System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3901
- **State**: PUBLISHED
- **Published Date**: October 10, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Multiple integer overflows in drivers/crypto/msm/qcedev.c in the Qualcomm cryptographic engine driver in Android before 2016-10-05 on Nexus 5X, Nexus 6, Nexus 6P, and Android One devices allow attackers to gain privileges via a crafted application, aka Android internal bug 29999161 and Qualcomm internal bug CR 1046434.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93327](http://www.securityfocus.com/bid/93327)
2. [](http://source.android.com/security/bulletin/2016-10-01.html)
3. [](https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=5f69ccf3b011c1d14a1b1b00dbaacf74307c9132) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2943
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 27, 2024 at 18:47 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Financial Services Liquidity Risk Measurement and Management product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.7 and 8.0.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Measurement and Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Liquidity Risk Measurement and Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Measurement and Management accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
### Affected Products
**Oracle Corporation - Financial Services Liquidity Risk Measurement and Management**
Affected versions:
- 8.0.7 (Status: affected)
- 8.0.8 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12352
- **State**: PUBLISHED
- **Published Date**: June 17, 2022 at 12:11 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 27, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in zzcms 2019. There is a SQL injection Vulnerability in /dl/dl_sendmail.php (when the attacker has dls_print authority) via a dlid cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cby234/zzcms/issues/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0288
- **State**: PUBLISHED
- **Published Date**: March 04, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0288)
2. [RHSA-2013:0590](http://rhn.redhat.com/errata/RHSA-2013-0590.html)
3. [58007](http://www.securityfocus.com/bid/58007)
4. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690319)
5. [DSA-2628](http://www.debian.org/security/2012/dsa-2628)
6. [](http://arthurdejong.org/git/nss-pam-ldapd/commit/?id=7867b93f9a7c76b96f1571cddc1de0811134bb81)
7. [[oss-security] 20130218 CVE-2013-0288 nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow](http://www.openwall.com/lists/oss-security/2013/02/18/2)
8. [FEDORA-2013-2754](http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099438.html)
9. [52212](http://secunia.com/advisories/52212)
10. [](http://arthurdejong.org/git/nss-pam-ldapd/commit/?id=f266f05f20afe73e89c3946a7bd60bd7c5948e1b)
11. [52242](http://secunia.com/advisories/52242)
12. [](http://arthurdejong.org/git/nss-pam-ldapd/commit/?id=abf03bc54032beeff95b1b8634cc005137e11f32)
13. [MDVSA-2013:106](http://www.mandriva.com/security/advisories?name=MDVSA-2013:106)
14. [[nss-pam-ldapd-announce] 20130218 nss-pam-ldapd security advisory (CVE-2013-0288)](http://lists.arthurdejong.org/nss-pam-ldapd-announce/2013/msg00001.html)
15. [nsspamldapd-fdsetsize-bo(82175)](https://exchange.xforce.ibmcloud.com/vulnerabilities/82175)
16. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0071)
17. [openSUSE-SU-2013:0522](http://lists.opensuse.org/opensuse-updates/2013-03/msg00087.html)
18. [openSUSE-SU-2013:0524](http://lists.opensuse.org/opensuse-updates/2013-03/msg00091.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50472
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 12:44 UTC
- **Last Updated**: October 28, 2024 at 13:49 UTC
- **Reserved Date**: October 24, 2024 at 07:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Drapeau Amilia Store allows Stored XSS.This issue affects Amilia Store: from n/a through 2.9.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Martin Drapeau - Amilia Store**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/amilia-store/wordpress-amilia-store-plugin-2-9-8-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25119
- **State**: PUBLISHED
- **Published Date**: May 16, 2022 at 14:30 UTC
- **Last Updated**: August 03, 2024 at 19:56 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Unknown - AGIL(Automatic Grid Image Listing)**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a)
### Credits
- Chuang LI |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0685
- **State**: PUBLISHED
- **Published Date**: February 15, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The check_login function in login.php in Virtual Hosting Control System (VHCS) 2.4.7.1 and earlier does not exit when authentication fails, which allows remote attackers to gain unauthorized access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18799](http://secunia.com/advisories/18799)
2. [20060211 RS-2006-1: Multiple flaws in VHCS 2.x](http://www.securityfocus.com/archive/1/424816/100/0/threaded)
3. [](http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt)
4. [16600](http://www.securityfocus.com/bid/16600)
5. [vhcs-checklogin-auth-bypass(24666)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24666)
6. [ADV-2006-0534](http://www.vupen.com/english/advisories/2006/0534) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35643
- **State**: PUBLISHED
- **Published Date**: July 29, 2022 at 14:05 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: July 11, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper with system configuration or cause a denial of service. IBM X-Force ID: 230956.
### Affected Products
**IBM - PowerVM VIOS**
Affected versions:
- 3.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6607886)
2. [ibm-powervm-cve202235643-dos (230956)](https://exchange.xforce.ibmcloud.com/vulnerabilities/230956) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48373
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:21 UTC
- **Last Updated**: January 28, 2025 at 18:00 UTC
- **Reserved Date**: March 13, 2023 at 02:25 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In tee service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27124
- **State**: PUBLISHED
- **Published Date**: February 18, 2021 at 03:06 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 10, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0 allows an authenticated patient user to dump the database credentials via a SQL injection attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html)
2. [](https://www.sourcecodester.com/php/14182/doctor-appointment-system.html)
3. [](https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-dios-7689b1d30f5f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29903
- **State**: PUBLISHED
- **Published Date**: March 12, 2025 at 12:36 UTC
- **Last Updated**: March 12, 2025 at 13:51 UTC
- **Reserved Date**: March 12, 2025 at 12:36 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains Runtime before 21.0.6b872.80 arbitrary dynamic library execution due to insecure macOS flags was possible
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**JetBrains - Runtime**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3786
- **State**: PUBLISHED
- **Published Date**: April 24, 2019 at 15:21 UTC
- **Last Updated**: September 17, 2024 at 02:15 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable.
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Cloud Foundry - BOSH Backup and Restore**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.cloudfoundry.org/blog/cve-2019-3786) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6397
- **State**: PUBLISHED
- **Published Date**: July 11, 2024 at 03:33 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: June 27, 2024 at 19:57 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 0.1.0.44. This is due to insufficient verification of the API key. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username, and to perform a variety of other administrative tasks. NOTE: This vulnerability was partially fixed in 0.1.0.44, but was still exploitable via Cross-Site Request Forgery.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**instawp - InstaWP Connect – 1-click WP Staging & Migration**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/963f2485-3afa-4e17-8278-b75415af3915?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L28)
3. [](https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L40)
4. [](https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/apis/class-instawp-rest-api.php#L256)
5. [](https://plugins.trac.wordpress.org/changeset/3109305/)
6. [](https://plugins.trac.wordpress.org/changeset/3114674/)
### Credits
- Truoc Phan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51403
- **State**: PUBLISHED
- **Published Date**: February 12, 2024 at 06:17 UTC
- **Last Updated**: August 02, 2024 at 22:32 UTC
- **Reserved Date**: December 18, 2023 at 22:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nicdark Restaurant Reservations allows Stored XSS.This issue affects Restaurant Reservations: from n/a through 1.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nicdark - Restaurant Reservations**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/nd-restaurant-reservations/wordpress-restaurant-reservations-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- resecured.io (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-7140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-7140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7140
- **State**: PUBLISHED
- **Published Date**: March 07, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 20:50 UTC
- **Reserved Date**: March 07, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The libike library, as used by in.iked, elfsign, and kcfd in Sun Solaris 9 and 10, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents libike from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [102722](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1)
2. [ADV-2006-4744](http://www.vupen.com/english/advisories/2006/4744)
3. [23104](http://secunia.com/advisories/23104)
4. [oval:org.mitre.oval:def:1648](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15497
- **State**: PUBLISHED
- **Published Date**: August 26, 2019 at 20:29 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Black Box iCOMPEL 9.2.3 through 11.1.4, as used in ONELAN Net-Top-Box 9.2.3 through 11.1.4 and other products, has default credentials that allow remote attackers to access devices remotely via SSH, HTTP, HTTPS, and FTP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://experiencesofasysadmin.wordpress.com/2019/08/23/cve-2019-15497-default-credentials/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2020
- **State**: PUBLISHED
- **Published Date**: April 12, 2007 at 19:00 UTC
- **Last Updated**: January 17, 2025 at 14:20 UTC
- **Reserved Date**: April 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in administration.php in xodagallery allows remote attackers to execute arbitrary code via the cmd parameter. NOTE: CVE disputes this vulnerability because administration.php does not use the cmd parameter for inclusion
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070412 probably false: xodagallery execution claim](http://www.attrition.org/pipermail/vim/2007-April/001516.html)
2. [2561](http://securityreason.com/securityalert/2561)
3. [35291](http://osvdb.org/35291)
4. [20070408 xodagallery Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/465088/100/0/threaded)
5. [xodagallery-administration-code-execution(33522)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0802
- **State**: PUBLISHED
- **Published Date**: March 04, 2009 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 23:05 UTC
- **Reserved Date**: March 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Qbik WinGate, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33858](http://www.securityfocus.com/bid/33858)
2. [VU#435052](http://www.kb.cert.org/vuls/id/435052) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5962
- **State**: PUBLISHED
- **Published Date**: January 23, 2009 at 18:38 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in library/setup/rpc.php in Gravity Getting Things Done (GTD) 0.4.5 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the objectname parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32646](http://www.securityfocus.com/bid/32646)
2. [7344](https://www.exploit-db.com/exploits/7344)
3. [32982](http://secunia.com/advisories/32982)
4. [gravitygtd-rpc-file-include(47090)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47090) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15504
- **State**: PUBLISHED
- **Published Date**: July 10, 2020 at 16:55 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: July 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other versions >= 17.0 have received a hotfix.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-via-sqli-cve-2020-15504) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2894
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 01, 2024 at 16:33 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Java**
Affected versions:
- Java SE: 7u231, 8u221, 11.0.4, 13 (Status: affected)
- Java SE Embedded: 8u221 (Status: affected)
### References
1. [[oss-security] 20191002 Minerva: ECDSA key recovery from bit-length leakage](http://www.openwall.com/lists/oss-security/2019/10/02/2)
2. [](https://minerva.crocs.fi.muni.cz/)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
4. [](https://security.netapp.com/advisory/ntap-20191017-0001/)
5. [DSA-4546](https://www.debian.org/security/2019/dsa-4546)
6. [20191021 [SECURITY] [DSA 4548-1] openjdk-8 security update](https://seclists.org/bugtraq/2019/Oct/27)
7. [20191021 [SECURITY] [DSA 4546-1] openjdk-11 security update](https://seclists.org/bugtraq/2019/Oct/31)
8. [DSA-4548](https://www.debian.org/security/2019/dsa-4548)
9. [openSUSE-SU-2019:2557](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html)
10. [openSUSE-SU-2019:2565](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html)
11. [[debian-lts-announce] 20191207 [SECURITY] [DLA 2023-1] openjdk-7 security update](https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html)
12. [openSUSE-SU-2019:2687](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html)
13. [USN-4223-1](https://usn.ubuntu.com/4223-1/)
14. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10315) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34699
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 19:01 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 07, 2024 at 13:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GZ::CTF is a capture the flag platform. Prior to 0.20.1, unprivileged user can perform cross-site scripting attacks on other users by constructing malicious team names. This problem has been fixed in `v0.20.1`.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GZTimeWalker - GZCTF**
Affected versions:
- < 0.20.1 (Status: affected)
### References
1. [https://github.com/GZTimeWalker/GZCTF/security/advisories/GHSA-p6rq-5x3x-rmhh](https://github.com/GZTimeWalker/GZCTF/security/advisories/GHSA-p6rq-5x3x-rmhh)
2. [https://github.com/GZTimeWalker/GZCTF/commit/31e775b65cddf82a567d68dcdc78c1739b746346](https://github.com/GZTimeWalker/GZCTF/commit/31e775b65cddf82a567d68dcdc78c1739b746346) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34951
- **State**: PUBLISHED
- **Published Date**: August 02, 2022 at 02:54 UTC
- **Last Updated**: August 03, 2024 at 09:22 UTC
- **Reserved Date**: July 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the startDate parameter at getsalereport.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.yuque.com/jiryu/yz4rcd/gexe2q) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17401
- **State**: PUBLISHED
- **Published Date**: September 23, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:47 UTC
- **Reserved Date**: September 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The PhonePe wallet (aka com.PhonePe.app) application 3.0.6 through 3.3.26 for Android might allow attackers to perform Account Takeover attacks by exploiting its Forgot Password feature. NOTE: the vendor says that, to exploit this, the user has to explicitly install a malicious app and provide accessibility permission to the malicious app, that the Android platform provides fair warnings to the users before turning on accessibility for any application, and that it believes it is similar to installing malicious keyboards, or malicious apps taking screenshots
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/magicj3lly/appexploits/blob/master/PhonePe%20Authentication%20Bypass-2.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1188
- **State**: PUBLISHED
- **Published Date**: March 06, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: March 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2008-09-24](http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html)
2. [30676](http://secunia.com/advisories/30676)
3. [RHSA-2008:0267](http://www.redhat.com/support/errata/RHSA-2008-0267.html)
4. [SUSE-SA:2008:018](http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html)
5. [1019549](http://www.securitytracker.com/id?1019549)
6. [](http://www.zerodayinitiative.com/advisories/ZDI-08-009/)
7. [32018](http://secunia.com/advisories/32018)
8. [javawebstart-application-priv-escalation(41029)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41029)
9. [29897](http://secunia.com/advisories/29897)
10. [29498](http://secunia.com/advisories/29498)
11. [GLSA-200804-28](http://security.gentoo.org/glsa/glsa-200804-28.xml)
12. [29239](http://secunia.com/advisories/29239)
13. [29858](http://secunia.com/advisories/29858)
14. [TA08-066A](http://www.us-cert.gov/cas/techalerts/TA08-066A.html)
15. [SUSE-SA:2008:025](http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html)
16. [](http://support.apple.com/kb/HT3178)
17. [29582](http://secunia.com/advisories/29582)
18. [ADV-2008-0770](http://www.vupen.com/english/advisories/2008/0770/references)
19. [](http://www.zerodayinitiative.com/advisories/ZDI-08-010/)
20. [31497](http://secunia.com/advisories/31497)
21. [233323](http://sunsolve.sun.com/search/document.do?assetkey=1-26-233323-1)
22. [RHSA-2008:0210](http://www.redhat.com/support/errata/RHSA-2008-0210.html)
23. [30780](http://secunia.com/advisories/30780)
24. [ADV-2008-1856](http://www.vupen.com/english/advisories/2008/1856/references)
25. [](http://www.vmware.com/security/advisories/VMSA-2008-0010.html)
26. [javawebstart-multiple-unspecified-bo(41133)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41133)
27. [oval:org.mitre.oval:def:11209](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11209)
28. [GLSA-200804-20](http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml)
29. [GLSA-200806-11](http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml)
30. [RHSA-2008:0186](http://www.redhat.com/support/errata/RHSA-2008-0186.html)
31. [](http://support.apple.com/kb/HT3179)
32. [29273](http://secunia.com/advisories/29273) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4670
- **State**: PUBLISHED
- **Published Date**: October 22, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in search.php in Ed Pudol Clickbank Portal allows remote attackers to inject arbitrary web script or HTML via the search box. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [clickbankportal-search-xss(45483)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45483)
2. [31438](http://www.securityfocus.com/bid/31438)
3. [](http://www.securityfocus.com/bid/31438/exploit) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0223
- **State**: PUBLISHED
- **Published Date**: May 30, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: April 30, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting vulnerability (XSS) in the ASP function responsible for redirection in Microsoft Internet Information Server (IIS) 4.0, 5.0, and 5.1 allows remote attackers to embed a URL containing script in a redirection message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS03-018](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-018)
2. [oval:org.mitre.oval:def:66](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A66) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1710
- **State**: PUBLISHED
- **Published Date**: June 10, 2009 at 17:37 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WebKit in Apple Safari before 4.0 allows remote attackers to spoof the browser's display of (1) the host name, (2) security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43068](http://secunia.com/advisories/43068)
2. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
3. [APPLE-SA-2009-06-08-1](http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html)
4. [safari-uielements-spoofing(51263)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51263)
5. [35340](http://www.securityfocus.com/bid/35340)
6. [35260](http://www.securityfocus.com/bid/35260)
7. [ADV-2009-1522](http://www.vupen.com/english/advisories/2009/1522)
8. [37746](http://secunia.com/advisories/37746)
9. [DSA-1950](http://www.debian.org/security/2009/dsa-1950)
10. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
11. [35379](http://secunia.com/advisories/35379)
12. [55014](http://osvdb.org/55014)
13. [](http://support.apple.com/kb/HT3613) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31161
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 03:53 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 29, 2024 at 07:18 UTC
- **Assigned By**: twcert
### Vulnerability Description
The upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**ASUS - Download Master**
Affected versions:
- earlier (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7865-d3823-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-7866-469e0-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-25021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-25021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-25021
- **State**: PUBLISHED
- **Published Date**: February 27, 2021 at 04:26 UTC
- **Last Updated**: August 05, 2024 at 03:00 UTC
- **Reserved Date**: February 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Scytl sVote 2.1. Due to the implementation of the database manager, an attacker can access the OrientDB by providing admin as the admin password. A different password cannot be set because of the implementation in code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://suid.ch/research/CVE-2019-25021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7773
- **State**: PUBLISHED
- **Published Date**: April 12, 2019 at 19:31 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 12, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Heap-based Buffer Overflow write in Graphite2 library in Firefox before 54 in lz4::decompress src/Decompressor.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- All versions prior to Firefox 54 (Status: affected)
### References
1. [](https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3651
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 10:46 UTC
- **Last Updated**: August 04, 2024 at 07:37 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Active command timeout since WM status change cmd is not removed from active queue if peer sends multiple deauth frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCM2150, QCN7605, QCS605, QM215, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8150, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCM2150, QCN7605, QCS605, QM215, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8150, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2613
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46437
- **State**: PUBLISHED
- **Published Date**: April 08, 2022 at 10:12 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ZZCMS 2021. There is a cross-site scripting (XSS) vulnerability in ad_manage.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xunyang1/ZZCMS/issues/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29660
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 13:27 UTC
- **Last Updated**: August 03, 2024 at 06:26 UTC
- **Reserved Date**: April 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/pic/del.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chshcms/cscms/issues/25#issue-1207649017) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1997
- **State**: PUBLISHED
- **Published Date**: April 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Sybase Pylon Anywhere groupware synchronization server before 7.0 allows local users to obtain sensitive information such as email and PIM data of another user via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-1477](http://www.vupen.com/english/advisories/2006/1477)
2. [17677](http://www.securityfocus.com/bid/17677)
3. [](http://www.sybase.com/detail?id=1040213)
4. [19784](http://secunia.com/advisories/19784)
5. [pylon-groupware-unauth-access(25989)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25989) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22677
- **State**: PUBLISHED
- **Published Date**: October 12, 2021 at 20:37 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in gpac 0.8.0. The dump_data_hex function in box_dump.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/1341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3396
- **State**: PUBLISHED
- **Published Date**: July 23, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:05 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in cohort/edit_form.php in Moodle 2.0.x before 2.0.10, 2.1.x before 2.1.7, 2.2.x before 2.2.4, and 2.3.x before 2.3.1 allows remote authenticated administrators to inject arbitrary web script or HTML via the idnumber field. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2365.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49890](http://secunia.com/advisories/49890)
2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34045)
3. [[oss-security] 20120717 Moodle security notifications public](http://openwall.com/lists/oss-security/2012/07/17/1)
4. [54481](http://www.securityfocus.com/bid/54481)
5. [moodle-cohorts-xss(76962)](https://exchange.xforce.ibmcloud.com/vulnerabilities/76962) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23167
- **State**: PUBLISHED
- **Published Date**: November 18, 2021 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 02:05 UTC
- **Reserved Date**: January 26, 2021 at 00:00 UTC
- **Assigned By**: Gallagher
### Vulnerability Description
Improper certificate validation vulnerability in SMTP Client allows man-in-the-middle attack to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3); 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; version 8.20 and prior versions.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**Gallagher - Command Centre**
Affected versions:
- unspecified (Status: affected)
- 8.50 (Status: affected)
- 8.40 (Status: affected)
- 8.30 (Status: affected)
### References
1. [](https://security.gallagher.com/Security-Advisories/CVE-2021-23167) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39993
- **State**: PUBLISHED
- **Published Date**: January 07, 2022 at 22:39 UTC
- **Last Updated**: August 04, 2024 at 02:20 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.
### Affected Products
**n/a - EMUI;Magic UI**
Affected versions:
- EMUI 11.0.0 (Status: affected)
- Magic UI 4.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2021/12/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31600
- **State**: PUBLISHED
- **Published Date**: July 04, 2022 at 18:10 UTC
- **Last Updated**: August 03, 2024 at 07:26 UTC
- **Reserved Date**: May 24, 2022 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA DGX A100 contains a vulnerability in SBIOS in the SmmCore, where a user with high privileges can chain another vulnerability to this vulnerability, causing an integer overflow, possibly leading to code execution, escalation of privileges, denial of service, compromised integrity, and information disclosure. The scope of impact can extend to other components.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**NVIDIA - NVIDIA DGX A100**
Affected versions:
- Versions prior to 22.5.5 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5367) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4841
- **State**: PUBLISHED
- **Published Date**: May 05, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: May 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the SonicMediaPlayer ActiveX control in SonicMediaPlayer.dll in Roxio CinePlayer 3.2 allows remote attackers to execute arbitrary code via a long argument to the DiskType method. NOTE: this might overlap CVE-2007-1559.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8824](http://www.exploit-db.com/exploits/8824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28170
- **State**: PUBLISHED
- **Published Date**: December 20, 2023 at 19:12 UTC
- **Last Updated**: August 02, 2024 at 12:30 UTC
- **Reserved Date**: March 13, 2023 at 14:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Themely Theme Demo Import.This issue affects Theme Demo Import: from n/a through 1.1.1.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Themely - Theme Demo Import**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/theme-demo-import/wordpress-theme-demo-import-plugin-1-1-1-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- deokhunKim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1921
- **State**: PUBLISHED
- **Published Date**: April 22, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 08:41 UTC
- **Reserved Date**: April 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in store_pages/category_list.php in 5th Avenue Shopping Cart 1.2 trial edition allows remote attackers to execute arbitrary SQL commands via the category_ID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28841](http://www.securityfocus.com/bid/28841)
2. [5thavenue-categorylist-sql-injection(41885)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41885)
3. [29887](http://secunia.com/advisories/29887)
4. [](http://forum.aria-security.com/showthread.php?p=76)
5. [](http://forum.aria-security.net/showthread.php?p=2233)
6. [20080418 5th avenue Shopping Cart SQL Injection](http://www.securityfocus.com/archive/1/491069/100/0/threaded)
7. [5464](https://www.exploit-db.com/exploits/5464) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11547
- **State**: PUBLISHED
- **Published Date**: April 04, 2020 at 23:23 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3103
- **State**: PUBLISHED
- **Published Date**: June 21, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Bitweaver 1.3 allows remote attackers to inject arbitrary web script or HTML via the (1) error parameter in users/login.php and the (2) feedback parameter in articles/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=336854&group_id=141358)
2. [](http://retrogod.altervista.org/bitweaver_13_xpl.html)
3. [bitweaver-index-xss(27213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27213)
4. [20695](http://secunia.com/advisories/20695)
5. [26588](http://www.osvdb.org/26588)
6. [](http://www.bitweaver.org/articles/45)
7. [1115](http://securityreason.com/securityalert/1115)
8. [ADV-2006-2405](http://www.vupen.com/english/advisories/2006/2405)
9. [20060617 bitweaver <= v1.3 multiple vulnerabilities](http://www.securityfocus.com/archive/1/437491/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32984
- **State**: PUBLISHED
- **Published Date**: May 16, 2023 at 16:00 UTC
- **Last Updated**: January 23, 2025 at 20:36 UTC
- **Reserved Date**: May 16, 2023 at 10:55 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins TestNG Results Plugin 730.v4c5283037693 and earlier does not escape several values that are parsed from TestNG report files and displayed on the plugin's test information pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a crafted TestNG report file.
### Affected Products
**Jenkins Project - Jenkins TestNG Results Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-05-16](https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6063
- **State**: PUBLISHED
- **Published Date**: November 21, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugzilla.kernel.org/show_bug.cgi?id=9416)
2. [28806](http://secunia.com/advisories/28806)
3. [26605](http://www.securityfocus.com/bid/26605)
4. [RHSA-2008:0154](http://www.redhat.com/support/errata/RHSA-2008-0154.html)
5. [DSA-1436](http://www.debian.org/security/2007/dsa-1436)
6. [ADV-2007-4046](http://www.vupen.com/english/advisories/2007/4046)
7. [28141](http://secunia.com/advisories/28141)
8. [28706](http://secunia.com/advisories/28706)
9. [MDVSA-2008:112](http://www.mandriva.com/security/advisories?name=MDVSA-2008:112)
10. [DSA-1504](http://www.debian.org/security/2008/dsa-1504)
11. [MDVSA-2008:008](http://www.mandriva.com/security/advisories?name=MDVSA-2008:008)
12. [27912](http://secunia.com/advisories/27912)
13. [oval:org.mitre.oval:def:9846](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9846)
14. [33280](http://secunia.com/advisories/33280)
15. [29236](http://secunia.com/advisories/29236)
16. [SUSE-SA:2007:064](http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html)
17. [SUSE-SA:2008:006](http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html)
18. [DSA-1503](http://www.debian.org/security/2008/dsa-1503)
19. [27842](http://secunia.com/advisories/27842)
20. [28748](http://secunia.com/advisories/28748)
21. [USN-574-1](http://www.ubuntu.com/usn/usn-574-1)
22. [29058](http://secunia.com/advisories/29058)
23. [RHSA-2008:0973](http://www.redhat.com/support/errata/RHSA-2008-0973.html)
24. [28971](http://secunia.com/advisories/28971)
25. [RHSA-2008:0787](http://www.redhat.com/support/errata/RHSA-2008-0787.html)
26. [USN-578-1](http://www.ubuntu.com/usn/usn-578-1)
27. [RHSA-2008:0055](http://rhn.redhat.com/errata/RHSA-2008-0055.html)
28. [oval:org.mitre.oval:def:6514](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6514)
29. [33201](http://secunia.com/advisories/33201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3860, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3860
- **State**: PUBLISHED
- **Published Date**: December 20, 2021 at 00:00 UTC
- **Last Updated**: November 18, 2024 at 19:58 UTC
- **Reserved Date**: October 05, 2021 at 00:00 UTC
- **Assigned By**: JFROG
### Vulnerability Description
JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**JFrog - JFrog Artifactory**
Affected versions:
- JFrog Artifactory versions before 7.25.4 with E+ license (Status: affected)
- JFrog Artifactory versions before 6.23.30 with E+ license (Status: affected)
### References
1. [](https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection)
2. [](http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7942
- **State**: PUBLISHED
- **Published Date**: December 13, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036945](http://www.securitytracker.com/id/1036945)
2. [USN-3758-2](https://usn.ubuntu.com/3758-2/)
3. [GLSA-201704-03](https://security.gentoo.org/glsa/201704-03)
4. [93363](http://www.securityfocus.com/bid/93363)
5. [[xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries](https://lists.x.org/archives/xorg-announce/2016-October/002720.html)
6. [[oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries](http://www.openwall.com/lists/oss-security/2016/10/04/4)
7. [[oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries](http://www.openwall.com/lists/oss-security/2016/10/04/2)
8. [USN-3758-1](https://usn.ubuntu.com/3758-1/)
9. [FEDORA-2016-0df69ab477](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/)
10. [](https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6900
- **State**: REJECTED
- **Published Date**: January 05, 2021 at 17:21 UTC
- **Last Updated**: January 05, 2021 at 17:21 UTC
- **Reserved Date**: January 13, 2020 at 00:00 UTC
- **Assigned By**: zte
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2822
- **State**: PUBLISHED
- **Published Date**: September 05, 2017 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 23:00 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable code execution vulnerability exists in the image rendering functionality of Lexmark Perceptive Document Filters 11.3.0.2400. A specifically crafted PDF can cause a function call on a corrupted DCTStream to occur, resulting in user controlled data being written to the stack. A maliciously crafted PDF file can be used to trigger this vulnerability.
### Affected Products
**Lexmark - Perceptive Document Filters**
Affected versions:
- 11.3.0.2400 (Status: affected)
### References
1. [100512](http://www.securityfocus.com/bid/100512)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0323) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30671
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 16:21 UTC
- **Last Updated**: April 08, 2025 at 20:14 UTC
- **Reserved Date**: March 24, 2025 at 22:35 UTC
- **Assigned By**: Zoom
### Vulnerability Description
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Zoom Communications, Inc - Zoom Workplace Apps for Windows**
Affected versions:
- See references. (Status: affected)
### References
1. [](https://www.zoom.com/en/trust/security-bulletin/zsb-25015) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1533
- **State**: PUBLISHED
- **Published Date**: April 17, 2013 at 12:10 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: January 30, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 2.8.0 through 3.1.0, 5.1.0, 5.2.0, 5.3.1 through 5.3.3, and 6.0.1 through 12.0.0 allows remote authenticated users to affect confidentiality and integrity via vectors related to BASE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html)
2. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5411
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 10:28 UTC
- **Last Updated**: February 13, 2025 at 17:54 UTC
- **Reserved Date**: May 27, 2024 at 08:38 UTC
- **Assigned By**: CyberDanube
### Vulnerability Description
Missing input validation and OS command integration of the input in the ORing IAP-420 web-interface allows authenticated command injection.This issue affects IAP-420 version 2.01e and below.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**ORing - IAP-420**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/)
2. [](http://seclists.org/fulldisclosure/2024/May/36)
### Credits
- T. Weber |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4453
- **State**: PUBLISHED
- **Published Date**: October 09, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2013:1674](http://rhn.redhat.com/errata/RHSA-2013-1674.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=859448)
3. [55713](http://www.securityfocus.com/bid/55713)
4. [[oss-security] 20120927 Re: dracut creates non-world readable initramfs images](http://www.openwall.com/lists/oss-security/2012/09/27/4)
5. [dracut-initramfs-information-disclosure(79258)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79258)
6. [](http://git.kernel.org/?p=boot/dracut/dracut.git%3Ba=commit%3Bh=e1b48995c26c4f06d1a71)
7. [[oss-security] 20120927 Re: dracut creates world readable initramfs images](http://www.openwall.com/lists/oss-security/2012/09/27/6)
8. [[oss-security] 20120927 dracut creates non-world readable initramfs images](http://www.openwall.com/lists/oss-security/2012/09/27/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5160
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
WebRTC can use a "WrappedI420Buffer" pixel buffer but the owning image object can be freed while it is still in use. This can result in the WebRTC encoder using uninitialized memory, leading to a potentially exploitable crash. This vulnerability affects Firefox < 60.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2018-11/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1436117)
3. [1040896](http://www.securitytracker.com/id/1040896)
4. [USN-3645-1](https://usn.ubuntu.com/3645-1/)
5. [104139](http://www.securityfocus.com/bid/104139) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0571
- **State**: PUBLISHED
- **Published Date**: January 30, 2025 at 20:17 UTC
- **Last Updated**: February 10, 2025 at 22:08 UTC
- **Reserved Date**: January 19, 2025 at 03:31 UTC
- **Assigned By**: zdi
### Vulnerability Description
Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.
The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25305.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Sante - PACS Server**
Affected versions:
- 4.0.9 (Status: affected)
### References
1. [ZDI-25-051](https://www.zerodayinitiative.com/advisories/ZDI-25-051/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0698
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 03:35 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in GROWI v3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**WESEEK, Inc. - GROWI**
Affected versions:
- v3.2.3 and earlier (Status: affected)
### References
1. [JVN#96493183](https://jvn.jp/en/jp/JVN96493183/index.html)
2. [](https://weseek.co.jp/security/2018/12/25/growi-prevent-xss2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16311
- **State**: PUBLISHED
- **Published Date**: September 14, 2019 at 15:22 UTC
- **Last Updated**: August 05, 2024 at 01:10 UTC
- **Reserved Date**: September 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NIUSHOP V1.11 has CSRF via search_info to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/304/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52385
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 09:18 UTC
- **Last Updated**: November 14, 2024 at 19:34 UTC
- **Reserved Date**: January 26, 2024 at 06:51 UTC
- **Assigned By**: huawei
### Vulnerability Description
Out-of-bounds write vulnerability in the RSMC module.
Impact: Successful exploitation of this vulnerability will affect availability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/3/)
2. [](https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54431
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:13 UTC
- **Last Updated**: December 16, 2024 at 20:03 UTC
- **Reserved Date**: December 02, 2024 at 12:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Mohamed Riyaz Admin Customization allows Stored XSS.This issue affects Admin Customization: from n/a through 2.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Mohamed Riyaz - Admin Customization**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpp-customization/vulnerability/wordpress-admin-customization-plugin-2-2-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16282
- **State**: PUBLISHED
- **Published Date**: August 20, 2020 at 15:23 UTC
- **Last Updated**: August 04, 2024 at 13:37 UTC
- **Reserved Date**: August 03, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.contextis.com/en/resources/advisories/cve-2020-16282) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27926
- **State**: PUBLISHED
- **Published Date**: December 08, 2020 at 20:12 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.2 and iPadOS 14.2. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT211929)
2. [](https://support.apple.com/kb/HT212011)
3. [20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave](http://seclists.org/fulldisclosure/2020/Dec/26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29101
- **State**: PUBLISHED
- **Published Date**: March 19, 2024 at 15:50 UTC
- **Last Updated**: August 02, 2024 at 01:03 UTC
- **Reserved Date**: March 15, 2024 at 13:07 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jegtheme Jeg Elementor Kit allows Stored XSS.This issue affects Jeg Elementor Kit: from n/a through 2.6.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Jegtheme - Jeg Elementor Kit**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Abu Hurayra (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3730
- **State**: PUBLISHED
- **Published Date**: May 04, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: December 16, 2016 at 00:00 UTC
- **Assigned By**: openssl
### Vulnerability Description
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
### Affected Products
**OpenSSL - OpenSSL**
Affected versions:
- openssl-1.1.0 (Status: affected)
- openssl-1.1.0a (Status: affected)
- openssl-1.1.0b (Status: affected)
- openssl-1.1.0c (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
2. [41192](https://www.exploit-db.com/exploits/41192/)
3. [95812](http://www.securityfocus.com/bid/95812)
4. [](https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa)
5. [](https://www.openssl.org/news/secadv/20170126.txt)
6. [1037717](http://www.securitytracker.com/id/1037717)
7. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
8. [GLSA-201702-07](https://security.gentoo.org/glsa/201702-07)
9. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us)
10. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
### Credits
- Guido Vranken |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14387
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 18:03 UTC
- **Reserved Date**: July 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier. The attacker can access the user's account through the active session. The Session Fixation attack fixes a session on the victim's browser, so the attack starts before the user logs in.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/robiso/wondercms/issues/64)
2. [](https://www.wondercms.com/whatsnew) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7612
- **State**: REJECTED
- **Published Date**: April 15, 2020 at 20:53 UTC
- **Last Updated**: April 15, 2020 at 20:53 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6650
- **State**: PUBLISHED
- **Published Date**: March 21, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 10, 2016 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC RecoverPoint versions prior to 5.0 and EMC RecoverPoint for Virtual Machines versions prior to 5.0 have an SSL Stripping Vulnerability that may potentially be exploited by malicious users to compromise the affected system.
### Affected Products
**n/a - EMC RecoverPoint versions prior to 5.0 and EMC RecoverPoint for Virtual Machines versions prior to 5.0**
Affected versions:
- EMC RecoverPoint versions prior to 5.0 and EMC RecoverPoint for Virtual Machines versions prior to 5.0 (Status: affected)
### References
1. [1038066](http://www.securitytracker.com/id/1038066)
2. [](http://www.securityfocus.com/archive/1/540303/30/0/threaded)
3. [96156](http://www.securityfocus.com/bid/96156) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2096
- **State**: PUBLISHED
- **Published Date**: June 17, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in house/listing_view.php in phpCollegeExchange 0.1.5c allows remote attackers to execute arbitrary SQL commands via the itemnr parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8962](https://www.exploit-db.com/exploits/8962)
2. [35452](http://secunia.com/advisories/35452) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49463
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:53 UTC
- **Reserved Date**: November 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/strukturag/libheif/issues/1042)
2. [](https://github.com/strukturag/libheif) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9368
- **State**: PUBLISHED
- **Published Date**: December 19, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 11, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the twitterDash plugin 2.1 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the username_twitterDash parameter in the twitterDash.php page to wp-admin/options-general.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34153
- **State**: PUBLISHED
- **Published Date**: May 30, 2023 at 00:00 UTC
- **Last Updated**: January 10, 2025 at 21:02 UTC
- **Reserved Date**: May 29, 2023 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**n/a - ImageMagick**
Affected versions:
- ImageMagick-6.7 (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/6338)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=2210660)
3. [](https://access.redhat.com/security/cve/CVE-2023-34153)
4. [FEDORA-2023-d53831b69d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2ZUHZXQ2C3JZYKPW4XHCMVVL467MA2V/)
5. [FEDORA-2023-edbdccae2a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UFQJCYJ23HWHNDOVKBHZQ7HCXXL6MM3/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1195
- **State**: PUBLISHED
- **Published Date**: June 19, 2016 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Open redirect vulnerability in Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.cybozu.com/ja-jp/article/8987)
2. [JVNDB-2016-000081](http://jvndb.jvn.jp/jvndb/JVNDB-2016-000081)
3. [JVN#32218514](http://jvn.jp/en/jp/JVN32218514/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24609
- **State**: PUBLISHED
- **Published Date**: August 25, 2020 at 14:35 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TechKshetra Info Solutions Pvt. Ltd Savsoft Quiz 5.5 and earlier has XSS which can result in an attacker injecting the XSS payload in the User Registration section and each time the admin visits the manage user section from the admin panel, the XSS triggers and the attacker can steal the cookie via crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/48753)
2. [](https://www.exploit-db.com/exploits/48785) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1598
- **State**: PUBLISHED
- **Published Date**: October 01, 2014 at 14:00 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernelpanik.org/docs/kernelpanik/wordpressadv.txt)
2. [[oss-security] 20120106 Re: CVE-request: WordPress SQL injection and arbitrary code injection (2003)](http://seclists.org/oss-sec/2012/q1/77)
3. [8954](http://secunia.com/advisories/8954/)
4. [4610](http://osvdb.org/show/osvdb/4610)
5. [7784](http://www.securityfocus.com/bid/7784)
6. [wordpress-blogheader-sql-injection(12204)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30912
- **State**: PUBLISHED
- **Published Date**: June 08, 2022 at 13:23 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the UpdateWanParams parameter at /goform/aspForm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38681
- **State**: PUBLISHED
- **Published Date**: November 20, 2021 at 01:05 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: August 13, 2021 at 00:00 UTC
- **Assigned By**: qnap
### Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Negocios - Ragic Cloud DB**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-21-48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13442
- **State**: PUBLISHED
- **Published Date**: July 16, 2019 at 17:56 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SolarWinds Network Performance Monitor 12.3 allows SQL Injection via the /api/ActiveAlertsOnThisEntity/GetActiveAlerts TriggeringObjectEntityNames parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://labs.nettitude.com/blog/cve-2018-13442-solarwinds-npm-sql-injection/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2889
- **State**: PUBLISHED
- **Published Date**: May 30, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in tracking/courseLog.php in Dokeos 1.6.5 and earlier allows remote attackers to execute arbitrary SQL commands via the scormcontopen parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dokeos-courselog-sql-injection(34483)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34483)
2. [3980](https://www.exploit-db.com/exploits/3980)
3. [38061](http://osvdb.org/38061)
4. [24136](http://www.securityfocus.com/bid/24136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40449
- **State**: PUBLISHED
- **Published Date**: October 13, 2021 at 00:26 UTC
- **Last Updated**: February 07, 2025 at 14:36 UTC
- **Reserved Date**: September 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Win32k Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449)
2. [](http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35122
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:27 UTC
- **Last Updated**: February 12, 2025 at 20:01 UTC
- **Reserved Date**: May 09, 2024 at 16:27 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to access the target file.
### CVSS Metrics
- **CVSS Base Score**: 2.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**IBM - i**
Affected versions:
- 7.2, 7.3, 7.4, 7.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7178317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1300
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 13, 2002 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0633
- **State**: PUBLISHED
- **Published Date**: February 06, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Anon Proxy Server 0.102 and earlier, when user authentication is enabled, allows remote attackers to cause a denial of service (exception) via a user name with a large number of quotes, which triggers the overflow during escaping.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3618](http://securityreason.com/securityalert/3618)
2. [27593](http://www.securityfocus.com/bid/27593)
3. [](https://sourceforge.net/project/shownotes.php?group_id=138780&release_id=571924)
4. [20080203 Anon Proxy Server <= 0.102 remote buffer overflow](http://www.securityfocus.com/archive/1/487446/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6605
- **State**: PUBLISHED
- **Published Date**: October 06, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 21, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bugs 20915134 and 23142203, a different vulnerability than CVE-2015-7718.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[android-security-updates] 20151005 Nexus Security Bulletin (October 2015)](https://groups.google.com/forum/message/raw?msg=android-security-updates/_Rm-lKnS2M8/dGTcilt0CAAJ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45812
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 12:09 UTC
- **Last Updated**: January 09, 2025 at 15:25 UTC
- **Reserved Date**: November 23, 2022 at 07:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in Martin Lees Exxp plugin <= 2.6.8 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Martin Lees - Exxp**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/exxp-wp/wordpress-exxp-plugin-2-6-8-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Aman Rawat (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2727
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 10:20 UTC
- **Last Updated**: April 15, 2025 at 13:54 UTC
- **Reserved Date**: August 09, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Gym Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /mygym/admin/login.php. The manipulation of the argument admin_email/admin_pass leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205855.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Gym Management System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Blythe-LU/Record2/blob/main/Gym%20Management%20System%20Project%20-%20SQL%20injection.md)
2. [](https://vuldb.com/?id.205855) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24262
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:24 UTC
- **Last Updated**: April 01, 2025 at 04:05 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122373) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46796
- **State**: REJECTED
- **Published Date**: November 07, 2023 at 21:15 UTC
- **Last Updated**: January 02, 2024 at 21:31 UTC
- **Reserved Date**: October 26, 2023 at 13:15 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35549
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:49 UTC
- **Last Updated**: September 25, 2024 at 19:37 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 3.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 3.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**Oracle Corporation - Solaris Operating System**
Affected versions:
- 11 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0182
- **State**: PUBLISHED
- **Published Date**: April 01, 2023 at 04:31 UTC
- **Last Updated**: February 11, 2025 at 16:41 UTC
- **Reserved Date**: January 11, 2023 at 05:48 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service, information disclosure, and data tampering.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**NVIDIA - vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)**
Affected versions:
- All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5452) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25213
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 21:55 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 15, 2022 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
### Affected Products
**n/a - Phicomm Routers**
Affected versions:
- K3C (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2022-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-44863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-44863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-44863
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 00:00 UTC
- **Last Updated**: May 02, 2025 at 15:30 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerability in the msg_process function via the Url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA300-POE/msg_process_Url/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41053
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 20:22 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 22, 2023 at 16:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**redis - redis**
Affected versions:
- >= 7.0.0, < 7.0.13 (Status: affected)
- >= 7.1.0, < 7.2.1 (Status: affected)
### References
1. [https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc](https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc)
2. [https://github.com/redis/redis/commit/9e505e6cd842338424e05883521ca1fb7d0f47f6](https://github.com/redis/redis/commit/9e505e6cd842338424e05883521ca1fb7d0f47f6)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLBPIUUD273UGRN2WAYHPVUAULY36QVL/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA4MSJ623BH6HP5UHSJD2FOTN3QM5DQS/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLYNYT52EHR63E7L7SHRTHEPUMAFFDLX/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11187
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 21:40 UTC
- **Last Updated**: February 11, 2025 at 19:02 UTC
- **Reserved Date**: November 13, 2024 at 17:20 UTC
- **Assigned By**: isc
### Vulnerability Description
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-405: Security Weakness
### Affected Products
**ISC - BIND 9**
Affected versions:
- 9.11.0 (Status: affected)
- 9.16.0 (Status: affected)
- 9.18.0 (Status: affected)
- 9.20.0 (Status: affected)
- 9.21.0 (Status: affected)
- 9.11.3-S1 (Status: affected)
- 9.16.8-S1 (Status: affected)
- 9.18.11-S1 (Status: affected)
### References
1. [CVE-2024-11187](https://kb.isc.org/docs/cve-2024-11187)
### Credits
- ISC would like to thank Toshifumi Sakaguchi for bringing this vulnerability to our attention. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4638
- **State**: PUBLISHED
- **Published Date**: September 18, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 16, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The FastL4 virtual server in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.3.0 through 11.5.2 and 11.6.0 through 11.6.0 HF4, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.2.1 through 11.3.0, and BIG-IP PSM 11.2.1 through 11.4.1 allows remote attackers to cause a denial of service (Traffic Management Microkernel restart) via a fragmented packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.f5.com/kb/en-us/solutions/public/17000/100/sol17155.html)
2. [1033578](http://www.securitytracker.com/id/1033578) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1758
- **State**: PUBLISHED
- **Published Date**: April 08, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Stack-based buffer overflow in Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Word Stack Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-017](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14250
- **State**: REJECTED
- **Last Updated**: August 14, 2023 at 00:00 UTC
- **Reserved Date**: September 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1355
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3077](http://www.securityfocus.com/bid/3077)
2. [20010720 NetWin Authentication Module 3.0b password storage vulnerabilities / buffer overflows](http://online.securityfocus.com/archive/1/198293)
3. [netwin-nwauth-bo(6865)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6865) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4968
- **State**: PUBLISHED
- **Published Date**: October 20, 2023 at 06:35 UTC
- **Last Updated**: February 05, 2025 at 19:06 UTC
- **Reserved Date**: September 14, 2023 at 16:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WPLegalPages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wplegalpage' shortcode in versions up to, and including, 2.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**wpeka-club - Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/68d7b5d0-c777-4ff9-bdef-a7762cfbdf1a?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wplegalpages/tags/2.9.2/public/class-wp-legal-pages-public.php#L150)
3. [](https://plugins.trac.wordpress.org/changeset/2976774/wplegalpages/trunk/public/class-wp-legal-pages-public.php#file0)
### Credits
- Lana Codes |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.