System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6162
- **State**: PUBLISHED
- **Published Date**: October 27, 2017 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 17:23 UTC
- **Reserved Date**: February 21, 2017 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, 11.2.1, in some cases TMM may crash when processing TCP traffic. This vulnerability affects TMM via a virtual server configured with TCP profile. Traffic processing is disrupted while Traffic Management Microkernel (TMM) restarts. If the affected BIG-IP system is configured to be part of a device group, it will trigger a failover to the peer device.
### Affected Products
**F5 Networks, Inc. - BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe**
Affected versions:
- 12.0.0 - 12.1.2 (Status: affected)
- 11.6.0 â (Status: affected)
- € (Status: affected)
- " 11.6.1 (Status: affected)
- 11.4.0 â (Status: affected)
- " 11.5.4 (Status: affected)
- 11.2.1 (Status: affected)
### References
1. [101635](http://www.securityfocus.com/bid/101635)
2. [1039673](http://www.securitytracker.com/id/1039673)
3. [](https://support.f5.com/csp/article/K13421245) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23066
- **State**: REJECTED
- **Published Date**: June 26, 2023 at 00:00 UTC
- **Last Updated**: May 14, 2024 at 20:34 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000458
- **State**: PUBLISHED
- **Published Date**: January 02, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 22:14 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ContentLine analyzer allowing remote attackers to cause a denial of service (crash) and possibly other exploitation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bro/bro/commit/6c0f101a62489b1c5927b4ed63b0e1d37db40282)
2. [](https://bro-tracker.atlassian.net/browse/BIT-1856) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31701
- **State**: PUBLISHED
- **Published Date**: May 17, 2023 at 00:00 UTC
- **Last Updated**: January 22, 2025 at 17:19 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16210
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XSS in the SNMP configuration via the webserv/cplcfg/snmp.ssi SNMP_DESC or SNMP_LOC_SNMP_CONT field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45581](https://www.exploit-db.com/exploits/45581/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0799
- **State**: PUBLISHED
- **Published Date**: February 15, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the Quiz (com_quiz) 0.81 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the tid parameter in a user_tst_shw action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28980](http://secunia.com/advisories/28980)
2. [5119](https://www.exploit-db.com/exploits/5119)
3. [27808](http://www.securityfocus.com/bid/27808) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5785
- **State**: PUBLISHED
- **Published Date**: October 01, 2020 at 19:43 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.04.3 allows an unauthenticated attacker to conduct reflected cross-site scripting via a crafted ‘action’ or ‘pkg_name’ parameter.
### Affected Products
**n/a - Teltonika Gateway TRB245**
Affected versions:
- TRB2_R_00.02.04.3 firmware (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2020-57) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2923
- **State**: PUBLISHED
- **Published Date**: June 18, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 30, 2007 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The launch method in the LocalExec ActiveX control (LocalExec.ocx) in Novell exteNd Director 4.1 and Portal Services allows remote attackers to execute arbitrary commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37318](http://osvdb.org/37318)
2. [](https://secure-support.novell.com/KanisaPlatform/Publishing/360/3169416_f.SAL_Public.html)
3. [ADV-2007-2235](http://www.vupen.com/english/advisories/2007/2235)
4. [novell-localexec-command-execution(34898)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34898)
5. [VU#793433](http://www.kb.cert.org/vuls/id/793433)
6. [25710](http://secunia.com/advisories/25710)
7. [](http://www.novell.com/documentation/nedse41/readmesp2.txt)
8. [24493](http://www.securityfocus.com/bid/24493)
9. [1018258](http://www.securitytracker.com/id?1018258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1432, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1432
- **State**: PUBLISHED
- **Published Date**: October 23, 2007 at 01:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Epic Games Unreal Engine 226f through 436 allows remote attackers to cause a denial of service (CPU consumption or crash) and possibly execute arbitrary code via (1) a packet with a negative size value, which is treated as a large positive number during memory allocation, or (2) a negative size value in a package file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ut-packet-dos(11302)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11302)
2. [ut-negative-memory-corruption(11305)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11305)
3. [6770](http://www.securityfocus.com/bid/6770)
4. [6772](http://www.securityfocus.com/bid/6772)
5. [20030205 Unreal engine: results of my research](http://archives.neohapsis.com/archives/bugtraq/2003-02/0063.html)
6. [20030211 Re: Epic Games threatens to sue security researchers](http://archives.neohapsis.com/archives/bugtraq/2003-02/0142.html)
7. [ut-negative-udp-dos(12012)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12012)
8. [20030513 UT2003 client passive DoS exploit](http://archives.neohapsis.com/archives/bugtraq/2003-05/0142.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0101
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: January 08, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-10018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-10018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-10018
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 12:33 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: January 06, 2023 at 12:32 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in DBRisinajumi d2files and classified as critical. Affected by this vulnerability is the function actionUpload/actionDownloadFile of the file controllers/D2filesController.php. The manipulation leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is b5767f2ec9d0f3cbfda7f13c84740e2179c90574. It is recommended to upgrade the affected component. The identifier VDB-217561 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**DBRisinajumi - d2files**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.217561)
2. [](https://vuldb.com/?ctiid.217561)
3. [](https://github.com/DBRisinajumi/d2files/commit/b5767f2ec9d0f3cbfda7f13c84740e2179c90574)
4. [](https://github.com/DBRisinajumi/d2files/releases/tag/1.0.0)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5061
- **State**: PUBLISHED
- **Published Date**: November 13, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in php/cal_default.php in Mini Web Calendar (mwcal) 1.2 allows remote attackers to inject arbitrary web script or HTML via the URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49679](http://osvdb.org/49679)
2. [ADV-2008-3077](http://www.vupen.com/english/advisories/2008/3077)
3. [mwcal-caldefault-xss(46456)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46456)
4. [32196](http://www.securityfocus.com/bid/32196)
5. [32640](http://secunia.com/advisories/32640)
6. [4590](http://securityreason.com/securityalert/4590)
7. [7049](https://www.exploit-db.com/exploits/7049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6658
- **State**: PUBLISHED
- **Published Date**: September 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Apploi Job Search- Find Jobs (aka com.apploi) application 4.19 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#975681](http://www.kb.cert.org/vuls/id/975681) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18933
- **State**: PUBLISHED
- **Published Date**: November 21, 2019 at 22:45 UTC
- **Last Updated**: August 05, 2024 at 02:02 UTC
- **Reserved Date**: November 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Zulip Server versions from 1.7.0 to before 2.0.7, a bug in the new user signup process meant that users who registered their account using social authentication (e.g., GitHub or Google SSO) in an organization that also allows password authentication could have their personal API key stolen by an unprivileged attacker, allowing nearly full access to the user's account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.zulip.org/2019/11/21/zulip-2-0-7-security-release/)
2. [](https://github.com/zulip/zulip/commit/0c2cc41d2e40807baa5ee2c72987ebfb64ea2eb6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3738
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205221)
2. [1033274](http://www.securitytracker.com/id/1033274)
3. [](https://support.apple.com/kb/HT205030)
4. [openSUSE-SU-2016:0761](http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html)
5. [APPLE-SA-2015-09-16-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html)
6. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html)
7. [76338](http://www.securityfocus.com/bid/76338)
8. [APPLE-SA-2015-08-13-1](http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html)
9. [](https://support.apple.com/kb/HT205033) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29304
- **State**: PUBLISHED
- **Published Date**: December 14, 2020 at 19:48 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability exists in the SabaiApps WordPress Directories Pro plugin version 1.3.45 and previous, allows attackers who have convinced a site administrator to import a specially crafted CSV file to inject arbitrary web script or HTML as the victim is proceeding through the file import workflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://directoriespro.com/directories-pro-1-3-46/)
2. [20201211 Self-reflected XSS in WordPress DirectoriesPro 1.3.45 plugin disclosure.](http://seclists.org/fulldisclosure/2020/Dec/15)
3. [](http://packetstormsecurity.com/files/160452/WordPress-DirectoriesPro-1.3.45-Cross-Site-Scripting.html)
4. [](https://www.themissinglink.com.au/security-advisories-cve-2020-29304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46153
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 07:39 UTC
- **Last Updated**: September 06, 2024 at 18:44 UTC
- **Reserved Date**: October 17, 2023 at 11:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin <= 1.0.9 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**UserFeedback Team - User Feedback**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/userfeedback-lite/wordpress-user-feedback-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8322
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 19:50 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A potential vulnerability in the SMI callback function used in the Legacy USB driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Lenovo - BIOS**
Affected versions:
- various (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-30042)
### Credits
- Lenovo thanks yngwei (@yngweijw), driedfish (@d3af1sh), and MengHao, Li of IIE VARAS |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30474
- **State**: PUBLISHED
- **Published Date**: June 02, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use-after-free.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/aomedia/issues/detail?id=3000)
2. [](https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e)
3. [[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update](https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html)
4. [DSA-5490](https://www.debian.org/security/2023/dsa-5490)
5. [GLSA-202401-32](https://security.gentoo.org/glsa/202401-32) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9360
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 16, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An issue was discovered in General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 and prior versions, Proficy HMI/SCADA CIMPLICITY Version 9.0 and prior versions, and Proficy Historian Version 6.0 and prior versions. An attacker may be able to retrieve user passwords if he or she has access to an authenticated session.
### Affected Products
**n/a - GE Proficy HMI/SCADA iFIX, Proficy HMI/SCADA CIMPLICITY, and Proficy Historian**
Affected versions:
- GE Proficy HMI/SCADA iFIX, Proficy HMI/SCADA CIMPLICITY, and Proficy Historian (Status: affected)
### References
1. [1037809](http://www.securitytracker.com/id/1037809)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-336-05A)
3. [95630](http://www.securityfocus.com/bid/95630) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-43963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-43963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-43963
- **State**: PUBLISHED
- **Published Date**: April 20, 2025 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 02:13 UTC
- **Reserved Date**: April 20, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp allows out-of-buffer access because split_col and split_row values are not checked in 0x041f tag processing.
### CVSS Metrics
- **CVSS Base Score**: 2.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**LibRaw - LibRaw**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.libraw.org/news/libraw-0-21-4-release)
2. [](https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4)
3. [](https://github.com/LibRaw/LibRaw/commit/be26e7639ecf8beb55f124ce780e99842de2e964) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22313
- **State**: PUBLISHED
- **Published Date**: May 06, 2023 at 01:38 UTC
- **Last Updated**: January 29, 2025 at 15:43 UTC
- **Reserved Date**: January 03, 2022 at 22:29 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar Data Synchronization App 1.0 through 3.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 217370.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**IBM - QRadar Data Synchronization App**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6980797)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/217370) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7082, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7082
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 19:14 UTC
- **Last Updated**: August 02, 2024 at 08:50 UTC
- **Reserved Date**: December 22, 2023 at 16:03 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.
### Weakness Classification (CWE)
- CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness
### Affected Products
**Unknown - Import any XML or CSV File to WordPress**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/)
### Credits
- quangnt
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11742
- **State**: PUBLISHED
- **Published Date**: November 26, 2024 at 20:00 UTC
- **Last Updated**: November 28, 2024 at 06:47 UTC
- **Reserved Date**: November 26, 2024 at 13:24 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in SourceCodester Best House Rental Management System 1.0. This issue affects some unknown processing of the file /rental/ajax.php?action=save_tenant. The manipulation of the argument lastname/firstname/middlename leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**SourceCodester - Best House Rental Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-286139 | SourceCodester Best House Rental Management System ajax.php cross site scripting](https://vuldb.com/?id.286139)
2. [VDB-286139 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.286139)
3. [Submit #449683 | sourcecodester Best house rental management system project in php v1.0 Stored Cross-Site Scripting (XSS)](https://vuldb.com/?submit.449683)
4. [](https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Stored%20Cross-Site%20Scripting%20(XSS).md)
5. [](https://www.sourcecodester.com/)
### Credits
- Yasser Alshammari
- YasserREED (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2881
- **State**: PUBLISHED
- **Published Date**: September 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
phpCommunityCalendar 4.0.3 allows remote attackers to bypass authentication and gain unauthorized access via a direct request to the admin directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050905 phpCommunityCalendar 4.0.3 (possibly prior versions) sql injection / login bypass / cross site scripting](http://marc.info/?l=bugtraq&m=112605610624004&w=2)
2. [phpcommunitycalendar-admin-bypass-security(22182)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22182)
3. [](http://rgod.altervista.org/phpccal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47122
- **State**: PUBLISHED
- **Published Date**: September 26, 2024 at 17:19 UTC
- **Last Updated**: October 17, 2024 at 17:23 UTC
- **Reserved Date**: September 18, 2024 at 21:32 UTC
- **Assigned By**: icscert
### Vulnerability Description
In the goTenna Pro App, the encryption keys are stored along with a
static IV on the End User Device (EUD). This allows for complete
decryption of keys stored on the EUD if physically compromised. This
allows an attacker to decrypt all encrypted broadcast communications
based on encryption keys stored on the EUD. This requires access to and
control of the EUD, so it is recommended to use strong access control
measures and layered encryption on the EUD for more secure operation.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-922: Security Weakness
### Affected Products
**goTenna - Pro**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04)
### Credits
- Erwin Karincic, Clayton Smith, and Dale Wooden reported this these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41696
- **State**: REJECTED
- **Published Date**: March 26, 2024 at 08:30 UTC
- **Last Updated**: March 26, 2024 at 08:33 UTC
- **Reserved Date**: August 30, 2023 at 15:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1590
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 19:47 UTC
- **Last Updated**: November 05, 2020 at 19:47 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14495
- **State**: PUBLISHED
- **Published Date**: October 02, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1039474](http://www.securitytracker.com/id/1039474)
2. [](https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq)
3. [DSA-3989](http://www.debian.org/security/2017/dsa-3989)
4. [](https://access.redhat.com/security/vulnerabilities/3199382)
5. [101085](http://www.securityfocus.com/bid/101085)
6. [USN-3430-1](http://www.ubuntu.com/usn/USN-3430-1)
7. [101977](http://www.securityfocus.com/bid/101977)
8. [VU#973527](https://www.kb.cert.org/vuls/id/973527)
9. [GLSA-201710-27](https://security.gentoo.org/glsa/201710-27)
10. [USN-3430-2](http://www.ubuntu.com/usn/USN-3430-2)
11. [[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.](https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html)
12. [RHSA-2017:2836](https://access.redhat.com/errata/RHSA-2017:2836)
13. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4561)
14. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt)
15. [](http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45)
16. [42945](https://www.exploit-db.com/exploits/42945/)
17. [](http://thekelleys.org.uk/dnsmasq/CHANGELOG)
18. [openSUSE-SU-2017:2633](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html)
19. [](https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html)
20. [[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.](https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html)
21. [](https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0747
- **State**: PUBLISHED
- **Published Date**: February 08, 2023 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 14:01 UTC
- **Reserved Date**: February 08, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.6.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**btcpayserver - btcpayserver/btcpayserver**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff)
2. [](https://github.com/btcpayserver/btcpayserver/pull/4567/commits/d4e464ad4ef0cbbf61751e70f77865de325dd6cf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23362
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 01:53 UTC
- **Last Updated**: February 12, 2025 at 19:51 UTC
- **Reserved Date**: January 14, 2025 at 08:31 UTC
- **Assigned By**: jpcert
### Vulnerability Description
The old versions of EXIF Viewer Classic contain a cross-site scripting vulnerability caused by improper handling of EXIF meta data. When an image is rendered and crafted EXIF meta data is processed, an arbitrary script may be executed on the web browser. Versions 2.3.2 and 2.4.0 were reported as vulnerable. According to the vendor, the product has been refactored after those old versions and the version 3.0.1 is not vulnerable.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Rodrigue - EXIF Viewer Classic**
Affected versions:
- 2.4.0 and prior (Status: affected)
### References
1. [](https://chromewebstore.google.com/detail/exif-viewer-classic/nafpfdcmppffipmhcpkbplhkoiekndck)
2. [](https://exifviewers.com/)
3. [](https://jvn.jp/en/jp/JVN05508012/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1705
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1689.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032282](http://www.securitytracker.com/id/1032282)
2. [74509](http://www.securityfocus.com/bid/74509)
3. [MS15-043](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35327
- **State**: PUBLISHED
- **Published Date**: March 04, 2021 at 15:40 UTC
- **Last Updated**: August 04, 2024 at 17:02 UTC
- **Reserved Date**: December 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability was discovered in Courier Management System 1.0, which can be exploited via the ref_no (POST) parameter to admin_class.php
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/49243) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27440
- **State**: PUBLISHED
- **Published Date**: March 26, 2024 at 19:57 UTC
- **Last Updated**: August 06, 2024 at 18:39 UTC
- **Reserved Date**: March 01, 2023 at 14:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in OnTheGoSystems Types.This issue affects Types: from n/a through 3.4.17.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**OnTheGoSystems - Types**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/types/wordpress-toolset-types-plugin-3-4-17-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40984
- **State**: PUBLISHED
- **Published Date**: September 15, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 15:38 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in the File Manager function of Webmin v2.100 allows attackers to execute malicious scripts via injecting a crafted payload into the Replace in Results file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://webmin.com)
2. [](https://github.com/Vi39/Webmin-2.100/blob/main/CVE-2023-40984) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3793
- **State**: PUBLISHED
- **Published Date**: November 24, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 24, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in AlstraSoft Affiliate Network Pro 7.2 allow remote attackers to bypass authentication and execute arbitrary SQL commands via the (1) username or (2) password to admin/admin_validate_login, or the (3) login, (4) password, and (5) flag parameters to login_validate.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://myblog.it-security23.net/?postid=5)
2. [20893](http://www.osvdb.org/20893)
3. [affiliate-network-login-sql-injection(23073)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23073)
4. [ADV-2005-2455](http://www.vupen.com/english/advisories/2005/2455)
5. [20051115 Affiliate Network Pro v7.2 SQL Injections, Arbitrary code execution, XSS](http://marc.info/?l=bugtraq&m=113209435819541&w=2)
6. [20889](http://www.osvdb.org/20889)
7. [17605](http://secunia.com/advisories/17605/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10850
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 02:02 UTC
- **Last Updated**: November 13, 2024 at 14:42 UTC
- **Reserved Date**: November 05, 2024 at 12:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Razorpay Payment Button Elementor Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**razorpay - Razorpay Payment Button Elementor Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9331aa66-2eee-4745-b286-fa6db3bd9f37?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/razorpay-payment-button-elementor/tags/1.2.5/includes/rzp-payment-buttons.php#L78)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18998
- **State**: PUBLISHED
- **Published Date**: February 05, 2019 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:16 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
LCDS Laquis SCADA prior to version 4.1.0.4150 uses hard coded credentials, which may allow an attacker unauthorized access to the system with high privileges.
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**ICS-CERT - LCDS Laquis SCADA**
Affected versions:
- All versions prior to version 4.1.0.4150 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01)
2. [106634](http://www.securityfocus.com/bid/106634) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3506
- **State**: PUBLISHED
- **Published Date**: October 18, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle OpenSSO component in Oracle Sun Products Suite 7.1 and 8.0 allows remote attackers to affect integrity via unknown vectors related to Authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46527](http://secunia.com/advisories/46527)
2. [46528](http://secunia.com/advisories/46528)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html)
4. [50084](http://secunia.com/advisories/50084)
5. [RHSA-2012:1232](http://rhn.redhat.com/errata/RHSA-2012-1232.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0817
- **State**: PUBLISHED
- **Published Date**: March 24, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1031958](http://www.securitytracker.com/id/1031958)
2. [](http://www.mozilla.org/security/announce/2015/mfsa2015-29.html)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1145255)
4. [openSUSE-SU-2015:0636](http://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html)
5. [73263](http://www.securityfocus.com/bid/73263)
6. [openSUSE-SU-2015:0567](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html)
7. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
8. [RHSA-2015:0718](http://rhn.redhat.com/errata/RHSA-2015-0718.html)
9. [DSA-3201](http://www.debian.org/security/2015/dsa-3201)
10. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
11. [SUSE-SU-2015:0630](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html)
12. [SUSE-SU-2015:0593](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html)
13. [USN-2538-1](http://www.ubuntu.com/usn/USN-2538-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43600
- **State**: PUBLISHED
- **Published Date**: December 23, 2022 at 23:03 UTC
- **Last Updated**: April 14, 2025 at 18:53 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**OpenImageIO Project - OpenImageIO**
Affected versions:
- v2.4.4.2 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656)
2. [](https://www.debian.org/security/2023/dsa-5384)
3. [](https://security.gentoo.org/glsa/202305-33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4935
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 17:27 UTC
- **Last Updated**: January 13, 2025 at 16:55 UTC
- **Reserved Date**: April 05, 2023 at 17:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WCFM Marketplace plugin for WordPress is vulnerable to unauthorized modification and access of data in versions up to, and including, 3.4.11 due to missing capability checks on various AJAX actions. This makes it possible for authenticated attackers, with minimal permissions such as subscribers, to perform a wide variety of actions such as modifying shipping method details, modifying products, deleting arbitrary posts, and privilege escalation (via the wp_ajax_wcfm_vendor_store_online AJAX action).
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**wclovers - WCFM Marketplace – Best Multivendor Marketplace for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/85730e9b-c5da-473c-a324-891c5c9f7ba3?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2630696%40wc-multivendor-marketplace&new=2630696%40wc-multivendor-marketplace&sfp_email=&sfph_mail=)
### Credits
- Chloe Chamberland |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5977
- **State**: PUBLISHED
- **Published Date**: September 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Mobile Face (aka com.wFacemobile) application 0.74.13432.91159 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#335041](http://www.kb.cert.org/vuls/id/335041)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1855
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 16:08 UTC
- **Reserved Date**: April 05, 2023 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - Kernel**
Affected versions:
- Linux kernel prior to Kernel 6.3 RC3 (Status: affected)
### References
1. [](https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/)
2. [[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html)
3. [[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html)
4. [](https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4056
- **State**: PUBLISHED
- **Published Date**: December 07, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 07, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in search.php in PluggedOut Nexus 0.1 allows remote attackers to execute arbitrary SQL commands via the (1) Location, (2) Last Name, and (3) First Name parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pridels0.blogspot.com/2005/12/pluggedout-nexus-sqlxss-vuln_06.html)
2. [15724](http://www.securityfocus.com/bid/15724)
3. [ADV-2005-2751](http://www.vupen.com/english/advisories/2005/2751)
4. [21478](http://www.osvdb.org/21478)
5. [17909](http://secunia.com/advisories/17909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1136
- **State**: PUBLISHED
- **Published Date**: December 08, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: December 05, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in CuteFTP Professional 6.0, and possibly other versions, allows remote FTP servers to cause a denial of service (application crash) via large replies to FTP commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [cuteftp-reply-bo(18309)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18309)
2. [20041129 CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability](http://marc.info/?l=bugtraq&m=110182983622642&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11382
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:45 UTC
- **Last Updated**: December 20, 2021 at 22:45 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2389
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 18:31 UTC
- **Last Updated**: March 18, 2025 at 13:36 UTC
- **Reserved Date**: March 16, 2025 at 17:23 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add_city.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Blood Bank Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-299888 | code-projects Blood Bank Management System add_city.php sql injection](https://vuldb.com/?id.299888)
2. [VDB-299888 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299888)
3. [Submit #516906 | code-projects Blood Bank Management System 1 SQL Injection](https://vuldb.com/?submit.516906)
4. [](https://github.com/intercpt/XSS1/blob/main/SQL7.md)
5. [](https://code-projects.org/)
### Credits
- intrcpt (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11211
- **State**: PUBLISHED
- **Published Date**: September 18, 2019 at 22:21 UTC
- **Last Updated**: September 17, 2024 at 03:34 UTC
- **Reserved Date**: April 12, 2019 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The server component of TIBCO Software Inc.'s TIBCO Enterprise Runtime for R - Server Edition, and TIBCO Spotfire Analytics Platform for AWS Marketplace contains a vulnerability that theoretically allows an authenticated user to trigger remote code execution in certain circumstances. When the affected component runs with the containerized TERR service on Linux the host can theoretically be tricked into running malicious code. This issue affects: TIBCO Enterprise Runtime for R - Server Edition version 1.2.0 and below, and TIBCO Spotfire Analytics Platform for AWS Marketplace 10.4.0; 10.5.0.
### Affected Products
**TIBCO Software Inc. - TIBCO Enterprise Runtime for R - Server Edition**
Affected versions:
- 1.2.0 and below (Status: affected)
**TIBCO Software Inc. - TIBCO Spotfire Analytics Platform for AWS Marketplace**
Affected versions:
- 10.4.0 (Status: affected)
- 10.5.0 (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2019/09/tibco-security-advisory-september-17-2019-tibco-enterprise-runtime-for-r-server-2019-11211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7798, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7798 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7798
- **State**: PUBLISHED
- **Published Date**: November 02, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A Insufficient Verification of Data Authenticity (CWE-345) vulnerability exists in the Modicon M221, all versions, which could cause a change of IPv4 configuration (IP address, mask and gateway) when remotely connected to the device.
### Affected Products
**Schneider Electric SE - Modicon M221, All Versions**
Affected versions:
- Modicon M221, All Versions (Status: affected)
### References
1. [105970](http://www.securityfocus.com/bid/105970)
2. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-270-01/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3553
- **State**: PUBLISHED
- **Published Date**: June 19, 2012 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 04:25 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://downloads.asterisk.org/pub/security/AST-2012-009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2060
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2511
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 13:51 UTC
- **Last Updated**: March 28, 2025 at 19:21 UTC
- **Reserved Date**: March 15, 2024 at 15:33 UTC
- **Assigned By**: openssl
### Vulnerability Description
Issue summary: Some non-default TLS server configurations can cause unbounded
memory growth when processing TLSv1.3 sessions
Impact summary: An attacker may exploit certain server configurations to trigger
unbounded memory growth that would lead to a Denial of Service
This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is
being used (but not if early_data support is also configured and the default
anti-replay protection is in use). In this case, under certain conditions, the
session cache can get into an incorrect state and it will fail to flush properly
as it fills. The session cache will continue to grow in an unbounded manner. A
malicious client could deliberately create the scenario for this failure to
force a Denial of Service. It may also happen by accident in normal operation.
This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS
clients.
The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL
1.0.2 is also not affected by this issue.
### Weakness Classification (CWE)
- CWE-1325: Security Weakness
### Affected Products
**OpenSSL - OpenSSL**
Affected versions:
- 3.2.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 1.1.1 (Status: affected)
### References
1. [OpenSSL Advisory](https://www.openssl.org/news/secadv/20240408.txt)
2. [3.2.2 git commit](https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08)
3. [3.1.6 git commit](https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce)
4. [3.0.14 git commit](https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d)
5. [1.1.1y git commit](https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640)
### Credits
- Manish Patidar (Hewlett Packard Enterprise)
- Matt Caswell |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6433
- **State**: PUBLISHED
- **Published Date**: June 02, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:39 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The default configuration in the Red Hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [59533](http://secunia.com/advisories/59533)
2. [USN-2255-1](http://www.ubuntu.com/usn/USN-2255-1)
3. [RHSA-2014:0516](http://rhn.redhat.com/errata/RHSA-2014-0516.html)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1039812) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7100
- **State**: PUBLISHED
- **Published Date**: May 23, 2019 at 16:29 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Shockwave Player**
Affected versions:
- 12.3.4.204 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/shockwave/apsb19-20.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37771
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 13:07 UTC
- **Last Updated**: May 26, 2025 at 05:20 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- b64625a303de727498f80f8cb9833fc615c0a90f (Status: affected)
- b64625a303de727498f80f8cb9833fc615c0a90f (Status: affected)
- b64625a303de727498f80f8cb9833fc615c0a90f (Status: affected)
- b64625a303de727498f80f8cb9833fc615c0a90f (Status: affected)
- b64625a303de727498f80f8cb9833fc615c0a90f (Status: affected)
- b64625a303de727498f80f8cb9833fc615c0a90f (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.25 (Status: unaffected)
- 6.14.4 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b7c41df4913789ebfe73cc1e17c6401d4c5eab69)
2. [](https://git.kernel.org/stable/c/402964994e8ece29702383b234fabcf04791ff95)
3. [](https://git.kernel.org/stable/c/5096174074114f83c700a27869c54362cbb10f3e)
4. [](https://git.kernel.org/stable/c/6413fed016208171592c88b5df002af8a1387e24)
5. [](https://git.kernel.org/stable/c/baa54adb5e0599299b8f088efb5544d876a3eb62)
6. [](https://git.kernel.org/stable/c/7d641c2b83275d3b0424127b2e0d2d0f7dd82aef) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1800
- **State**: PUBLISHED
- **Published Date**: March 26, 2020 at 14:27 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
HUAWEI smartphones P30 with versions earlier than 10.0.0.185(C00E85R1P11) have an improper access control vulnerability. The software incorrectly restricts access to a function interface from an unauthorized actor, the attacker tricks the user into installing a crafted application, successful exploit could allow the attacker do certain unauthenticated operations.
### Affected Products
**n/a - HUAWEI P30**
Affected versions:
- Versions earlier than 10.0.0.185(C00E85R1P11) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200325-02-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0842
- **State**: PUBLISHED
- **Published Date**: April 18, 2016 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 16, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The H.264 decoder in libstagefright in Android 6.x before 2016-04-01 mishandles Memory Management Control Operation (MMCO) data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 25818142.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/external/libavc/+/943323f1d9d3dd5c2634deb26cbe72343ca6b3db)
2. [](http://source.android.com/security/bulletin/2016-04-02.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1163
- **State**: PUBLISHED
- **Published Date**: February 28, 2007 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 28, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in printview.php in webSPELL 4.01.02 and earlier allows remote attackers to execute arbitrary SQL commands via the topic parameter, a different vector than CVE-2007-1019, CVE-2006-5388, and CVE-2006-4783.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33231](http://osvdb.org/33231)
2. [22659](http://www.securityfocus.com/bid/22659)
3. [24257](http://secunia.com/advisories/24257)
4. [ADV-2007-0714](http://www.vupen.com/english/advisories/2007/0714)
5. [3351](https://www.exploit-db.com/exploits/3351) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35884
- **State**: PUBLISHED
- **Published Date**: June 20, 2023 at 06:50 UTC
- **Last Updated**: October 10, 2024 at 18:35 UTC
- **Reserved Date**: June 19, 2023 at 13:54 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in EventPrime plugin <= 3.0.5 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**EventPrime - EventPrime**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4003
- **State**: PUBLISHED
- **Published Date**: August 07, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: August 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The config method in Henrik Storner Hobbit monitor before 4.1.2p2 permits access to files outside of the intended configuration directory, which allows remote attackers to obtain sensitive information via requests to the hobbitd daemon on port 1984/tcp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-3139](http://www.vupen.com/english/advisories/2006/3139)
2. [hobbitmonitor-config-information-disclosure(28204)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28204)
3. [20060802 Hobbit monitor security bugfix release - 4.1.2p2](http://www.securityfocus.com/archive/1/442036/100/0/threaded)
4. [19317](http://www.securityfocus.com/bid/19317)
5. [](http://sourceforge.net/project/shownotes.php?release_id=436594&group_id=128058)
6. [21317](http://secunia.com/advisories/21317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52540
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 08:46 UTC
- **Last Updated**: March 28, 2025 at 20:40 UTC
- **Reserved Date**: February 27, 2024 at 03:41 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of improper authentication in the Iaware module.
Impact: Successful exploitation of this vulnerability will affect availability.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/3/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6821
- **State**: PUBLISHED
- **Published Date**: June 03, 2009 at 20:35 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: June 03, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the DAS server in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 might allow attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, a different vulnerability than CVE-2007-3676 and CVE-2008-3853.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21318189)
3. [IZ22004](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22004)
4. [IZ22188](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22188)
5. [IZ22190](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22190)
6. [31787](http://secunia.com/advisories/31787)
7. [35408](http://www.securityfocus.com/bid/35408)
8. [db2-das-bo(51108)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3941
- **State**: PUBLISHED
- **Published Date**: November 16, 2009 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: November 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Martin Lambers mpop before 1.0.19, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://mpop.sourceforge.net/news.html)
2. [37312](http://secunia.com/advisories/37312)
3. [ADV-2009-3225](http://www.vupen.com/english/advisories/2009/3225) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36700
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 20:42 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /items/manage_item.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/vul-wiki/blob/master/vendors/oretnom23/ingredients-stock-management-system/SQLi-13.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24067
- **State**: PUBLISHED
- **Published Date**: February 25, 2021 at 23:01 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Office Online Server**
Affected versions:
- https://aka.ms/OfficeSecurityReleases (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24067) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4296
- **State**: PUBLISHED
- **Published Date**: August 16, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55035](http://www.securityfocus.com/bid/55035)
2. [](http://www.wireshark.org/security/wnpa-sec-2012-18.html)
3. [DSA-2590](http://www.debian.org/security/2012/dsa-2590)
4. [54425](http://secunia.com/advisories/54425)
5. [](https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3)
6. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
7. [51363](http://secunia.com/advisories/51363)
8. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtps2.c?r1=44320&r2=44319&pathrev=44320)
9. [oval:org.mitre.oval:def:15583](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15583)
10. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7568)
11. [openSUSE-SU-2012:1035](http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html)
12. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=44320)
13. [50276](http://secunia.com/advisories/50276)
14. [openSUSE-SU-2012:1067](https://hermes.opensuse.org/messages/15514562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2653
- **State**: PUBLISHED
- **Published Date**: August 03, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 03, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The NtUserConsoleControl function in win32k.sys in Microsoft Windows XP SP2 and SP3, and Server 2003 before SP1, allows local administrators to bypass unspecified "security software" and gain privileges via a crafted call that triggers an overwrite of an arbitrary memory location. NOTE: the vendor disputes the significance of this report, stating that 'the Administrator to SYSTEM "escalation" is not a security boundary we defend.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ntinternals.org/index.html#09_07_30)
2. [1022630](http://securitytracker.com/id?1022630)
3. [](http://blogs.technet.com/srd/archive/2009/06/11/latest-baidu-public-posting-requires-adminisrator-to-elevate.aspx)
4. [56780](http://osvdb.org/56780)
5. [9301](http://www.exploit-db.com/exploits/9301)
6. [](http://hi.baidu.com/azy0922/blog/item/f950cbc2890729130ef47783.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34796
- **State**: PUBLISHED
- **Published Date**: June 22, 2023 at 00:00 UTC
- **Last Updated**: December 04, 2024 at 21:45 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross site scripting (XSS) vulnerabiliy in dmarcts-report-viewer dashboard versions 1.1 and thru commit 8a1d882b4c481a05e296e9b38a7961e912146a0f, allows unauthenticated attackers to execute arbitrary code via the org_name or domain values.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://xmit.xyz/security/dmarcd-for-death/)
2. [](https://github.com/techsneeze/dmarcts-report-viewer/pull/88) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32022
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 14:46 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 09, 2024 at 15:29 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to command injection in basic_caption_gui.py. This vulnerability is fixed in 23.1.5.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**bmaltais - kohya_ss**
Affected versions:
- >= 22.6.1, < 23.1.5 (Status: affected)
### References
1. [https://github.com/bmaltais/kohya_ss/security/advisories/GHSA-m6jq-7j4v-2fg3](https://github.com/bmaltais/kohya_ss/security/advisories/GHSA-m6jq-7j4v-2fg3)
2. [https://github.com/bmaltais/kohya_ss/commit/831af8babeb75faff62bcc6a8c6a4f80354f1ff1](https://github.com/bmaltais/kohya_ss/commit/831af8babeb75faff62bcc6a8c6a4f80354f1ff1)
3. [https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss](https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47549
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 15:09 UTC
- **Last Updated**: May 04, 2025 at 07:13 UTC
- **Reserved Date**: May 24, 2024 at 15:02 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
When the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux,
a bug is reported:
==================================================================
BUG: Unable to handle kernel data access on read at 0x80000800805b502c
Oops: Kernel access of bad area, sig: 11 [#1]
NIP [c0000000000388a4] .ioread32+0x4/0x20
LR [80000000000c6034] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl]
Call Trace:
.free_irq+0x1c/0x4e0 (unreliable)
.ata_host_stop+0x74/0xd0 [libata]
.release_nodes+0x330/0x3f0
.device_release_driver_internal+0x178/0x2c0
.driver_detach+0x64/0xd0
.bus_remove_driver+0x70/0xf0
.driver_unregister+0x38/0x80
.platform_driver_unregister+0x14/0x30
.fsl_sata_driver_exit+0x18/0xa20 [sata_fsl]
.__se_sys_delete_module+0x1ec/0x2d0
.system_call_exception+0xfc/0x1f0
system_call_common+0xf8/0x200
==================================================================
The triggering of the BUG is shown in the following stack:
driver_detach
device_release_driver_internal
__device_release_driver
drv->remove(dev) --> platform_drv_remove/platform_remove
drv->remove(dev) --> sata_fsl_remove
iounmap(host_priv->hcr_base); <---- unmap
kfree(host_priv); <---- free
devres_release_all
release_nodes
dr->node.release(dev, dr->data) --> ata_host_stop
ap->ops->port_stop(ap) --> sata_fsl_port_stop
ioread32(hcr_base + HCONTROL) <---- UAF
host->ops->host_stop(host)
The iounmap(host_priv->hcr_base) and kfree(host_priv) functions should
not be executed in drv->remove. These functions should be executed in
host_stop after port_stop. Therefore, we move these functions to the
new function sata_fsl_host_stop and bind the new function to host_stop.
### Affected Products
**Linux - Linux**
Affected versions:
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
- faf0b2e5afe7dae072d2715763c7f992b612b628 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.24 (Status: affected)
- 0 (Status: unaffected)
- 4.4.294 (Status: unaffected)
- 4.9.292 (Status: unaffected)
- 4.14.257 (Status: unaffected)
- 4.19.220 (Status: unaffected)
- 5.4.164 (Status: unaffected)
- 5.10.84 (Status: unaffected)
- 5.15.7 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947)
2. [](https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce)
3. [](https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1)
4. [](https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a)
5. [](https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45)
6. [](https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097)
7. [](https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082)
8. [](https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5989, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5989 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5989
- **State**: PUBLISHED
- **Published Date**: December 13, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the skype4com URI handler in Skype before 3.6 GOLD allows remote attackers to execute arbitrary code via "short string values" that result in heap corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-4110](http://www.vupen.com/english/advisories/2007/4110)
2. [1019056](http://securitytracker.com/id?1019056)
3. [27934](http://secunia.com/advisories/27934)
4. [3440](http://securityreason.com/securityalert/3440)
5. [20071206 ZDI-07-070: Skype skype4com URI Handler Remote Heap Corruption Vulnerability](http://www.securityfocus.com/archive/1/484703/100/0/threaded)
6. [39170](http://osvdb.org/39170)
7. [26748](http://www.securityfocus.com/bid/26748)
8. [](http://www.zerodayinitiative.com/advisories/ZDI-07-070.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9335
- **State**: PUBLISHED
- **Published Date**: August 22, 2019 at 12:17 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: August 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The limit-attempts plugin before 1.1.1 for WordPress has SQL injection during IP address handling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/limit-attempts/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37812
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:05 UTC
- **Last Updated**: August 03, 2024 at 10:37 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the firewallEn parameter in the function formSetFirewallCfg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6095
- **State**: PUBLISHED
- **Published Date**: February 02, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Key Lifecycle Manager 2.5 and 2.6 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.
### Affected Products
**IBM Corporation - Key Lifecycle Manager**
Affected versions:
- 2.5 (Status: affected)
- 1.0 (Status: affected)
- 2.0 (Status: affected)
- 2.0.1 (Status: affected)
- 2.6 (Status: affected)
### References
1. [95965](http://www.securityfocus.com/bid/95965)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21997802) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33053
- **State**: PUBLISHED
- **Published Date**: December 05, 2023 at 03:04 UTC
- **Last Updated**: December 02, 2024 at 17:10 UTC
- **Reserved Date**: May 17, 2023 at 09:28 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in Kernel while parsing metadata.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- CSR8811 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QCA0000 (Status: affected)
- QCA4024 (Status: affected)
- QCA6174A (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8386 (Status: affected)
- QCA9377 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCM6490 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN9000 (Status: affected)
- QCN9012 (Status: affected)
- QCN9013 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QCS6490 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SDX55 (Status: affected)
- SDX65M (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon X12 LTE Modem (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- WCD9335 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1750
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in the kernel in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows attackers to execute arbitrary code in a privileged context via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html)
2. [](https://support.apple.com/HT206167)
3. [](https://support.apple.com/HT206168)
4. [1035353](http://www.securitytracker.com/id/1035353)
5. [APPLE-SA-2016-03-21-1](http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html)
6. [APPLE-SA-2016-03-21-2](http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html)
7. [APPLE-SA-2016-03-21-3](http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html)
8. [](https://support.apple.com/HT206169)
9. [](https://support.apple.com/HT206166) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0712
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 21:23 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0711, CVE-2020-0713, CVE-2020-0767.
### Affected Products
**Microsoft - ChakraCore**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2019**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2016**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0712) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13287
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 14:26 UTC
- **Last Updated**: September 16, 2024 at 20:17 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Incorrect default permissions vulnerability in synouser.conf in Synology Router Manager (SRM) before 1.1.7-6941-1 allows remote authenticated users to obtain sensitive information via the world readable configuration.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Synology - Synology Router Manager (SRM)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.synology.com/security/advisory/Synology_SA_18_34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4630
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45574
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:45 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064096/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37220
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 01, 2024 at 17:38 UTC
- **Reserved Date**: June 04, 2024 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in OptinlyHQ Optinly allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Optinly: from n/a through 1.0.18.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**OptinlyHQ - Optinly**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/optinly/wordpress-optinly-plugin-1-0-18-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Yudistira Arya (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31594
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 00:00 UTC
- **Last Updated**: January 16, 2025 at 15:04 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via an exposed HTTP channel using VLC network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ic.com)
2. [](https://github.com/Yozarseef95/CVE-2023-31594) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12957
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:42 UTC
- **Last Updated**: June 11, 2021 at 21:42 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2531
- **State**: PUBLISHED
- **Published Date**: June 03, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the search script in Build A Niche Store (BANS) 3.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [bans-search-xss(42373)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42373)
2. [](http://holisticinfosec.org/content/view/64/45/)
3. [30153](http://secunia.com/advisories/30153)
4. [29187](http://www.securityfocus.com/bid/29187) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3297, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3297 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3297
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036789](http://www.securitytracker.com/id/1036789)
2. [MS16-104](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-104)
3. [MS16-105](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105)
4. [92829](http://www.securityfocus.com/bid/92829)
5. [1036788](http://www.securitytracker.com/id/1036788) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11740
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libtskbase.a in The Sleuth Kit (TSK) from release 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found in the function tsk_UTF16toUTF8 in tsk/base/tsk_unicode.c which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sleuthkit/sleuthkit/issues/1264) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9057
- **State**: PUBLISHED
- **Published Date**: December 16, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 23, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [61227](http://secunia.com/advisories/61227)
2. [DSA-3183](https://www.debian.org/security/2015/dsa-3183)
3. [](https://movabletype.org/news/2014/12/6.0.6.html)
4. [](https://movabletype.org/documentation/appendices/release-notes/6.0.6.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0394
- **State**: PUBLISHED
- **Published Date**: February 03, 2009 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: February 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in login.php in Pre Lecture Exercises (PLEs) CMS 1.0 beta 4.2 allows remote attackers to execute arbitrary SQL commands via the school parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33524](http://www.securityfocus.com/bid/33524)
2. [7917](https://www.exploit-db.com/exploits/7917) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24536
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3961
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 06:31 UTC
- **Last Updated**: April 28, 2025 at 14:26 UTC
- **Reserved Date**: April 26, 2025 at 07:03 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**withstars - Books-Management-System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306297 | withstars Books-Management-System do cross site scripting](https://vuldb.com/?id.306297)
2. [VDB-306297 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306297)
3. [Submit #557231 | https://github.com/withstars/Blog-System Blog-System 1.0 Stored Cross-Site Scripting](https://vuldb.com/?submit.557231)
4. [](https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md)
### Credits
- Caigosec (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40776
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 18:35 UTC
- **Last Updated**: April 23, 2025 at 18:14 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Lightroom Classic 10.3 (and earlier) are affected by a privilege escalation vulnerability in the Offline Lightroom Classic installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-379: Security Weakness
### Affected Products
**Adobe - Lightroom Classic**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/lightroom/apsb21-97.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2923
- **State**: PUBLISHED
- **Published Date**: October 02, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.google.com/p/chromium/issues/detail?id=237800)
2. [](http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html)
3. [oval:org.mitre.oval:def:18103](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18103)
4. [](https://code.google.com/p/chromium/issues/detail?id=294206)
5. [](https://code.google.com/p/chromium/issues/detail?id=284792)
6. [](https://code.google.com/p/chromium/issues/detail?id=274020)
7. [](https://code.google.com/p/chromium/issues/detail?id=264211)
8. [](https://code.google.com/p/chromium/issues/detail?id=276111)
9. [openSUSE-SU-2014:0065](http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html)
10. [DSA-2785](http://www.debian.org/security/2013/dsa-2785)
11. [](https://code.google.com/p/chromium/issues/detail?id=265731)
12. [](https://code.google.com/p/chromium/issues/detail?id=288771)
13. [](https://code.google.com/p/chromium/issues/detail?id=254728)
14. [openSUSE-SU-2013:1556](http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html)
15. [](https://code.google.com/p/chromium/issues/detail?id=294202)
16. [](https://code.google.com/p/chromium/issues/detail?id=288761)
17. [](https://code.google.com/p/chromium/issues/detail?id=246724)
18. [](https://code.google.com/p/chromium/issues/detail?id=266593)
19. [](https://code.google.com/p/chromium/issues/detail?id=299016)
20. [](https://code.google.com/p/chromium/issues/detail?id=260138)
21. [](https://code.google.com/p/chromium/issues/detail?id=279286)
22. [](https://code.google.com/p/chromium/issues/detail?id=277656)
23. [](https://code.google.com/p/chromium/issues/detail?id=294023)
24. [](https://code.google.com/p/chromium/issues/detail?id=257852)
25. [](https://code.google.com/p/chromium/issues/detail?id=269835)
26. [](https://code.google.com/p/chromium/issues/detail?id=267068)
27. [](https://code.google.com/p/chromium/issues/detail?id=293521)
28. [openSUSE-SU-2013:1861](http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html)
29. [](https://code.google.com/p/chromium/issues/detail?id=285380)
30. [](https://code.google.com/p/chromium/issues/detail?id=278366)
31. [](https://code.google.com/p/chromium/issues/detail?id=289648)
32. [](https://code.google.com/p/chromium/issues/detail?id=265493) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6801
- **State**: PUBLISHED
- **Published Date**: July 17, 2024 at 01:31 UTC
- **Last Updated**: August 01, 2024 at 21:45 UTC
- **Reserved Date**: July 16, 2024 at 19:14 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in SourceCodester Online Student Management System 1.0. This issue affects some unknown processing of the file /add-students.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271703.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SourceCodester - Online Student Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-271703 | SourceCodester Online Student Management System add-students.php unrestricted upload](https://vuldb.com/?id.271703)
2. [VDB-271703 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.271703)
3. [Submit #374774 | SourceCodester Online student management system in php free download v1.0 Unrestricted Upload](https://vuldb.com/?submit.374774)
4. [](https://github.com/aaajuna/demo/issues/1)
### Credits
- aaajun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16085
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
A use after free in ResourceCoordinator in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [105215](http://www.securityfocus.com/bid/105215)
2. [RHSA-2018:2666](https://access.redhat.com/errata/RHSA-2018:2666)
3. [](https://crbug.com/856578)
4. [](https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html)
5. [GLSA-201811-10](https://security.gentoo.org/glsa/201811-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5510
- **State**: PUBLISHED
- **Published Date**: January 08, 2020 at 17:32 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPGurukul Hostel Management System v2.0 allows SQL injection via the id parameter in the full-profile.php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47854](https://www.exploit-db.com/exploits/47854) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4552
- **State**: PUBLISHED
- **Published Date**: December 20, 2016 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.2.0 allows remote attackers to inject arbitrary web script or HTML via the href attribute in an area tag in an e-mail message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/roundcube/roundcubemail/issues/5240)
2. [](https://github.com/roundcube/roundcubemail/wiki/Changelog#release-120)
3. [openSUSE-SU-2016:3309](http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00101.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14013
- **State**: PUBLISHED
- **Published Date**: January 21, 2020 at 06:30 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
While parsing invalid super index table, elements within super index table may exceed total chunk size and invalid data is read into the table in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, Nicobar, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, Nicobar, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23258
- **State**: PUBLISHED
- **Published Date**: December 02, 2021 at 15:40 UTC
- **Last Updated**: September 16, 2024 at 22:02 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: crafter
### Vulnerability Description
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-913: Security Weakness
### Affected Products
**Crafter Software - Crafter CMS**
Affected versions:
- 3.1 (Status: affected)
### References
1. [](https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101)
### Credits
- Kai Zhao (ToTU Security Team) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56733
- **State**: PUBLISHED
- **Published Date**: December 30, 2024 at 16:46 UTC
- **Last Updated**: December 30, 2024 at 17:33 UTC
- **Reserved Date**: December 27, 2024 at 15:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Password Pusher is an open source application to communicate sensitive information over the web. A vulnerability has been reported in versions 1.50.3 and prior where an attacker can copy the session cookie before a user logs out, potentially allowing session hijacking. Although the session token is replaced and invalidated upon logout, if an attacker manages to capture the session cookie before this process, they can use the token to gain unauthorized access to the user's session until the token expires or is manually cleared. This vulnerability hinges on the attacker's ability to access the session cookie during an active session, either through a man-in-the-middle attack, by exploiting another vulnerability like XSS, or via direct access to the victim's device. Although there is no direct resolution to this vulnerability, it is recommended to always use the latest version of Password Pusher to best mitigate risk. If self-hosting, ensure Password Pusher is hosted exclusively over SSL connections to encrypt traffic and prevent session cookies from being intercepted in transit. Additionally, implement best practices in local security to safeguard user systems, browsers, and data against unauthorized access.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-384: Security Weakness
### Affected Products
**pglombardo - PasswordPusher**
Affected versions:
- <= 1.50.3 (Status: affected)
### References
1. [https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-4fwj-m62q-pp47](https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-4fwj-m62q-pp47) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.