System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1304
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31575
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 12:55 UTC
- **Last Updated**: March 31, 2025 at 15:21 UTC
- **Reserved Date**: March 31, 2025 at 10:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vasilis Triantafyllou Flag Icons allows Stored XSS. This issue affects Flag Icons: from n/a through 2.2.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**Vasilis Triantafyllou - Flag Icons**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/language-icons-flags-switcher/vulnerability/wordpress-flag-icons-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Caesar Evan Santoso (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11869
- **State**: PUBLISHED
- **Published Date**: September 18, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 07, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow in WMA handler.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin)
2. [](https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=e359db47f1e334886eaaf1d71a4754dd312be01c)
3. [107770](http://www.securityfocus.com/bid/107770) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-53081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-53081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-53081
- **State**: PUBLISHED
- **Published Date**: May 02, 2025 at 15:55 UTC
- **Last Updated**: May 04, 2025 at 12:50 UTC
- **Reserved Date**: May 02, 2025 at 15:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix data corruption after failed write
When buffered write fails to copy data into underlying page cache page,
ocfs2_write_end_nolock() just zeroes out and dirties the page. This can
leave dirty page beyond EOF and if page writeback tries to write this page
before write succeeds and expands i_size, page gets into inconsistent
state where page dirty bit is clear but buffer dirty bits stay set
resulting in page data never getting written and so data copied to the
page is lost. Fix the problem by invalidating page beyond EOF after
failed write.
### Affected Products
**Linux - Linux**
Affected versions:
- 7ed80e77c908cbaa686529a49f8ae0060c5caee7 (Status: affected)
- 7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47 (Status: affected)
- f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8 (Status: affected)
- 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b (Status: affected)
- 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b (Status: affected)
- 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b (Status: affected)
- 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b (Status: affected)
- 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b (Status: affected)
- acef5107e2eacb08a16ad5db60320d65bd26a6c0 (Status: affected)
- 36ed9e604215f58cec0381ca5fcc6da05f2d87ca (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 4.14.312 (Status: unaffected)
- 4.19.280 (Status: unaffected)
- 5.4.240 (Status: unaffected)
- 5.10.177 (Status: unaffected)
- 5.15.105 (Status: unaffected)
- 6.1.21 (Status: unaffected)
- 6.2.8 (Status: unaffected)
- 6.3 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1629f6f522b2d058019710466a84b240683bbee3)
2. [](https://git.kernel.org/stable/c/c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45)
3. [](https://git.kernel.org/stable/c/4c24eb49ab44351424ac8fe8567f91ea48a06089)
4. [](https://git.kernel.org/stable/c/91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68)
5. [](https://git.kernel.org/stable/c/a9e53869cb43c96d6d851c491fd4e26430ab6ba6)
6. [](https://git.kernel.org/stable/c/47eb055ad3588fc96d34e9e1dd87b210ce62906b)
7. [](https://git.kernel.org/stable/c/205759c6c18f54659b0b5976b14a52d1b3eb9f57)
8. [](https://git.kernel.org/stable/c/90410bcf873cf05f54a32183afff0161f44f9715) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17015
- **State**: PUBLISHED
- **Published Date**: January 08, 2020 at 21:26 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 30, 2019 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- before 68.4 (Status: affected)
**Mozilla - Firefox**
Affected versions:
- before 72 (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1599005)
2. [](https://www.mozilla.org/security/advisories/mfsa2020-01/)
3. [](https://www.mozilla.org/security/advisories/mfsa2020-02/)
4. [20200112 [slackware-security] mozilla-thunderbird (SSA:2020-010-01)](https://seclists.org/bugtraq/2020/Jan/18)
5. [](http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html)
6. [openSUSE-SU-2020:0060](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html)
7. [openSUSE-SU-2020:0094](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9734
- **State**: PUBLISHED
- **Published Date**: April 24, 2019 at 14:04 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file due to an overwriting of configuration parameters under certain circumstances.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/aquaverde/aquarius-core/commit/d1dfa5b8280388a0b6f2f341f0681522dbea03b0)
2. [](https://www.tryption.ch/2019/04/19/cve-2019-9734-password-leakage-im-aquarius-cms/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23679
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 14:21 UTC
- **Last Updated**: October 18, 2024 at 13:01 UTC
- **Reserved Date**: January 17, 2023 at 05:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in JS Help Desk js-support-ticket allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JS Help Desk: from n/a through 2.7.7.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**JS Help Desk - JS Help Desk**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-best-help-desk-support-plugin-plugin-2-7-7-idor-leading-to-ticket-deletion-vulnerability?_s_id=cve)
### Credits
- Fariq Fadillah Gusti Insani (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37962
- **State**: PUBLISHED
- **Published Date**: October 08, 2021 at 21:30 UTC
- **Last Updated**: August 04, 2024 at 01:30 UTC
- **Reserved Date**: August 03, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html)
2. [](https://crbug.com/1231933)
3. [FEDORA-2021-ab09a05562](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/)
4. [FEDORA-2021-591b3a2af0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/)
5. [DSA-5046](https://www.debian.org/security/2022/dsa-5046) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2252
- **State**: PUBLISHED
- **Published Date**: July 13, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:22 UTC
- **Reserved Date**: July 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PhpAuction 2.5 allows remote attackers to bypass authentication and gain privileges as another user by setting the PHPAUCTION_RM_ID cookie to the user ID.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1014423](http://securitytracker.com/id?1014423)
2. [15967](http://secunia.com/advisories/15967) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47439
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 14:21 UTC
- **Last Updated**: January 09, 2025 at 15:24 UTC
- **Reserved Date**: December 15, 2022 at 00:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rocket Apps Open Graphite plugin <= 1.6.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Rocket Apps - Open Graphite**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/open-graphite/wordpress-open-graphite-plugin-1-5-1-cross-site-scripting-xss?_s_id=cve)
### Credits
- minhtuanact (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0869
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Explorer 3.x to 4.01 allows a remote attacker to insert malicious content into a frame of another web site, aka frame spoofing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS98-020](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-020) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38134
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 15:14 UTC
- **Last Updated**: February 20, 2025 at 20:01 UTC
- **Reserved Date**: September 08, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (subscriber+) Broken Access Control vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**CusRev - Customer Reviews for WooCommerce (WordPress plugin)**
Affected versions:
- <= 5.3.5 (Status: affected)
### References
1. [](https://wordpress.org/plugins/customer-reviews-woocommerce/#developers)
2. [](https://patchstack.com/database/vulnerability/customer-reviews-woocommerce/wordpress-customer-reviews-for-woocommerce-plugin-5-3-5-authenticated-broken-access-control-vulnerability/_s_id=cve)
### Credits
- Vulnerability discovered by Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0662
- **State**: PUBLISHED
- **Published Date**: February 18, 2010 at 17:19 UTC
- **Last Updated**: August 07, 2024 at 00:59 UTC
- **Reserved Date**: February 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not use the correct variables in calculations designed to prevent integer overflows, which allows attackers to leverage renderer access to cause a denial of service or possibly have unspecified other impact via bitmap data, related to deserialization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html)
2. [1023506](http://securitytracker.com/id?1023506)
3. [](http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs)
4. [googlechrome-paramtraits-dos(56627)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56627)
5. [](http://code.google.com/p/chromium/issues/detail?id=31307)
6. [oval:org.mitre.oval:def:14457](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14457) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10607
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 22:40 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
openframe-glsviewer is a Openframe extension which adds support for shaders via glslViewer. openframe-glsviewer downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - openframe-glslviewer node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/208) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45404
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 15:14 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Through a series of popup and <code>window.print()</code> calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-47/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-49/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-48/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1790815) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13983
- **State**: PUBLISHED
- **Published Date**: September 29, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 19:13 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to bypass authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://softwaresupport.hpe.com/km/KM02942065)
2. [ESB-2017.2274](https://www.auscert.org.au/bulletins/52154)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-17-722/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46448
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:43 UTC
- **Last Updated**: May 23, 2025 at 13:43 UTC
- **Reserved Date**: April 24, 2025 at 14:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reifsnyderb Document Management System allows Reflected XSS. This issue affects Document Management System: from n/a through 1.24.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**reifsnyderb - Document Management System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/dms/vulnerability/wordpress-document-management-system-1-24-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21644
- **State**: PUBLISHED
- **Published Date**: September 05, 2023 at 06:23 UTC
- **Last Updated**: September 06, 2024 at 14:34 UTC
- **Reserved Date**: December 07, 2022 at 02:58 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-680: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCC5100 (Status: affected)
- SA515M (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SDA429W (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDXR2 5G (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9380 (Status: affected)
- WCN3610 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3998 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25166
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 10:12 UTC
- **Last Updated**: February 12, 2025 at 20:51 UTC
- **Reserved Date**: February 03, 2025 at 13:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in gabrieldarezzo InLocation allows Stored XSS. This issue affects InLocation: from n/a through 1.8.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**gabrieldarezzo - InLocation**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/inlocation/vulnerability/wordpress-inlocation-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2461
- **State**: PUBLISHED
- **Published Date**: April 16, 2014 at 02:05 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 13, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 5.5.06, 6.0, 6.1, 6.2, 6.3, 6.3.1, 6.3.2, and 6.3.3 allows remote attackers to affect confidentiality via unknown vectors related to Security.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17169
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:43 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900.
### Affected Products
**n/a - DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981**
Affected versions:
- V500R002C00 (Status: affected)
- V500R002C00B010 (Status: affected)
- V500R002C00B011 (Status: affected)
- V500R002C00B012 (Status: affected)
- V500R002C00B013 (Status: affected)
- V500R002C00B014 (Status: affected)
- V500R002C00B017 (Status: affected)
- V500R002C00B018 (Status: affected)
- V500R002C00SPC100 (Status: affected)
- V500R002C00SPC200 (Status: affected)
- V500R002C00SPC300 (Status: affected)
- V500R002C00SPC400 (Status: affected)
- V500R002C00SPC500 (Status: affected)
- V500R002C00SPC600 (Status: affected)
- V500R002C00SPC800 (Status: affected)
- V500R002C00SPC900 (Status: affected)
- V500R002C00SPCa00 (Status: affected)
- V600R006C00 (Status: affected)
- V600R006C00SPC200 (Status: affected)
- V600R006C00SPC300 (Status: affected)
- V600R006C00SPC400 (Status: affected)
- V600R006C00SPC500 (Status: affected)
- V100R001C10SPC300 (Status: affected)
- V100R001C10SPC500 (Status: affected)
- V100R001C10SPC600 (Status: affected)
- V100R001C10SPC700B010 (Status: affected)
- V500R002C00SPC700 (Status: affected)
- V500R002C00SPCb00 (Status: affected)
- V100R001C10 (Status: affected)
- V100R001C10B001 (Status: affected)
- V100R001C10B002 (Status: affected)
- V100R001C10B010 (Status: affected)
- V100R001C10B011 (Status: affected)
- V100R001C10B012 (Status: affected)
- V100R001C10B013 (Status: affected)
- V100R001C10B014 (Status: affected)
- V100R001C10B016 (Status: affected)
- V100R001C10B017 (Status: affected)
- V100R001C10B018 (Status: affected)
- V100R001C10B019 (Status: affected)
- V100R001C10SPC400 (Status: affected)
- V100R001C10SPC700 (Status: affected)
- V100R001C10SPC800B011 (Status: affected)
- V100R001C10SPC900 (Status: affected)
- V500R002C00SPCd00 (Status: affected)
- V500R002C00SPCe00 (Status: affected)
- V600R006C00SPC100 (Status: affected)
- V200R003C20SPC900 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-02-cidam-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3423
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 01:07 UTC
- **Reserved Date**: October 07, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Allocation of Resources Without Limits or Throttling in GitHub repository nocodb/nocodb prior to 0.92.0.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**nocodb - nocodb/nocodb**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/nocodb/nocodb/commit/000ecd886738b965b5997cd905825e3244f48b95)
2. [](https://huntr.dev/bounties/94639d8e-8301-4432-ab80-e76e1346e631) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7501
- **State**: PUBLISHED
- **Published Date**: November 09, 2017 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 07:51 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:0040](http://rhn.redhat.com/errata/RHSA-2016-0040.html)
2. [RHSA-2015:2670](http://rhn.redhat.com/errata/RHSA-2015-2670.html)
3. [RHSA-2015:2501](http://rhn.redhat.com/errata/RHSA-2015-2501.html)
4. [RHSA-2015:2517](http://rhn.redhat.com/errata/RHSA-2015-2517.html)
5. [78215](http://www.securityfocus.com/bid/78215)
6. [1034097](http://www.securitytracker.com/id/1034097)
7. [RHSA-2015:2671](http://rhn.redhat.com/errata/RHSA-2015-2671.html)
8. [1037052](http://www.securitytracker.com/id/1037052)
9. [1037640](http://www.securitytracker.com/id/1037640)
10. [RHSA-2015:2522](http://rhn.redhat.com/errata/RHSA-2015-2522.html)
11. [RHSA-2015:2521](http://rhn.redhat.com/errata/RHSA-2015-2521.html)
12. [RHSA-2015:2516](http://rhn.redhat.com/errata/RHSA-2015-2516.html)
13. [RHSA-2015:2500](http://rhn.redhat.com/errata/RHSA-2015-2500.html)
14. [RHSA-2015:2514](http://rhn.redhat.com/errata/RHSA-2015-2514.html)
15. [RHSA-2015:2502](http://rhn.redhat.com/errata/RHSA-2015-2502.html)
16. [RHSA-2015:2536](https://rhn.redhat.com/errata/RHSA-2015-2536.html)
17. [RHSA-2016:1773](http://rhn.redhat.com/errata/RHSA-2016-1773.html)
18. [RHSA-2015:2524](http://rhn.redhat.com/errata/RHSA-2015-2524.html)
19. [1037053](http://www.securitytracker.com/id/1037053)
20. [](https://bugzilla.redhat.com/show_bug.cgi?id=1279330)
21. [](https://access.redhat.com/solutions/2045023)
22. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
23. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
24. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
25. [](https://access.redhat.com/security/vulnerabilities/2059393)
26. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
27. [](https://www.oracle.com/security-alerts/cpujul2020.html)
28. [](https://security.netapp.com/advisory/ntap-20240216-0010/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4810
- **State**: PUBLISHED
- **Published Date**: December 14, 2011 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 18:24 UTC
- **Reserved Date**: December 13, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in WHMCompleteSolution (WHMCS) 3.x and 4.x allow remote attackers to read arbitrary files via the templatefile parameter to (1) submitticket.php and (2) downloads.php, and (3) the report parameter to admin/reports.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18088](http://www.exploit-db.com/exploits/18088) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1970
- **State**: PUBLISHED
- **Published Date**: July 14, 2010 at 18:31 UTC
- **Last Updated**: September 16, 2024 at 20:43 UTC
- **Reserved Date**: May 19, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Insight Software Installer for Windows before 6.1 allows local users to read or modify data, and consequently gain privileges, via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-1792](http://www.vupen.com/english/advisories/2010/1792)
2. [SSRT100184](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388)
3. [1024186](http://securitytracker.com/id?1024186)
4. [40553](http://secunia.com/advisories/40553)
5. [HPSBMA02553](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02282388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8039
- **State**: PUBLISHED
- **Published Date**: November 27, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 21, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. NOTE: this issue exists because of an incomplete fix for CVE-2017-4971.
### Affected Products
**n/a - Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected**
Affected versions:
- Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected (Status: affected)
### References
1. [](https://pivotal.io/security/cve-2017-8039)
2. [100849](http://www.securityfocus.com/bid/100849) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20956
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: February 25, 2025 at 16:33 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Import of C2SurfaceSyncObj.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-240140929
### Affected Products
**n/a - Android**
Affected versions:
- Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7399
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Suzanne Glathar (aka com.app_sglathar.layout) application 1.399 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#236041](http://www.kb.cert.org/vuls/id/236041)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12691
- **State**: PUBLISHED
- **Published Date**: September 01, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 08, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3681-1](https://usn.ubuntu.com/3681-1/)
2. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07)
3. [](https://github.com/ImageMagick/ImageMagick/issues/656)
4. [[debian-lts-announce] 20190514 [SECURITY] [DLA 1785-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html)
5. [[debian-lts-announce] 20200907 [SECURITY] [DLA 2366-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1286
- **State**: PUBLISHED
- **Published Date**: March 09, 2023 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 16:33 UTC
- **Reserved Date**: March 09, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**pimcore - pimcore/pimcore**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c)
2. [](https://github.com/pimcore/pimcore/commit/82cca7f4a7560b160336cce2610481098ca52c18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8826
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:53 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT210634) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24117
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 23:58 UTC
- **Reserved Date**: January 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0051
- **State**: PUBLISHED
- **Published Date**: February 02, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:06 UTC
- **Reserved Date**: February 01, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM DB2 Universal Database version 6.1 creates an account with a default user name and password, which allows remote attackers to gain access to the database.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001205 IBM DB2 default account and password Vulnerability](http://www.securityfocus.com/archive/1/149222)
2. [ibm-db2-gain-access(5662)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5662)
3. [2068](http://www.securityfocus.com/bid/2068) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15154
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 22:29 UTC
- **Last Updated**: November 05, 2020 at 22:29 UTC
- **Reserved Date**: October 08, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10283
- **State**: PUBLISHED
- **Published Date**: October 23, 2024 at 15:00 UTC
- **Last Updated**: October 23, 2024 at 17:33 UTC
- **Reserved Date**: October 23, 2024 at 06:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Tenda RX9 and RX9 Pro 22.03.02.20. Affected by this issue is the function sub_4337EC of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - RX9**
Affected versions:
- 22.03.02.20 (Status: affected)
**Tenda - RX9 Pro**
Affected versions:
- 22.03.02.20 (Status: affected)
### References
1. [VDB-281558 | Tenda RX9/RX9 Pro SetNetControlList sub_4337EC stack-based overflow](https://vuldb.com/?id.281558)
2. [VDB-281558 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.281558)
3. [Submit #427064 | Tenda RX9 Router RX9 Pro Firmware V22.03.02.20 Stack-based Buffer Overflow](https://vuldb.com/?submit.427064)
4. [](https://gitee.com/GXB0_0/iot-vul/blob/master/Tenda/RX9/20/SetNetControlList.md)
5. [](https://www.tenda.com.cn/)
### Credits
- GuoXB (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40357
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 09:21 UTC
- **Last Updated**: September 27, 2024 at 20:07 UTC
- **Reserved Date**: August 15, 2023 at 07:33 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'.
### Affected Products
**TP-LINK - Archer AX50**
Affected versions:
- firmware versions prior to 'Archer AX50(JP)_V1_230529' (Status: affected)
**TP-LINK - Archer A10**
Affected versions:
- firmware versions prior to 'Archer A10(JP)_V2_230504' (Status: affected)
**TP-LINK - Archer AX10**
Affected versions:
- firmware versions prior to 'Archer AX10(JP)_V1.2_230508' (Status: affected)
**TP-LINK - Archer AX11000**
Affected versions:
- firmware versions prior to 'Archer AX11000(JP)_V1_230523' (Status: affected)
### References
1. [](https://www.tp-link.com/jp/support/download/archer-ax50/#Firmware)
2. [](https://www.tp-link.com/jp/support/download/archer-a10/#Firmware)
3. [](https://www.tp-link.com/jp/support/download/archer-ax10/#Firmware)
4. [](https://www.tp-link.com/jp/support/download/archer-ax11000/#Firmware)
5. [](https://jvn.jp/en/vu/JVNVU99392903/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1360
- **State**: PUBLISHED
- **Published Date**: February 16, 2025 at 20:31 UTC
- **Last Updated**: February 18, 2025 at 16:10 UTC
- **Reserved Date**: February 15, 2025 at 15:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Internet Web Solutions Sublime CRM up to 20250207. Affected is an unknown function of the file /crm/inicio.php of the component HTTP POST Request Handler. The manipulation of the argument msg_to leads to cross site scripting. It is possible to launch the attack remotely. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**Internet Web Solutions - Sublime CRM**
Affected versions:
- 20250207 (Status: affected)
### References
1. [VDB-295968 | Internet Web Solutions Sublime CRM HTTP POST Request inicio.php cross site scripting](https://vuldb.com/?id.295968)
2. [VDB-295968 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295968)
3. [Submit #496469 | Internet Web Solutions Sublime CRM N/A Cross Site Scripting](https://vuldb.com/?submit.496469)
### Credits
- 6h4ack (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5242
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: October 03, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23573](http://www.exploit-db.com/exploits/23573)
2. [](https://www.htbridge.com/advisory/HTB23118) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4771
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:43 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4200
- **State**: PUBLISHED
- **Published Date**: May 15, 2024 at 16:56 UTC
- **Last Updated**: August 01, 2024 at 20:33 UTC
- **Reserved Date**: April 25, 2024 at 17:02 UTC
- **Assigned By**: ProgressSoftware
### Vulnerability Description
In Progress® Telerik® Reporting versions prior to 2024 Q2 (18.1.24.2.514), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Progress Software Corporation - Telerik Reporting**
Affected versions:
- 1.0.0.0 (Status: affected)
### References
1. [](https://docs.telerik.com/reporting/knowledge-base/deserialization-vulnerability-cve-2024-4200) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0322
- **State**: PUBLISHED
- **Published Date**: March 27, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Views in the Ubercart module 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to inject arbitrary web script or HTML via the full name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130220 Re: CVE request for Drupal Core and contributed modules](http://www.openwall.com/lists/oss-security/2013/02/21/5)
2. [](http://drupalcode.org/project/ubercart.git/commitdiff/f9d69b5)
3. [52298](http://secunia.com/advisories/52298)
4. [](http://drupal.org/node/1922136)
5. [](http://drupal.org/node/1922418) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1611
- **State**: PUBLISHED
- **Published Date**: March 11, 2019 at 22:00 UTC
- **Last Updated**: November 21, 2024 at 19:43 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Firepower 4100 Series Next-Generation Firewalls are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. Firepower 9300 Security Appliance are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25) and 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.1(5)N1(1b) and 7.3(4)N1(1). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5).
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Cisco - Firepower 4100 Series Next-Generation Firewalls**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Firepower 9300 Security Appliance**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - MDS 9000 Series Multilayer Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 3000 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 3500 Platform Switches**
Affected versions:
- unspecified (Status: affected)
**Cisco - Nexus 3600 Platform Switches**
Affected versions:
- unspecified (Status: affected)
**Cisco - Nexus 2000, 5500, 5600, and 6000 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 7000 and 7700 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 9000 Series Switches in Standalone NX-OS Mode**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 9500 R-Series Line Cards and Fabric Modules**
Affected versions:
- unspecified (Status: affected)
### References
1. [107381](http://www.securityfocus.com/bid/107381)
2. [20190306 Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31060
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:44 UTC
- **Last Updated**: May 23, 2025 at 13:21 UTC
- **Reserved Date**: March 26, 2025 at 09:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Capie allows PHP Local File Inclusion. This issue affects Capie: from n/a through 1.0.40.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**ApusTheme - Capie**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/capie/vulnerability/wordpress-capie-1-0-40-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- Tran Nguyen Bao Khanh (VCI - VNPT Cyber Immunity) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2995
- **State**: PUBLISHED
- **Published Date**: October 19, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in Adobe Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36638](http://www.securityfocus.com/bid/36638)
2. [TA09-286B](http://www.us-cert.gov/cas/techalerts/TA09-286B.html)
3. [1023007](http://securitytracker.com/id?1023007)
4. [](http://www.adobe.com/support/security/bulletins/apsb09-15.html)
5. [ADV-2009-2898](http://www.vupen.com/english/advisories/2009/2898)
6. [oval:org.mitre.oval:def:6554](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6554) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28710
- **State**: PUBLISHED
- **Published Date**: October 07, 2024 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 16:30 UTC
- **Reserved Date**: March 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in LimeSurvey before 6.5.0+240319 allows a remote attacker to execute arbitrary code via a lack of input validation and output encoding in the Alert Widget's message component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://limesurvey.com)
2. [](https://github.com/LimeSurvey/LimeSurvey/commit/c2fd60f94bc1db275f20cbb27a3135a9bdfb7f10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4498
- **State**: PUBLISHED
- **Published Date**: May 10, 2025 at 10:00 UTC
- **Last Updated**: May 12, 2025 at 17:56 UTC
- **Reserved Date**: May 09, 2025 at 12:41 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in code-projects Simple Bus Reservation System 1.0. Affected is the function a::install of the component Install Bus. The manipulation of the argument bus leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
- CWE-119: Security Weakness
### Affected Products
**code-projects - Simple Bus Reservation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-308214 | code-projects Simple Bus Reservation System Install Bus install stack-based overflow](https://vuldb.com/?id.308214)
2. [VDB-308214 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.308214)
3. [Submit #567108 | **Buffer Overflow and Array Index Overflow in Bus Management System** v1.0 Buffer Overflow](https://vuldb.com/?submit.567108)
4. [](https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md)
5. [](https://code-projects.org/)
### Credits
- zzzxc (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1089
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 03:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**unspecified - 389-ds-base**
Affected versions:
- 389-ds-base 1.4.0.9 (Status: affected)
- 389-ds-base 1.3.8.1 (Status: affected)
- 389-ds-base 1.3.6.15 (Status: affected)
### References
1. [104137](http://www.securityfocus.com/bid/104137)
2. [RHSA-2018:1364](https://access.redhat.com/errata/RHSA-2018:1364)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089)
4. [RHSA-2018:1380](https://access.redhat.com/errata/RHSA-2018:1380)
5. [[debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1896
- **State**: PUBLISHED
- **Published Date**: January 27, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in the initialization process on Lexmark printers with firmware ATL before ATL.02.049, CB before CB.02.049, PP before PP.02.049, and YK before YK.02.049 allows remote attackers to bypass authentication by leveraging incorrect detection of the security-jumper status.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.lexmark.com/index?page=content&id=TE745) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30011
- **State**: PUBLISHED
- **Published Date**: May 16, 2022 at 12:41 UTC
- **Last Updated**: August 03, 2024 at 06:40 UTC
- **Reserved Date**: May 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In HMS 1.0 when requesting appointment.php through POST, multiple parameters can lead to a SQL injection vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kabirkhyrul/HMS/discussions/15)
2. [](https://github.com/kabirkhyrul/HMS/tree/1.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2587
- **State**: PUBLISHED
- **Published Date**: August 12, 2012 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: May 09, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in AfterLogic MailSuite Pro 6.3 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with a crafted SRC attribute of (1) an IFRAME element or (2) a SCRIPT element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20352](http://www.exploit-db.com/exploits/20352/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35821
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 13:23 UTC
- **Last Updated**: May 04, 2025 at 09:06 UTC
- **Reserved Date**: May 17, 2024 at 12:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ubifs: Set page uptodate in the correct place
Page cache reads are lockless, so setting the freshly allocated page
uptodate before we've overwritten it with the data it's supposed to have
in it will allow a simultaneous reader to see old data. Move the call
to SetPageUptodate into ubifs_write_end(), which is after we copied the
new data into the page.
### Affected Products
**Linux - Linux**
Affected versions:
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
- 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.27 (Status: affected)
- 0 (Status: unaffected)
- 4.19.312 (Status: unaffected)
- 5.4.274 (Status: unaffected)
- 5.10.215 (Status: unaffected)
- 5.15.154 (Status: unaffected)
- 6.1.84 (Status: unaffected)
- 6.6.24 (Status: unaffected)
- 6.7.12 (Status: unaffected)
- 6.8.3 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e)
2. [](https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310)
3. [](https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f)
4. [](https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3)
5. [](https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3)
6. [](https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f)
7. [](https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e)
8. [](https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566)
9. [](https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2712
- **State**: PUBLISHED
- **Published Date**: May 31, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Secure Elements Class 5 AVR (aka C5 EVM) client and server before 2.8.1 do not verify the integrity of a message digest, which allows remote attackers to modify and replay messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kb.cert.org/vuls/id/WDON-6QAQFH)
2. [VU#456729](http://www.kb.cert.org/vuls/id/456729)
3. [20378](http://secunia.com/advisories/20378)
4. [VU#353769](http://www.kb.cert.org/vuls/id/353769)
5. [ADV-2006-2069](http://www.vupen.com/english/advisories/2006/2069)
6. [1016184](http://securitytracker.com/id?1016184)
7. [c5evm-client-message-digest-replay(26781)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26781)
8. [](http://www.kb.cert.org/vuls/id/WDON-6Q6S8D)
9. [c5evm-server-message-digest-replay(26765)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26765) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29761
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 18:23 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue found in Sleep v.20230303 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29761/CVE%20detailed.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39090
- **State**: PUBLISHED
- **Published Date**: February 29, 2024 at 02:35 UTC
- **Last Updated**: August 04, 2024 at 01:58 UTC
- **Reserved Date**: August 16, 2021 at 18:59 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.6.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 216388.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**IBM - Cloud Pak for Security**
Affected versions:
- 1.10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6856407)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/216388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0389
- **State**: PUBLISHED
- **Published Date**: June 20, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 09, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the secure redirect function of RSA ACE/Agent 5.0 for Windows, and 5.x for Web, allows remote attackers to insert arbitrary web script and possibly cause users to enter a passphrase via a GET request containing the script.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030619 R7-0014: RSA SecurID ACE Agent Cross Site Scripting](http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0112.html)
2. [](http://www.rapid7.com/advisories/R7-0014.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25018
- **State**: PUBLISHED
- **Published Date**: October 01, 2020 at 16:46 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: August 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://groups.google.com/forum/#%21forum/envoy-security-announce)
2. [](https://github.com/envoyproxy/envoy/security/advisories/GHSA-fwwh-fc9w-9673) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0784
- **State**: PUBLISHED
- **Published Date**: April 11, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 16, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Directory traversal vulnerability in the Import/Export System Backups functionality in Apache OpenMeetings before 3.1.1 allows remote authenticated administrators to write to arbitrary files via a .. (dot dot) in a ZIP archive entry.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code)
2. [](https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG)
3. [39642](https://www.exploit-db.com/exploits/39642/)
4. [[oss-security] 20160325 [CVE-2016-0784] ZIP file path traversal](http://www.openwall.com/lists/oss-security/2016/03/25/2)
5. [](http://packetstormsecurity.com/files/136484/Apache-OpenMeetings-3.1.0-Path-Traversal.html)
6. [](http://openmeetings.apache.org/security.html)
7. [20160330 [CVE-2016-0784] Apache OpenMeetings ZIP file path traversal](http://www.securityfocus.com/archive/1/537929/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4142
- **State**: PUBLISHED
- **Published Date**: December 21, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: December 01, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The htmlspecialchars function in PHP before 5.2.12 does not properly handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences, and (3) invalid EUC-JP sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37389](http://www.securityfocus.com/bid/37389)
2. [](http://www.php.net/releases/5_2_12.php)
3. [](http://bugs.php.net/bug.php?id=49785)
4. [40262](http://secunia.com/advisories/40262)
5. [HPSBUX02543](http://marc.info/?l=bugtraq&m=127680701405735&w=2)
6. [1023372](http://securitytracker.com/id?1023372)
7. [37821](http://secunia.com/advisories/37821)
8. [38648](http://secunia.com/advisories/38648)
9. [APPLE-SA-2010-03-29-1](http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html)
10. [](http://www.php.net/ChangeLog-5.php)
11. [oval:org.mitre.oval:def:7085](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7085)
12. [oval:org.mitre.oval:def:10005](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10005)
13. [](http://support.apple.com/kb/HT4077)
14. [ADV-2009-3593](http://www.vupen.com/english/advisories/2009/3593)
15. [DSA-2001](http://www.debian.org/security/2010/dsa-2001)
16. [SSRT100152](http://marc.info/?l=bugtraq&m=127680701405735&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28873
- **State**: PUBLISHED
- **Published Date**: December 09, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 13:51 UTC
- **Reserved Date**: March 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue in wiki and discussion pages in Seafile 9.0.6 allows attackers to inject JavaScript into the Markdown editor.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://herolab.usd.de/en/security-advisories/usd-2022-0032/)
2. [](https://manual.seafile.com/changelog/server-changelog/#908-2022-09-07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0511
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The default configuration of Name Service Cache Daemon (nscd) in Caldera OpenLinux 3.1 and 3.1.1 uses cached PTR records instead of consulting the authoritative DNS server for the A record, which could make it easier for remote attackers to bypass applications that restrict access based on host names.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [nscd-dns-ptr-validation(8745)](http://www.iss.net/security_center/static/8745.php)
2. [4399](http://www.securityfocus.com/bid/4399)
3. [CSSA-2002-013.0](http://www.calderasystems.com/support/security/advisories/CSSA-2002-013.0.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1022
- **State**: PUBLISHED
- **Published Date**: April 04, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: February 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted VR movie with an obji atom of zero size.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT1241)
2. [TA08-094A](http://www.us-cert.gov/cas/techalerts/TA08-094A.html)
3. [ADV-2008-1078](http://www.vupen.com/english/advisories/2008/1078)
4. [28583](http://www.securityfocus.com/bid/28583)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-08-019)
6. [1019766](http://securitytracker.com/id?1019766)
7. [29650](http://secunia.com/advisories/29650)
8. [quicktime-obji-atoms-bo(41613)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41613)
9. [20080403 ZDI-08-019: Apple QuickTime Malformed VR obji Atom Parsing Memory Corruption Vulnerability](http://www.securityfocus.com/archive/1/490461/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49203
- **State**: PUBLISHED
- **Published Date**: November 20, 2024 at 00:00 UTC
- **Last Updated**: February 21, 2025 at 16:52 UTC
- **Reserved Date**: October 14, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Querydsl 5.1.0 and OpenFeign Querydsl 6.8 allows SQL/HQL injection in orderBy in JPAQuery. NOTE: this is disputed by a Querydsl community member because the product is not intended to defend against a developer who uses untrusted input directly in query construction.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/querydsl/querydsl/releases/tag/QUERYDSL_5_1_0)
2. [](https://www.csirt.sk/querydsl-java-library-vulnerability-permits-sql-hql-injection.html)
3. [](https://github.com/querydsl/querydsl/issues/3757)
4. [](https://github.com/OpenFeign/querydsl/)
5. [](https://github.com/OpenFeign/querydsl/releases/tag/5.6.1)
6. [](https://github.com/OpenFeign/querydsl/pull/742)
7. [](https://github.com/advisories/GHSA-6q3q-6v5j-h6vg)
8. [](https://github.com/OpenFeign/querydsl/releases/tag/6.10.1)
9. [](https://github.com/OpenFeign/querydsl/pull/743)
10. [](https://github.com/spring-projects/spring-data-jpa/issues/3693) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20673
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 19:10 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061466/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0546) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3800
- **State**: PUBLISHED
- **Published Date**: July 21, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Amazing Flash AFCommerce Shopping Cart allows remote attackers to inject arbitrary web script or HTML via the "new review" text box.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [afcommerce-newreview-xss(27847)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27847)
2. [19074](http://www.securityfocus.com/bid/19074)
3. [20060720 Re: AFCommerce Shopping Cart](http://www.securityfocus.com/archive/1/440848/100/100/threaded)
4. [1255](http://securityreason.com/securityalert/1255)
5. [1016538](http://securitytracker.com/id?1016538)
6. [20060719 AFCommerce Shopping Cart](http://www.securityfocus.com/archive/1/440589/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32087
- **State**: PUBLISHED
- **Published Date**: October 18, 2023 at 11:39 UTC
- **Last Updated**: September 12, 2024 at 18:53 UTC
- **Reserved Date**: May 01, 2023 at 21:15 UTC
- **Assigned By**: Pega
### Vulnerability Description
Pega Platform versions 8.1 to Infinity 23.1.0 are affected by an XSS issue with task creation
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Pegasystems - Pega Platform**
Affected versions:
- 8.1 (Status: affected)
### References
1. [](https://support.pega.com/support-doc/pega-security-advisory-e23-vulnerability-remediation-note)
### Credits
- Reuben Seymour, Amber Hamlet and Skyler Knecht from the Adversarial Security Practice at Navy Federal Credit Union |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41258
- **State**: PUBLISHED
- **Published Date**: November 16, 2021 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 03:08 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Kirby is an open source file structured CMS. In affected versions Kirby's blocks field stores structured data for each block. This data is then used in block snippets to convert the blocks to HTML for use in your templates. We recommend to escape HTML special characters to protect against cross-site scripting (XSS) attacks. The default snippet for the image block unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. Attackers must be in your group of authenticated Panel users in order to exploit this weakness. Users who do not make use of the blocks field are not affected. This issue has been patched in Kirby version 3.5.8 by escaping special HTML characters in the output from the default image block snippet. Please update to this or a later version to fix the vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**getkirby - kirby**
Affected versions:
- >= 3.5.0, < 3.5.8 (Status: affected)
### References
1. [](https://github.com/getkirby/kirby/releases/tag/3.5.8)
2. [](https://github.com/getkirby/kirby/security/advisories/GHSA-cq58-r77c-5jjw)
3. [](https://github.com/getkirby/kirby/pull/3510) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34733
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 19:13 UTC
- **Last Updated**: January 28, 2025 at 21:08 UTC
- **Reserved Date**: May 07, 2024 at 20:40 UTC
- **Assigned By**: google_android
### Vulnerability Description
In DevmemXIntMapPages of devicemem_server.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2024-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3163
- **State**: PUBLISHED
- **Published Date**: April 12, 2021 at 20:35 UTC
- **Last Updated**: August 03, 2024 at 16:45 UTC
- **Reserved Date**: January 17, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://quilljs.com)
2. [](https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html)
3. [](https://github.com/quilljs/quill/issues/3273)
4. [](https://github.com/quilljs/quill/issues/3364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7041
- **State**: PUBLISHED
- **Published Date**: September 10, 2018 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Drools Workbench contains a path traversal vulnerability. The vulnerability allows a remote, authenticated attacker to bypass the directory restrictions and retrieve arbitrary files from the affected host.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Red Hat - Drools Workbench**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:2937](http://rhn.redhat.com/errata/RHSA-2016-2937.html)
2. [RHSA-2016:2938](http://rhn.redhat.com/errata/RHSA-2016-2938.html)
3. [94566](http://www.securityfocus.com/bid/94566)
4. [RHSA-2016:2822](http://rhn.redhat.com/errata/RHSA-2016-2822.html)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7041)
6. [1037406](http://www.securitytracker.com/id/1037406)
7. [RHSA-2016:2823](http://rhn.redhat.com/errata/RHSA-2016-2823.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6003
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 16:30 UTC
- **Last Updated**: June 11, 2021 at 16:30 UTC
- **Reserved Date**: January 07, 2020 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15596
- **State**: PUBLISHED
- **Published Date**: August 28, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in inc/class_feedgeneration.php in MyBB 1.8.17. On the forum RSS Syndication page, one can generate a URL such as http://localhost/syndication.php?fid=&type=atom1.0&limit=15. The thread titles (within title elements of the generated XML documents) aren't sanitized, leading to XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45393](https://www.exploit-db.com/exploits/45393/)
2. [](https://blog.mybb.com/2018/08/22/mybb-1-8-18-released-security-maintenance-release/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0903
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 18:17 UTC
- **Last Updated**: February 07, 2025 at 16:28 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0903) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18789
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 13:40 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6250 before V1.0.4.8, R6400 before V1.0.1.22, R6400v2 before V1.0.2.32, R7100LG before V1.0.0.32, R7300 before V1.0.0.52, R8300 before V1.0.2.94, R8500 before V1.0.2.100, D6220 before V1.0.0.28, D6400 before V1.0.0.60, and D8500 before V1.0.3.29.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000049373/Security-Advisory-for-Sensitive-Information-Disclosure-Vulnerability-on-Some-Routers-and-Some-DSL-Modem-Routers-PSV-2017-0426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5863
- **State**: PUBLISHED
- **Published Date**: June 15, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 20:32 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
If userspace provides a too-large WPA RSN IE length in wlan_hdd_cfg80211_set_ie(), a buffer overflow occurs in all Android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the Linux kernel.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43265
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 21:55 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, certain tag syntax could be used for XSS, such as via a SCRIPT element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/mahara/+bug/1944633)
2. [](https://mahara.org/interaction/forum/topic.php?id=8953) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35742
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:57 UTC
- **Last Updated**: September 18, 2024 at 18:29 UTC
- **Reserved Date**: June 15, 2023 at 20:23 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20069.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**D-Link - DAP-2622**
Affected versions:
- 1.00 dated 16-12-2020 (Status: affected)
### References
1. [ZDI-23-1247](https://www.zerodayinitiative.com/advisories/ZDI-23-1247/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21859
- **State**: PUBLISHED
- **Published Date**: August 16, 2021 at 19:07 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The stri_box_read function is used when processing atoms using the 'stri' FOURCC code. An attacker can convince a user to open a video to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-680: Security Weakness
### Affected Products
**n/a - GPAC Project**
Affected versions:
- GPAC Project Advanced Content commit a8a8d412dabcb129e695c3e7d861fcc81f608304, GPAC Project Advanced Content v1.0.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298)
2. [DSA-4966](https://www.debian.org/security/2021/dsa-4966) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8579
- **State**: PUBLISHED
- **Published Date**: January 05, 2018 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 31, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TRENDnet TEW-823DRU devices with firmware before 1.00b36 have a hardcoded password of kcodeskcodes for the root account, which makes it easier for remote attackers to obtain access via an FTP session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://hackingcomtapioca.blogspot.com.br/2014/10/hacking-trendnet-tew-823dru.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48272
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 16:37 UTC
- **Last Updated**: June 03, 2025 at 13:47 UTC
- **Reserved Date**: November 13, 2023 at 17:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yonifre Maspik – Spam Blacklist allows Stored XSS.This issue affects Maspik – Spam Blacklist: from n/a through 0.9.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**yonifre - Maspik – Spam Blacklist**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27025
- **State**: PUBLISHED
- **Published Date**: December 15, 2020 at 16:00 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 12, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In EapFailureNotifier.java and SimRequiredNotifier.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156008365
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29802
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 12:19 UTC
- **Last Updated**: August 02, 2024 at 01:17 UTC
- **Reserved Date**: March 19, 2024 at 16:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Antoine Hurkmans Football Pool allows Stored XSS.This issue affects Football Pool: from n/a through 2.11.3.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Antoine Hurkmans - Football Pool**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/football-pool/wordpress-football-pool-plugin-2-11-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3687
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 13, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36365
- **State**: PUBLISHED
- **Published Date**: September 28, 2021 at 16:53 UTC
- **Last Updated**: August 04, 2024 at 00:54 UTC
- **Reserved Date**: July 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios XI before 5.8.5 has Incorrect Permission Assignment for repairmysql.sh.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/downloads/nagios-xi/change-log/)
2. [](https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24402
- **State**: PUBLISHED
- **Published Date**: October 19, 2023 at 09:32 UTC
- **Last Updated**: September 12, 2024 at 20:31 UTC
- **Reserved Date**: February 04, 2022 at 04:43 UTC
- **Assigned By**: NCSC-NL
### Vulnerability Description
The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C/CR:H/IR:H/AR:H/MAV:A/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H`
### Weakness Classification (CWE)
- CWE-334: Security Weakness
### Affected Products
**ETSI - TETRA Standard**
Affected versions:
- TEA1 (Status: affected)
### References
1. [TETRA:BURST](https://tetraburst.com/)
### Credits
- Midnight Blue |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1793
- **State**: PUBLISHED
- **Published Date**: April 02, 2023 at 07:31 UTC
- **Last Updated**: August 02, 2024 at 05:57 UTC
- **Reserved Date**: April 02, 2023 at 06:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /officer/assigncase.php of the component GET Parameter Handler. The manipulation of the argument caseid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224745 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Police Crime Record Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.224745)
2. [](https://vuldb.com/?ctiid.224745)
3. [](https://github.com/fillorkill/bug_report/blob/main/SQLi-1.md)
### Credits
- Derek_Zhang (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0544
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: July 10, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IIS 5.0 allows local users to cause a denial of service (hang) via by installing content that produces a certain invalid MIME Content-Type header, which corrupts the File Type table.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3195](http://www.securityfocus.com/bid/3195)
2. [iis-invalid-mime-header-dos(6983)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6983)
3. [L-132](http://www.ciac.org/ciac/bulletins/l-132.shtml)
4. [MS01-044](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-044) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0149
- **State**: PUBLISHED
- **Published Date**: May 05, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat JBoss Web Framework Kit 2.5.0 allow remote attackers to inject arbitrary web script or HTML via a (1) parameter or (2) id name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2014:0462](http://rhn.redhat.com/errata/RHSA-2014-0462.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1078646) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15441
- **State**: REJECTED
- **Published Date**: January 23, 2018 at 17:00 UTC
- **Last Updated**: January 23, 2018 at 16:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10796
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 04:24 UTC
- **Last Updated**: November 21, 2024 at 11:40 UTC
- **Reserved Date**: November 04, 2024 at 15:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The If-So Dynamic Content Personalization plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.2.1 via the 'ifso-show-post' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**ifso - If-So Dynamic Content Personalization**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/66363035-c09f-4b41-b9fe-2e2bdd851f41?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3188093/if-so/trunk/extensions/ifso-extended-shortcodes/extended-shortcodes.php?old=3157276&old_path=if-so%2Ftrunk%2Fextensions%2Fifso-extended-shortcodes%2Fextended-shortcodes.php)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40642
- **State**: PUBLISHED
- **Published Date**: October 08, 2023 at 03:36 UTC
- **Last Updated**: September 19, 2024 at 14:59 UTC
- **Reserved Date**: August 18, 2023 at 02:28 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A**
Affected versions:
- Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3855
- **State**: PUBLISHED
- **Published Date**: November 27, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in process.php in 1-2-3 music store allows remote attackers to execute arbitrary SQL commands via the AlbumID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pridels0.blogspot.com/2005/11/1-2-3-music-store-albumid-sql.html)
2. [15544](http://www.securityfocus.com/bid/15544)
3. [ADV-2005-2549](http://www.vupen.com/english/advisories/2005/2549)
4. [21074](http://www.osvdb.org/21074)
5. [17683](http://secunia.com/advisories/17683) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6056
- **State**: PUBLISHED
- **Published Date**: October 18, 2024 at 07:31 UTC
- **Last Updated**: October 18, 2024 at 15:27 UTC
- **Reserved Date**: November 09, 2023 at 14:17 UTC
- **Assigned By**: Bitdefender
### Vulnerability Description
A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of self-signed certificates. The product is found to trust certificates signed with the RIPEMD-160 hashing algorithm without proper validation, allowing an attacker to establish MITM SSL connections to arbitrary sites.
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**BItdefender - Total Security**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.bitdefender.com/support/security-advisories/insecure-trust-of-self-signed-certificates-in-bitdefender-total-security-https-scanning-va-11164/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25473
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 00:00 UTC
- **Last Updated**: February 20, 2025 at 21:10 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FFmpeg git master before commit c08d30 was discovered to contain a NULL pointer dereference via the component libavformat/mov.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.ffmpeg.org/gitweb/ffmpeg.git/blobdiff/4f3c9f2f03378a08692a26532bc3146414717f8c..c08d300481b8ebb846cd43a473988fdbc6793d1b:/libavformat/avformat.c)
2. [](https://trac.ffmpeg.org/ticket/11419)
3. [](https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/c08d300481b8ebb846cd43a473988fdbc6793d1b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2174
- **State**: PUBLISHED
- **Published Date**: May 25, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 10:05 UTC
- **Reserved Date**: February 25, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3136
- **State**: PUBLISHED
- **Published Date**: October 10, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 01:00 UTC
- **Reserved Date**: September 06, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Social Rocket WordPress plugin before 1.3.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Social Rocket – Social Sharing Plugin**
Affected versions:
- 1.3.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649)
### Credits
- Asif Nawaz Minhas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7014
- **State**: PUBLISHED
- **Published Date**: October 23, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-10-21-1](http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html)
2. [77267](http://www.securityfocus.com/bid/77267)
3. [](https://support.apple.com/HT205370)
4. [openSUSE-SU-2016:0761](http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html)
5. [](https://support.apple.com/HT205372)
6. [APPLE-SA-2015-10-21-3](http://lists.apple.com/archives/security-announce/2015/Oct/msg00004.html)
7. [APPLE-SA-2015-10-21-5](http://lists.apple.com/archives/security-announce/2015/Oct/msg00006.html)
8. [](https://support.apple.com/HT205377)
9. [1033929](http://www.securitytracker.com/id/1033929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1868
- **State**: PUBLISHED
- **Published Date**: June 07, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
I-Man 0.9, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code by uploading a file attachment with a .php extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [iman-file-upload(20857)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20857)
2. [](http://sourceforge.net/project/shownotes.php?release_id=331422)
3. [15558](http://secunia.com/advisories/15558/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34358
- **State**: PUBLISHED
- **Published Date**: November 20, 2021 at 01:05 UTC
- **Last Updated**: September 17, 2024 at 02:15 UTC
- **Reserved Date**: June 08, 2021 at 00:00 UTC
- **Assigned By**: qnap
### Vulnerability Description
We have already fixed this vulnerability in the following versions of QmailAgent: QmailAgent 3.0.2 ( 2021/08/25 ) and later
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**QNAP Systems Inc. - QmailAgent**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-21-49)
### Credits
- Tony Martin, a security researcher |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47187
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 03, 2025 at 19:00 UTC
- **Reserved Date**: October 31, 2023 at 14:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Labib Ahmed Animated Rotating Words allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Animated Rotating Words: from n/a through 5.4.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Labib Ahmed - Animated Rotating Words**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/css3-rotating-words/vulnerability/wordpress-animated-rotating-words-plugin-5-4-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38421
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 19:42 UTC
- **Last Updated**: April 23, 2025 at 16:48 UTC
- **Reserved Date**: August 18, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe ColdFusion versions Update 14 (and earlier) and Update 4 (and earlier) are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but does require administrator privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Adobe - ColdFusion**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/coldfusion/apsb22-44.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.