updated**: August 07, 2024 at 07:01 UTC - **Reserved Date**: December 29, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in the Vsftpd Webmin module before 1.3b for the Vsftpd server have unknown impact and attack vectors related to "Some security issues." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37991](http://secunia.com/advisories/37991) 2. [41443](http://www.securityfocus.com/bid/41443) 3. [](http://freshmeat.net/projects/vsftpdwebmin/releases/310064) 4. [ADV-2009-3650](http://www.vupen.com/english/advisories/2009/3650) 5. [61362](http://osvdb.org/61362)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5569, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5569 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5569 - **State**: PUBLISHED - **Published Date**: October 25, 2016 at 14:00 UTC - **Last Updated**: October 10, 2024 at 18:25 UTC - **Reserved Date**: June 16, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component in Oracle Financial Services Applications 12.0.0 and 12.1.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1037049](http://www.securitytracker.com/id/1037049) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html) 3. [93681](http://www.securityfocus.com/bid/93681)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11951 - **State**: PUBLISHED - **Published Date**: July 14, 2020 at 13:00 UTC - **Last Updated**: August 04, 2024 at 11:42 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. There is a Backdoor root account. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-multiple-rittal-products-based-on-same-software/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0004 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:35 UTC - **Reserved Date**: January 02, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [linux-at-exetime-heap-corruption(7909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7909) 2. [HPSBTL0302-034](http://online.securityfocus.com/advisories/3969) 3. [DSA-102](http://www.debian.org/security/2002/dsa-102) 4. [RHSA-2002:015](http://www.redhat.com/support/errata/RHSA-2002-015.html) 5. [HPSBTL0201-021](http://online.securityfocus.com/advisories/3833) 6. [20020117 '/usr/bin/at 31337 + vuln' problem + exploit](http://marc.info/?l=bugtraq&m=101128661602088&w=2) 7. [3886](http://www.securityfocus.com/bid/3886) 8. [SuSE-SA:2002:003](http://www.novell.com/linux/security/advisories/2002_003_at_txt.html) 9. [MDKSA-2002:007](http://marc.info/?l=bugtraq&m=101147632721031&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1537 - **State**: PUBLISHED - **Published Date**: March 28, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 08:24 UTC - **Reserved Date**: March 28, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in pb_inc/admincenter/index.php in PowerScripts PowerBook 1.21 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080324 [DSECRG-08-019] LFI in PowerBook 1.21](http://www.securityfocus.com/archive/1/490008/100/0/threaded) 2. [5302](https://www.exploit-db.com/exploits/5302) 3. [powerbook-index-file-include(41393)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41393) 4. [3783](http://securityreason.com/securityalert/3783) 5. [29480](http://secunia.com/advisories/29480) 6. [28418](http://www.securityfocus.com/bid/28418)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0409 - **State**: PUBLISHED - **Published Date**: February 08, 2017 at 15:00 UTC - **Last Updated**: August 05, 2024 at 13:03 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description A remote code execution vulnerability in libstagefright could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-31999646. ### Affected Products **Google Inc. - Android** Affected versions: - Android-6.0 (Status: affected) - Android-6.0.1 (Status: affected) - Android-7.0 (Status: affected) - Android-7.1.1 (Status: affected) ### References 1. [1037798](http://www.securitytracker.com/id/1037798) 2. [96091](http://www.securityfocus.com/bid/96091) 3. [](https://source.android.com/security/bulletin/2017-02-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3918 - **State**: PUBLISHED - **Published Date**: November 12, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 16:22 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA13-317A](http://www.us-cert.gov/ncas/alerts/TA13-317A) 2. [](http://www.darkreading.com/vulnerability/new-ie-vulnerability-found-in-the-wild-s/240163814/) 3. [MS13-090](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090) 4. [](http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-hole-attack.html) 5. [oval:org.mitre.oval:def:19089](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19089) 6. [](https://isc.sans.edu/forums/diary/16985) 7. [](http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-being-addressed-in-update-tuesday.aspx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20366 - **State**: PUBLISHED - **Published Date**: January 08, 2020 at 16:26 UTC - **Last Updated**: August 05, 2024 at 02:39 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An XSS issue was discovered in Ignite Realtime Openfire 4.4.4 via isTrustStore to Manage Store Contents. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://issues.igniterealtime.org/browse/OF-1955) 2. [](https://github.com/igniterealtime/Openfire/pull/1561) 3. [](https://cybersecurityworks.com/zerodays/cve-2019-20366-openfire.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34226 - **State**: PUBLISHED - **Published Date**: May 13, 2024 at 17:42 UTC - **Last Updated**: February 13, 2025 at 15:53 UTC - **Reserved Date**: May 02, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in SourceCodester Visitor Management System 1.0 allow attackers to execute arbitrary SQL commands via the id parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/dovankha/CVE-2024-34226)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32592 - **State**: PUBLISHED - **Published Date**: November 09, 2023 at 21:08 UTC - **Last Updated**: September 03, 2024 at 18:09 UTC - **Reserved Date**: May 10, 2023 at 09:25 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel by Edward Bock, Katharina Rompf Sunny Search plugin <= 1.0.2 versions. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Palasthotel by Edward Bock, Katharina Rompf - Sunny Search** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/fast-search-powered-by-solr/wordpress-sunny-search-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Lokesh Dachepalli (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22263, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22263 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22263 - **State**: PUBLISHED - **Published Date**: October 11, 2021 at 16:47 UTC - **Last Updated**: August 03, 2024 at 18:37 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab affecting all versions starting from 13.0 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. A user account with 'external' status which is granted 'Maintainer' role on any project on the GitLab instance where 'project tokens' are allowed may elevate its privilege to 'Internal' and access Internal projects. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=13.0, <14.0.9 (Status: affected) - >=14.1, <14.1.4 (Status: affected) - >=14.2, <14.2.2 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/331473) 2. [](https://hackerone.com/reports/1193062) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22263.json) ### Credits - Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15028 - **State**: PUBLISHED - **Published Date**: August 14, 2019 at 03:57 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 13, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://developer.joomla.org/security-centre/789-20190801-core-hardening-com-contact-contact-form)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2092 - **State**: PUBLISHED - **Published Date**: December 06, 2019 at 16:19 UTC - **Last Updated**: August 06, 2024 at 19:26 UTC - **Reserved Date**: April 04, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A Security Bypass vulnerability exists in Ubuntu Cobbler before 2,2,2 in the cobbler-ubuntu-import script due to an error when verifying the GPG signature. ### Affected Products **Ubuntu - Cobbler** Affected versions: - before 2.2.2 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2012-2092) 2. [](http://www.securityfocus.com/bid/52971) 3. [](http://www.openwall.com/lists/oss-security/2012/04/10/14) 4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/74789)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6259, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6259 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6259 - **State**: PUBLISHED - **Published Date**: August 31, 2018 at 21:00 UTC - **Last Updated**: September 17, 2024 at 01:20 UTC - **Reserved Date**: January 25, 2018 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA GeForce Experience all versions prior to 3.14.1 contains a potential vulnerability when GameStream is enabled, an attacker has system access, and certain system features are enabled, where limited information disclosure may be possible. ### Affected Products **Nvidia Corporation - NVIDIA GeForce Experience** Affected versions: - All versions prior to 3.14.1 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/4685)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6728 - **State**: PUBLISHED - **Published Date**: July 14, 2024 at 00:31 UTC - **Last Updated**: August 01, 2024 at 21:41 UTC - **Reserved Date**: July 13, 2024 at 05:29 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file typeedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271401 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **itsourcecode - Tailoring Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-271401 | itsourcecode Tailoring Management System typeedit.php sql injection](https://vuldb.com/?id.271401) 2. [VDB-271401 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.271401) 3. [Submit #372856 | itsourcecode Tailoring Management System Project In PHP 1.0 SQL Injection](https://vuldb.com/?submit.372856) 4. [](https://github.com/jeery0/cve/issues/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10643 - **State**: PUBLISHED - **Published Date**: July 27, 2020 at 21:20 UTC - **Last Updated**: September 16, 2024 at 23:51 UTC - **Reserved Date**: March 16, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An authenticated remote attacker could use specially crafted URLs to send a victim using PI Vision 2019 mobile to a vulnerable web page due to a known issue in a third-party component. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **OSIsoft - PI Vision** Affected versions: - unspecified (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-133-02) ### Credits - William Knowles, Senior Security Consultant at Applied Risk, reported these vulnerabilities to OSIsoft
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29274 - **State**: PUBLISHED - **Published Date**: May 11, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 19:03 UTC - **Reserved Date**: April 04, 2023 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Substance3D - Painter** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1675 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 07:22 UTC - **Last Updated**: February 28, 2025 at 17:02 UTC - **Reserved Date**: February 25, 2025 at 06:02 UTC - **Assigned By**: zephyr ### Vulnerability Description The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **zephyrproject-rtos - Zephyr** Affected versions: - * (Status: affected) ### References 1. [](https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2m84-5hfw-m8v4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5757 - **State**: PUBLISHED - **Published Date**: March 21, 2013 at 20:00 UTC - **Last Updated**: August 06, 2024 at 21:14 UTC - **Reserved Date**: November 02, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Web Client in IBM Rational ClearQuest 7.1.x before 7.1.2.10 and 8.x before 8.0.0.6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [PM77153](http://www-01.ibm.com/support/docview.wss?uid=swg1PM77153) 2. [rcq-reflected-xss(80061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80061) 3. [](http://www.ibm.com/support/docview.wss?uid=swg21619993)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4264 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:11 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6. ### Affected Products **n/a - iOS, tvOS, watchOS, Safari, iTunes for Windows, iCloud for Windows** Affected versions: - Versions prior to: iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT208933) 2. [](https://support.apple.com/kb/HT208938) 3. [](https://support.apple.com/kb/HT208935) 4. [](https://support.apple.com/kb/HT208936) 5. [](https://support.apple.com/kb/HT208934) 6. [](https://support.apple.com/kb/HT208932)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4715 - **State**: PUBLISHED - **Published Date**: May 10, 2024 at 12:00 UTC - **Last Updated**: August 01, 2024 at 20:47 UTC - **Reserved Date**: May 10, 2024 at 05:37 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /model/update_grade.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263793 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-263793 | Campcodes Complete Web-Based School Management System update_grade.php cross site scripting](https://vuldb.com/?id.263793) 2. [VDB-263793 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263793) 3. [Submit #331881 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.331881) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2038.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0637 - **State**: PUBLISHED - **Published Date**: February 12, 2013 at 20:00 UTC - **Last Updated**: August 06, 2024 at 14:33 UTC - **Reserved Date**: December 18, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to obtain sensitive information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2013:0296](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html) 2. [RHSA-2013:0254](http://rhn.redhat.com/errata/RHSA-2013-0254.html) 3. [openSUSE-SU-2013:0295](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html) 4. [openSUSE-SU-2013:0298](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html) 5. [TA13-043A](http://www.us-cert.gov/cas/techalerts/TA13-043A.html) 6. [](http://www.adobe.com/support/security/bulletins/apsb13-05.html)