System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-125031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-125031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-125031
- **State**: PUBLISHED
- **Published Date**: January 02, 2023 at 07:50 UTC
- **Last Updated**: August 06, 2024 at 14:10 UTC
- **Reserved Date**: January 02, 2023 at 07:40 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in kirill2485 TekNet. It has been classified as problematic. Affected is an unknown function of the file pages/loggedin.php. The manipulation of the argument statusentery leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 1c575340539f983333aa43fc58ecd76eb53e1816. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217176.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**kirill2485 - TekNet**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.217176)
2. [](https://vuldb.com/?ctiid.217176)
3. [](https://github.com/kirill2485/TekNet/commit/1c575340539f983333aa43fc58ecd76eb53e1816)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2469
- **State**: PUBLISHED
- **Published Date**: June 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The Qualcomm sound driver in Android before 2016-06-01 on Nexus 5, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 27531992.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036763](http://www.securitytracker.com/id/1036763)
2. [91046](http://www.securityfocus.com/bid/91046)
3. [](http://source.android.com/security/bulletin/2016-06-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3557
- **State**: PUBLISHED
- **Published Date**: November 23, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: October 05, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20091120 Re: CVE request: php 5.3.1 update](http://www.openwall.com/lists/oss-security/2009/11/20/3)
2. [](http://www.php.net/releases/5_2_12.php)
3. [40262](http://secunia.com/advisories/40262)
4. [6601](http://securityreason.com/securityalert/6601)
5. [[php-announce] 20091119 5.3.1 Release announcement](http://news.php.net/php.announce/79)
6. [HPSBUX02543](http://marc.info/?l=bugtraq&m=127680701405735&w=2)
7. [MDVSA-2009:285](http://www.mandriva.com/security/advisories?name=MDVSA-2009:285)
8. [37821](http://secunia.com/advisories/37821)
9. [APPLE-SA-2010-03-29-1](http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html)
10. [](http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log)
11. [](http://www.php.net/ChangeLog-5.php)
12. [](http://support.apple.com/kb/HT4077)
13. [[oss-security] 20091120 CVE request: php 5.3.1 update](http://www.openwall.com/lists/oss-security/2009/11/20/2)
14. [](http://www.php.net/releases/5_3_1.php)
15. [ADV-2009-3593](http://www.vupen.com/english/advisories/2009/3593)
16. [[oss-security] 20091120 Re: CVE request: php 5.3.1 update](http://www.openwall.com/lists/oss-security/2009/11/20/5)
17. [37412](http://secunia.com/advisories/37412)
18. [MDVSA-2009:302](http://www.mandriva.com/security/advisories?name=MDVSA-2009:302)
19. [oval:org.mitre.oval:def:7396](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7396)
20. [SSRT100152](http://marc.info/?l=bugtraq&m=127680701405735&w=2)
21. [](http://svn.php.net/viewvc?view=revision&revision=288945)
22. [MDVSA-2009:303](http://www.mandriva.com/security/advisories?name=MDVSA-2009:303)
23. [](http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/file.c?view=log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7391
- **State**: PUBLISHED
- **Published Date**: November 08, 2016 at 20:37 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x100010b where a missing array bounds check can allow a user to write to kernel memory, leading to denial of service or potential escalation of privileges.
### Affected Products
**n/a - Quadro, NVS, and GeForce (all versions)**
Affected versions:
- Quadro, NVS, and GeForce (all versions) (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/solutions/LEN-10822)
2. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4247)
3. [93987](http://www.securityfocus.com/bid/93987)
4. [40661](https://www.exploit-db.com/exploits/40661/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15646
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: August 21, 2018 at 00:00 UTC
- **Assigned By**: odoo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18459
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 16:31 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 62.0.17 allows arbitrary code execution during account modification (SEC-220).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/62+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8031
- **State**: PUBLISHED
- **Published Date**: July 18, 2022 at 20:29 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 30, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hudson (aka org.jvnet.hudson.main:hudson-core) before 3.3.2 allows XXE attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.eclipse.org/Hudson-ci/alerts/CVE-2015-8031)
2. [](https://security.snyk.io/vuln/SNYK-JAVA-ORGJVNETHUDSONMAIN-31221)
3. [](https://github.com/advisories/GHSA-j3h2-8mf8-j5r2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4292
- **State**: PUBLISHED
- **Published Date**: December 10, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: December 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [seil-url-bo(54051)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54051)
2. [JVN#06362164](http://jvn.jp/en/jp/JVN06362164/index.html)
3. [ADV-2009-3111](http://www.vupen.com/english/advisories/2009/3111)
4. [JVNDB-2009-000069](http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html)
5. [](http://www.seil.jp/seilseries/security/2009/a00669.php)
6. [59362](http://osvdb.org/59362)
7. [37154](http://secunia.com/advisories/37154) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41188
- **State**: PUBLISHED
- **Published Date**: October 26, 2021 at 15:00 UTC
- **Last Updated**: August 04, 2024 at 03:08 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Shopware is open source e-commerce software. Versions prior to 5.7.6 contain a cross-site scripting vulnerability. This issue is patched in version 5.7.6. Two workarounds are available. Using the security plugin or adding a particular following config to the `.htaccess` file will protect against cross-site scripting in this case. There is also a config for those using nginx as a server. The plugin and the configs can be found on the GitHub Security Advisory page for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**shopware - shopware**
Affected versions:
- < 5.7.6 (Status: affected)
### References
1. [](https://github.com/shopware/shopware/security/advisories/GHSA-4p3x-8qw9-24w9)
2. [](https://github.com/shopware/shopware/commit/37213e91d525c95df262712cba80d1497e395a58)
3. [](https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021)
4. [](https://github.com/shopware/shopware/releases/tag/v5.7.6)
5. [](https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32357
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 00:00 UTC
- **Last Updated**: December 05, 2024 at 16:49 UTC
- **Reserved Date**: May 08, 2023 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An authorization issue was addressed with improved state management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to retain access to system configuration files even after its permission is revoked.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213758)
2. [](https://support.apple.com/en-us/HT213759)
3. [](https://support.apple.com/en-us/HT213764)
4. [](https://support.apple.com/en-us/HT213760)
5. [](https://support.apple.com/en-us/HT213757)
6. [](https://support.apple.com/en-us/HT213761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2907
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 26, 2024 at 12:41 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The AGCA WordPress plugin before 7.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - AGCA **
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/)
### Credits
- Dikshita Trivedi (Cybersecdexter)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6825
- **State**: PUBLISHED
- **Published Date**: June 10, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 19, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by creating a large number of processes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140602 CVE-2013-6825 DCMTK Root Privilege escalation](http://www.securityfocus.com/archive/1/532261/100/0/threaded)
2. [](http://packetstormsecurity.com/files/126883/DCMTK-Privilege-Escalation.html)
3. [58916](http://secunia.com/advisories/58916)
4. [](http://git.dcmtk.org/web?p=dcmtk.git%3Ba=blob%3Bf=CHANGES.361)
5. [67784](http://www.securityfocus.com/bid/67784)
6. [20140604 CVE-2013-6825 DCMTK Root Privilege escalation](http://seclists.org/fulldisclosure/2014/Jun/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39340
- **State**: PUBLISHED
- **Published Date**: November 01, 2021 at 21:01 UTC
- **Last Updated**: March 31, 2025 at 17:45 UTC
- **Reserved Date**: August 20, 2021 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Notification WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/src/classes/Utils/Settings.php file which made it possible for attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 7.2.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Notification – Custom Notifications and Alerts for WordPress - Notification – Custom Notifications and Alerts for WordPress**
Affected versions:
- 7.2.4 (Status: affected)
### References
1. [](https://github.com/BigTiger2020/word-press/blob/main/Notification.md)
2. [](https://wordfence.com/vulnerability-advisories/#CVE-2021-39340)
3. [](https://plugins.trac.wordpress.org/browser/notification/tags/7.2.4/src/classes/Utils/Settings.php#L167)
### Credits
- Thinkland Security Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5534
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: January 19, 2017 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The tibbr user profiles components of tibbr Community, and tibbr Enterprise expose a weakness in an improperly sandboxed third-party component. Affected releases are TIBCO Software Inc. tibbr Community 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0, tibbr Enterprise 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0.
### Affected Products
**TIBCO Software Inc. - tibbr Community**
Affected versions:
- 5.2.1 and below (Status: affected)
- 6.0.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0.0 (Status: affected)
**TIBCO Software Inc. - tibbr Enterprise**
Affected versions:
- 5.2.1 and below (Status: affected)
- 6.0.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0.0 (Status: affected)
### References
1. [](https://www.tibco.com/support/advisories/2017/12/tibco-security-advisory-december-12-2017-tibbr-2017-5534) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1416
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka 'Visual Studio and Visual Studio Code Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Microsoft Visual Studio 2019 version 16.6 (includes 16.0 - 16.5)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Visual Studio Code**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Visual Studio 2019**
Affected versions:
- 16.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Azure Storage Explorer**
Affected versions:
- unspecified (Status: affected)
**Microsoft - TypeScript**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1416) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12183
- **State**: PUBLISHED
- **Published Date**: March 27, 2019 at 19:17 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 11, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Stack overflow in DxeCore for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
### Affected Products
**Extensible Firmware Interface Development Kit (EDK II) - Extensible Firmware Interface Development Kit (EDK II)**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html)
2. [107643](http://www.securityfocus.com/bid/107643)
3. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us)
4. [FEDORA-2019-d47a9d4b8b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0454
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:22 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Mobile Application Servlet component in Oracle E-Business Suite 12.1 and 12.2 allows local users to affect confidentiality via vectors related to MWA Server Manager.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034726](http://www.securitytracker.com/id/1034726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0059
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: January 31, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in the chk_trans.c of the libkrb5 library for MIT Kerberos V5 before 1.2.5 allows users from one realm to impersonate users in other realms that have the same inter-realm keys.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2003:052](http://www.redhat.com/support/errata/RHSA-2003-052.html)
2. [](http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt)
3. [CLSA-2003:639](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000639)
4. [RHSA-2003:051](http://www.redhat.com/support/errata/RHSA-2003-051.html)
5. [MDKSA-2003:043](http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:043)
6. [6714](http://www.securityfocus.com/bid/6714)
7. [kerberos-kdc-user-spoofing(11188)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11188)
8. [VU#684563](http://www.kb.cert.org/vuls/id/684563)
9. [RHSA-2003:168](http://www.redhat.com/support/errata/RHSA-2003-168.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10115
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 14:46 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Insecure Permissions issue (issue 2 of 3) was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. The GitLab Releases feature could allow guest users access to private information like release details and code information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/blog/categories/releases/)
2. [](https://about.gitlab.com/2019/04/01/security-release-gitlab-11-dot-9-dot-4-released/)
3. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/56402) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16969
- **State**: PUBLISHED
- **Published Date**: September 26, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Citrix ShareFile StorageZones Controller before 5.4.2 has Information Exposure Through an Error Message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [105377](http://www.securityfocus.com/bid/105377)
2. [](https://support.citrix.com/article/CTX238022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10086
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 16:40 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GitLab 10.4 through 12.8.1 allows Directory Traversal. A particular endpoint was vulnerable to a directory traversal vulnerability, leading to arbitrary file read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/)
2. [](https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51679
- **State**: PUBLISHED
- **Published Date**: June 12, 2024 at 08:47 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 21, 2023 at 14:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in BulkGate BulkGate SMS Plugin for WooCommerce.This issue affects BulkGate SMS Plugin for WooCommerce: from n/a through 3.0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**BulkGate - BulkGate SMS Plugin for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woosms-sms-module-for-woocommerce/wordpress-bulkgate-sms-plugin-for-woocommerce-plugin-3-0-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6204
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 20:16 UTC
- **Reserved Date**: January 11, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, Safari 12.1. Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT209599)
2. [](https://support.apple.com/HT209603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3615
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 02:34 UTC
- **Last Updated**: August 01, 2024 at 20:19 UTC
- **Reserved Date**: April 10, 2024 at 17:53 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Media Library Folders plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 8.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**maxfoundry - Media Library Folders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5f550bac-b047-4276-bde5-c15bfd4ceb49?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072498%40media-library-plus&new=3072498%40media-library-plus&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2657
- **State**: PUBLISHED
- **Published Date**: August 31, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in the SQLDriverConnect function in unixODBC 2.0.10, 2.3.1, and earlier allows local users to cause a denial of service (crash) via a long string in the FILEDSN option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [82460](http://www.osvdb.org/82460)
2. [unixodbc-sdc-bo(75940)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75940)
3. [[oss-security] 20120605 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/06/06/3)
4. [[oss-security] 20120530 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/30/7)
5. [[oss-security] 20120531 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/31/2)
6. [53712](http://www.securityfocus.com/bid/53712)
7. [[oss-security] 20120529 Re: CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/29/10)
8. [[oss-security] 20120529 CVE id request: Multiple buffer overflow in unixODBC](http://www.openwall.com/lists/oss-security/2012/05/29/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20508
- **State**: PUBLISHED
- **Published Date**: December 27, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 19:35 UTC
- **Reserved Date**: December 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CrashFix 1.0.4 has SQL Injection via the User[status] parameter. This is related to actionIndex in UserController.php, and the protected\models\User.php search() function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/crashfix/tickets/21/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4239
- **State**: PUBLISHED
- **Published Date**: June 14, 2019 at 14:45 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MQ Advanced Cloud Pak (IBM Cloud Private 1.0.0 through 3.0.1) stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 159465.
### Affected Products
**IBM - MQ Advanced Cloud Pak (IBM Cloud Private)**
Affected versions:
- 1.0.0 (Status: affected)
- 1.1.0 (Status: affected)
- 1.2.0 (Status: affected)
- 1.3.0 (Status: affected)
- 2.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.2.0 (Status: affected)
- 2.2.1 (Status: affected)
- 2.2.2 (Status: affected)
- 2.2.3 (Status: affected)
- 3.0.0 (Status: affected)
- 3.0.1 (Status: affected)
**IBM - MQ Advanced Cloud Pak (IBM Cloud Private on RedHat OpenShift)**
Affected versions:
- 1.0.0 (Status: affected)
- 1.1.0 (Status: affected)
- 1.2.0 (Status: affected)
- 1.3.0 (Status: affected)
- 2.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.2.0 (Status: affected)
- 2.2.1 (Status: affected)
- 2.2.2 (Status: affected)
- 2.2.3 (Status: affected)
- 3.0.0 (Status: affected)
- 3.0.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10886591)
2. [ibm-mq-cve20194239-info-disc (159465)](https://exchange.xforce.ibmcloud.com/vulnerabilities/159465) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5307
- **State**: PUBLISHED
- **Published Date**: October 17, 2006 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 19:48 UTC
- **Reserved Date**: October 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in AFGB GUESTBOOK 2.2 allow remote attackers to execute arbitrary PHP code via a URL in the Htmls parameter in (1) add.php, (2) admin.php, (3) look.php, or (4) re.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20503](http://www.securityfocus.com/bid/20503)
2. [29726](http://www.osvdb.org/29726)
3. [2529](https://www.exploit-db.com/exploits/2529)
4. [afgbguestbook-htmls-file-include(29511)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29511)
5. [29728](http://www.osvdb.org/29728)
6. [22363](http://secunia.com/advisories/22363)
7. [29727](http://www.osvdb.org/29727)
8. [29725](http://www.osvdb.org/29725)
9. [ADV-2006-4047](http://www.vupen.com/english/advisories/2006/4047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1628
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 16:04 UTC
- **Last Updated**: August 01, 2024 at 18:48 UTC
- **Reserved Date**: February 19, 2024 at 15:23 UTC
- **Assigned By**: GEHC
### Vulnerability Description
OS command injection vulnerabilities in GE HealthCare ultrasound devices
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**GE HealthCare - Venue**
Affected versions:
- R1 (Status: affected)
- R2 (Status: affected)
- R3 (Status: affected)
- R4 (Status: affected)
**GE HealthCare - Venue Go**
Affected versions:
- R2 (Status: affected)
- R3 (Status: affected)
- R4 (Status: affected)
**GE HealthCare - Venue Fit**
Affected versions:
- R3 (Status: affected)
- R4 (Status: affected)
**GE HealthCare - LOGIQ e**
Affected versions:
- R7 (Status: affected)
- R8 (Status: affected)
- R9 (Status: affected)
**GE HealthCare - LOGIQ He**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - Vivid E**
Affected versions:
- E95 (Status: affected)
- E90 (Status: affected)
- E80 (Status: affected)
**GE HealthCare - Vivid S**
Affected versions:
- 70N (Status: affected)
- 60N (Status: affected)
**GE HealthCare - Vivid T**
Affected versions:
- T8 (Status: affected)
- T9 (Status: affected)
**GE HealthCare - Vivid iq**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - Voluson Expert 16**
Affected versions:
- 0 (Status: affected)
- BT24 (Status: affected)
**GE HealthCare - Voluson Expert 18**
Affected versions:
- 0 (Status: affected)
- BT24 (Status: affected)
**GE HealthCare - Voluson Expert 22**
Affected versions:
- 0 (Status: affected)
- BT24 (Status: affected)
**GE HealthCare - Voluson SWIFT**
Affected versions:
- 0 (Status: affected)
- BT24 (Status: affected)
**GE HealthCare - Invenia ABUS 2.0**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - LOGIQ E10**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - LOGIQ E10s**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - LOGIQ Fortis**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://securityupdate.gehealthcare.com/)
### Credits
- Andrea Palanca and Gabriele Quagliarella of Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1359
- **State**: REJECTED
- **Last Updated**: May 06, 2025 at 12:38 UTC
- **Reserved Date**: December 11, 2017 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0267
- **State**: PUBLISHED
- **Published Date**: January 17, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users to cause a denial of service (kernel panic) and possibly corrupt other filesystems by mounting a crafted UNIX File System (UFS) DMG image that contains a corrupted directory entry (struct direct), related to the ufs_dirbad function. NOTE: a third party states that the FreeBSD issue does not cross privilege boundaries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0171](http://www.vupen.com/english/advisories/2007/0171)
2. [22036](http://www.securityfocus.com/bid/22036)
3. [TA07-072A](http://www.us-cert.gov/cas/techalerts/TA07-072A.html)
4. [[freebsd-security] 20070114 MOAB advisories](http://lists.freebsd.org/pipermail/freebsd-security/2007-January/004218.html)
5. [APPLE-SA-2007-03-13](http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html)
6. [](http://docs.info.apple.com/article.html?artnum=305214)
7. [1017751](http://www.securitytracker.com/id?1017751)
8. [](http://projects.info-pull.com/moab/MOAB-12-01-2007.html)
9. [32686](http://www.osvdb.org/32686)
10. [ADV-2007-0930](http://www.vupen.com/english/advisories/2007/0930)
11. [23721](http://secunia.com/advisories/23721)
12. [24479](http://secunia.com/advisories/24479) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5192
- **State**: PUBLISHED
- **Published Date**: January 28, 2014 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: September 27, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in gmap/view_overlay.php in Bitweaver 2.8.1 and earlier allows remote attackers to read arbitrary files via "''%2F" (dot dot encoded slash) sequences in the overlay_type parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/spiderlabs/advisories/TWSL2012-016.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12128
- **State**: PUBLISHED
- **Published Date**: March 19, 2020 at 13:42 UTC
- **Last Updated**: August 04, 2024 at 23:10 UTC
- **Reserved Date**: May 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ONAP SO through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jira.onap.org/browse/OJSI-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25363
- **State**: PUBLISHED
- **Published Date**: April 09, 2021 at 17:36 UTC
- **Last Updated**: August 03, 2024 at 20:03 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
An improper access control in ActivityManagerService prior to SMR APR-2021 Release 1 allows untrusted applications to access running processesdelete some local files.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- O(8.x), P(9.0), Q(10.0), R(11.0) (Status: affected)
### References
1. [](https://security.samsungmobile.com/)
2. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50608
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 00:00 UTC
- **Last Updated**: February 19, 2025 at 15:00 UTC
- **Reserved Date**: October 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_metrics_ng() at prom_rw_prot.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://fluentbit.io/announcements/)
2. [](https://github.com/fluent/fluent-bit/releases)
3. [](https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14954
- **State**: PUBLISHED
- **Published Date**: August 05, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 09:46 UTC
- **Reserved Date**: August 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/squirrelmail/bugs/2831/)
2. [](http://www.openwall.com/lists/oss-security/2018/07/26/2)
3. [](https://bugs.debian.org/905023)
4. [FEDORA-2019-ad02f64a79](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVXTYMZ35IC5KPNMAE6BWAQWURMX7KZO/)
5. [FEDORA-2019-1a87523729](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5FP5O562A4FM5TCFNEW73SS6PZONSAC/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37404
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 14:39 UTC
- **Last Updated**: February 20, 2025 at 20:07 UTC
- **Reserved Date**: August 09, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Christian Salazar's add2fav plugin <= 1.0 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Christian Salazar - add2fav (WordPress plugin)**
Affected versions:
- <= 1.0 (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/add2fav/wordpress-add2fav-plugin-1-0-authenticated-stored-cross-site-scripting-xss-vulnerability/_s_id=cve)
2. [](https://wordpress.org/plugins/add2fav/)
### Credits
- Vulnerability discovered by ptsfence (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57964
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 06:33 UTC
- **Last Updated**: February 18, 2025 at 15:50 UTC
- **Reserved Date**: January 29, 2025 at 07:37 UTC
- **Assigned By**: Hitachi
### Vulnerability Description
Insecure Loading of Dynamic Link Libraries have been discovered in HVAC Energy Saving Program, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.
This issue affects HVAC Energy Saving Program:.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Hitachi - HVAC Energy Saving Program**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.hitachi.com/hirt/hitachi-sec/2025/001.html)
### Credits
- Sahil Shah
- Shaurya |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36314
- **State**: PUBLISHED
- **Published Date**: August 10, 2023 at 00:00 UTC
- **Last Updated**: October 09, 2024 at 20:15 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a Cross Site Scripting (XSS) vulnerability in the value-text-o_sms_email_request_message parameters of index.php in PHPJabbers Callback Widget v1.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpjabbers.com/callback-widget)
2. [](https://medium.com/%40milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24473
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 19:01 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) Server Boards, Server Systems and Compute Modules**
Affected versions:
- before version 2.48.ce3e3bd2 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13638
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for Bitpark, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Bitpark)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1577
- **State**: PUBLISHED
- **Published Date**: September 27, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 23:56 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 132117.
### Affected Products
**IBM - WebSphere Portal**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/132117)
2. [101017](http://www.securityfocus.com/bid/101017)
3. [1039405](http://www.securitytracker.com/id/1039405)
4. [](http://www.ibm.com/support/docview.wss?uid=swg22008586) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5455
- **State**: REJECTED
- **Published Date**: January 25, 2021 at 17:53 UTC
- **Last Updated**: January 25, 2021 at 17:53 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0449
- **State**: PUBLISHED
- **Published Date**: January 24, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in paypalresult.asp in VP-ASP Shopping Cart 6.50 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vpasp-paypalresult-sql-injection(39811)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39811)
2. [27347](http://www.securityfocus.com/bid/27347) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4417
- **State**: PUBLISHED
- **Published Date**: May 01, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 30, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Off-by-one error in epan/dissectors/packet-gsm_abis_oml.c in the GSM A-bis OML dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers a 0xff tag value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2016:0661](http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html)
2. [](https://www.wireshark.org/security/wnpa-sec-2016-14.html)
3. [openSUSE-SU-2016:0660](http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html)
4. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825)
5. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0535
- **State**: PUBLISHED
- **Published Date**: June 22, 2021 at 11:01 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In wpas_ctrl_msg_queue_timeout of ctrl_iface_unix.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168314741
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35358
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 15:57 UTC
- **Last Updated**: February 13, 2025 at 15:58 UTC
- **Reserved Date**: May 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /classes/Master.php?f=view_category. Manipulating the argument id can result in SQL injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuln.pentester.stream/pentester-vulnerability-research/post/2298731/vuln14-blind-sql-injection-time-based) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40633
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 10:22 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5.1.4 allows remote attackers trigger an out of memory exception or denial of service via a gif format file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/giflib/bugs/157/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3824
- **State**: PUBLISHED
- **Published Date**: April 20, 2025 at 11:00 UTC
- **Last Updated**: April 21, 2025 at 13:13 UTC
- **Reserved Date**: April 19, 2025 at 14:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected by this vulnerability is an unknown functionality of the file add-product.php. The manipulation of the argument txtprice/txtproduct_name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**SourceCodester - Web-based Pharmacy Product Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-305731 | SourceCodester Web-based Pharmacy Product Management System add-product.php cross site scripting](https://vuldb.com/?id.305731)
2. [VDB-305731 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.305731)
3. [](https://github.com/yaklang/IRifyScanResult/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/xss_from_input_with_post.md)
4. [](https://www.sourcecodester.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6944
- **State**: PUBLISHED
- **Published Date**: July 21, 2024 at 07:31 UTC
- **Last Updated**: August 01, 2024 at 21:45 UTC
- **Reserved Date**: July 20, 2024 at 09:59 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in ZhongBangKeJi CRMEB up to 5.4.0 and classified as critical. Affected by this issue is the function get_image_base64 of the file PublicController.php. The manipulation of the argument file leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-272066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**ZhongBangKeJi - CRMEB**
Affected versions:
- 5.0 (Status: affected)
- 5.1 (Status: affected)
- 5.2 (Status: affected)
- 5.3 (Status: affected)
- 5.4 (Status: affected)
### References
1. [VDB-272066 | ZhongBangKeJi CRMEB PublicController.php get_image_base64 deserialization](https://vuldb.com/?id.272066)
2. [VDB-272066 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.272066)
3. [Submit #374413 | Xi'an Zhongbang Network Technology Co. CRMEB open source mall system <=5.4.0 Arbitrary file reading](https://vuldb.com/?submit.374413)
4. [](https://gist.github.com/J1rrY-learn/93a0cf71894570f4eb39344161beb44c)
### Credits
- J1rrY (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2866
- **State**: PUBLISHED
- **Published Date**: June 19, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The Flash plug-in in Google Chrome before 27.0.1453.116, as used on Google Chrome OS before 27.0.1453.116 and separately, does not properly determine whether a user wishes to permit camera or microphone access by a Flash application, which allows remote attackers to obtain sensitive information from a machine's physical environment via a clickjacking attack, as demonstrated by an attack using a crafted Cascading Style Sheets (CSS) opacity property.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2013/06/stable-channel-update_18.html)
2. [](http://habrahabr.ru/post/182706/)
3. [](https://code.google.com/p/chromium/issues/detail?id=249335)
4. [](http://googlechromereleases.blogspot.com/2013/06/stable-channel-update-for-chrome-os.html)
5. [](https://src.chromium.org/viewvc/chrome?revision=206188&view=revision)
6. [oval:org.mitre.oval:def:16693](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16693) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2474
- **State**: PUBLISHED
- **Published Date**: September 29, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: May 28, 2008 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 allows remote attackers to execute arbitrary code via a crafted packet using the (1) IEC60870-5-101 or (2) IEC60870-5-104 communication protocol to the X87 web interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080925 C4 Security Advisory - ABB PCU400 4.4-4.6 Remote Buffer Overflow](http://www.securityfocus.com/archive/1/496739/100/0/threaded)
2. [4320](http://securityreason.com/securityalert/4320)
3. [](http://www.kb.cert.org/vuls/id/CTAR-7JTNRX)
4. [31391](http://www.securityfocus.com/bid/31391)
5. [32047](http://secunia.com/advisories/32047)
6. [VU#343971](http://www.kb.cert.org/vuls/id/343971) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12812
- **State**: PUBLISHED
- **Published Date**: July 24, 2020 at 22:28 UTC
- **Last Updated**: February 04, 2025 at 19:26 UTC
- **Reserved Date**: May 12, 2020 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.
### Affected Products
**n/a - Fortinet FortiOS**
Affected versions:
- FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-19-283) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7468
- **State**: PUBLISHED
- **Published Date**: March 26, 2021 at 20:27 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
In FreeBSD 12.2-STABLE before r365772, 11.4-STABLE before r365773, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges.
### Affected Products
**n/a - FreeBSD**
Affected versions:
- FreeBSD 12.1-RELEASE before p10, 11.4-RELEASE before p4, 11.3-RELEASE before p14 (Status: affected)
### References
1. [](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:30.ftpd.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1819
- **State**: PUBLISHED
- **Published Date**: March 02, 2025 at 16:31 UTC
- **Last Updated**: March 03, 2025 at 20:10 UTC
- **Reserved Date**: March 01, 2025 at 14:32 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Tenda AC7 1200M 15.03.06.44. Affected is the function TendaTelnet of the file /goform/telnet. The manipulation of the argument lan_ip leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
- CWE-77: Security Weakness
### Affected Products
**Tenda - AC7 1200M**
Affected versions:
- 15.03.06.44 (Status: affected)
### References
1. [VDB-298092 | Tenda AC7 1200M telnet TendaTelnet os command injection](https://vuldb.com/?id.298092)
2. [VDB-298092 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298092)
3. [Submit #504429 | Tenda AC7 1200M large household 11ac dual-band wireless router V15.03.06.44 Command injection](https://vuldb.com/?submit.504429)
4. [](https://github.com/Raining-101/IOT_cve/blob/main/Tenda%20a7%20V15.03.06.44%20Command%20injection.md)
5. [](https://www.tenda.com.cn/)
### Credits
- Raining101 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37365
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 14:52 UTC
- **Last Updated**: November 12, 2024 at 19:04 UTC
- **Reserved Date**: June 06, 2024 at 20:18 UTC
- **Assigned By**: Rockwell
### Vulnerability Description
A remote code execution vulnerability exists in the affected
product. The vulnerability allows users to save projects within the public
directory allowing anyone with local access to modify and/or delete files. Additionally,
a malicious user could potentially leverage this vulnerability to escalate
their privileges by changing the macro to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Rockwell Automation - FactoryTalk View Machine Edition**
Affected versions:
- >=V14 (Status: affected)
### References
1. [](https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1709.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12981
- **State**: PUBLISHED
- **Published Date**: June 26, 2019 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: June 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libming/libming/commit/6e76e8c71cb51c8ba0aa9737a636b9ac3029887f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9112
- **State**: PUBLISHED
- **Published Date**: December 02, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 26, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62145](http://secunia.com/advisories/62145)
2. [60167](http://secunia.com/advisories/60167)
3. [linux-kernel-lesspipe-code-exec(98918)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98918)
4. [71248](http://www.securityfocus.com/bid/71248)
5. [20141123 on Linux, 'less' can probably get you owned](http://seclists.org/fulldisclosure/2014/Nov/74)
6. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html)
7. [](https://savannah.gnu.org/bugs/?43709)
8. [[oss-security] 20141125 CVE request: cpio heap-based buffer overflow [was Re: so, can we do something about lesspipe? (+ a cpio bug to back up the argument)]](http://www.openwall.com/lists/oss-security/2014/11/25/2)
9. [[oss-security] 20141126 CVE request: cpio heap-based buffer overflow [was Re: so, can we do something about lesspipe? (+ a cpio bug to back up the argument)]](http://www.openwall.com/lists/oss-security/2014/11/26/20)
10. [USN-2456-1](http://www.ubuntu.com/usn/USN-2456-1)
11. [[oss-security] 20141123 so, can we do something about lesspipe? (+ a cpio bug to back up the argument)](http://www.openwall.com/lists/oss-security/2014/11/23/2)
12. [DSA-3111](http://www.debian.org/security/2014/dsa-3111) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55959
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 00:00 UTC
- **Last Updated**: March 18, 2025 at 14:16 UTC
- **Reserved Date**: December 13, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Northern.tech Mender Client 4.x before 4.0.5 has Insecure Permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://Northern.tech)
2. [](https://mender.io/blog/cve-2024-55959) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34329
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 17:11 UTC
- **Last Updated**: February 13, 2025 at 16:55 UTC
- **Reserved Date**: June 01, 2023 at 16:05 UTC
- **Assigned By**: AMI
### Vulnerability Description
AMI MegaRAC SPx12 contains a vulnerability in BMC where a User may cause an authentication bypass by spoofing the HTTP header. A successful exploit of this vulnerability may lead to loss of confidentiality, integrity, and availability.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
- CWE-290: Security Weakness
### Affected Products
**AMI - MegaRAC_SPx12**
Affected versions:
- 12.0 (Status: affected)
### References
1. [](https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf)
2. [](https://security.netapp.com/advisory/ntap-20230814-0004/)
### Credits
- Vlad Babkin from Eclypsium Research |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49619
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 08:25 UTC
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: November 28, 2023 at 06:34 UTC
- **Assigned By**: apache
### Vulnerability Description
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.2.0.
Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the script can increase the number of collection of the question many times.
Users are recommended to upgrade to version [1.2.1], which fixes the issue.
### Weakness Classification (CWE)
- CWE-362: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Answer**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/nscrl3c7pn68q4j73y3ottql6n5x3hd4)
2. [](http://www.openwall.com/lists/oss-security/2024/01/10/1)
### Credits
- ek1ng |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1749
- **State**: PUBLISHED
- **Published Date**: April 18, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 23:05 UTC
- **Reserved Date**: February 15, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in edit.php in PHP Address Book 8.2.5 allows user-assisted remote attackers to inject arbitrary web script or HTML via the Address field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130417 Multiple vulnerabilities in PHP Address Book v8.2.5](http://openwall.com/lists/oss-security/2013/04/17/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1344
- **State**: PUBLISHED
- **Published Date**: March 22, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in VeriSign haydn.exe, as used in Managed PKI (MPKI) 6.0, allows remote attackers to inject arbitrary web script or HTML via a javascript URI in the VHTML_FILE parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17170](http://www.securityfocus.com/bid/17170)
2. [](http://www.coresecurity.com/common/showdoc.php?idx=522&idxseccion=10)
3. [ADV-2006-1084](http://www.vupen.com/english/advisories/2006/1084)
4. [verisign-haydn-xss(25349)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25349)
5. [614](http://securityreason.com/securityalert/614)
6. [20060320 CORE-2006-0124: Cross-Site Scripting in Verisign?s haydn.exe CGI script](http://www.securityfocus.com/archive/1/428267/100/0/threaded)
7. [1015813](http://securitytracker.com/id?1015813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13693
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 14:22 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://crbug.com/1005753)
2. [](https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4629
- **State**: PUBLISHED
- **Published Date**: September 12, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 24, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The Cisco ASA-CX Context-Aware Security module before 9.0.2-103 for Adaptive Security Appliances (ASA) devices, and Prime Security Manager (aka PRSM) before 9.0.2-103, allows remote attackers to cause a denial of service (disk consumption and application hang) via unspecified IPv4 packets that trigger log entries, aka Bug ID CSCub70603.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20120912 Cisco ASA-CX and Cisco PRSM Log Retention Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120912-asacx)
2. [55515](http://www.securityfocus.com/bid/55515) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4224
- **State**: PUBLISHED
- **Published Date**: August 08, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2007:0909](http://www.redhat.com/support/errata/RHSA-2007-0909.html)
2. [2982](http://securityreason.com/securityalert/2982)
3. [27271](http://secunia.com/advisories/27271)
4. [FEDORA-2007-716](https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html)
5. [FEDORA-2007-2361](https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html)
6. [20070806 Re: Konqueror: URL address bar spoofing vulnerabilities](http://www.securityfocus.com/archive/1/475731/100/0/threaded)
7. [RHSA-2007:0905](http://www.redhat.com/support/errata/RHSA-2007-0905.html)
8. [USN-502-1](http://www.ubuntu.com/usn/usn-502-1)
9. [20070806 Re: Konqueror: URL address bar spoofingvulnerabilities](http://www.securityfocus.com/archive/1/475730/100/0/threaded)
10. [konqueror-setinterval-spoofing(35828)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35828)
11. [ADV-2007-2807](http://www.vupen.com/english/advisories/2007/2807)
12. [27106](http://secunia.com/advisories/27106)
13. [27108](http://secunia.com/advisories/27108)
14. [26351](http://secunia.com/advisories/26351)
15. [25219](http://www.securityfocus.com/bid/25219)
16. [26690](http://secunia.com/advisories/26690)
17. [1018579](http://securitytracker.com/id?1018579)
18. [27090](http://secunia.com/advisories/27090)
19. [SUSE-SR:2007:021](http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html)
20. [27089](http://secunia.com/advisories/27089)
21. [26612](http://secunia.com/advisories/26612)
22. [27096](http://secunia.com/advisories/27096)
23. [26720](http://secunia.com/advisories/26720)
24. [](https://issues.rpath.com/browse/RPL-1615)
25. [MDKSA-2007:176](http://www.mandriva.com/security/advisories?name=MDKSA-2007:176)
26. [20070806 Konqueror: URL address bar spoofing vulnerabilities](http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html)
27. [](http://www.kde.org/info/security/advisory-20070816-1.txt)
28. [20070807 Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities](http://www.securityfocus.com/archive/1/475763/100/0/threaded)
29. [20070806 Konqueror: URL address bar spoofing vulnerabilities](http://www.securityfocus.com/archive/1/475689/100/0/threaded)
30. [oval:org.mitre.oval:def:9879](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8898
- **State**: PUBLISHED
- **Published Date**: March 15, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: June 02, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:1237](https://access.redhat.com/errata/RHSA-2016:1237)
2. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
3. [](https://github.com/ImageMagick/ImageMagick/pull/34)
4. [91039](http://www.securityfocus.com/bid/91039)
5. [](https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44)
6. [[oss-security] 20160602 Re: ImageMagick CVEs](http://www.openwall.com/lists/oss-security/2016/06/02/13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13700
- **State**: PUBLISHED
- **Published Date**: June 24, 2020 at 14:25 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress. It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/airesvsg/acf-to-rest-api)
2. [](https://wordpress.org/plugins/acf-to-rest-api/#developers)
3. [](https://gist.github.com/mariuszpoplwski/4fbaab7f271bea99c733e3f2a4bafbb5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10917
- **State**: PUBLISHED
- **Published Date**: August 15, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 07:54 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
pulp 2.16.x and possibly older is vulnerable to an improper path parsing. A malicious user or a malicious iso feed repository can write to locations accessible to the 'apache' user. This may lead to overwrite of published content on other iso repositories.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**[UNKNOWN] - pulp**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10917)
2. [RHSA-2019:1222](https://access.redhat.com/errata/RHSA-2019:1222) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5582
- **State**: REJECTED
- **Published Date**: December 23, 2019 at 20:41 UTC
- **Last Updated**: December 23, 2019 at 20:41 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21320
- **State**: PUBLISHED
- **Published Date**: March 02, 2021 at 02:45 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
matrix-react-sdk is an npm package which is a Matrix SDK for React Javascript. In matrix-react-sdk before version 3.15.0, the user content sandbox can be abused to trick users into opening unexpected documents. The content is opened with a `blob` origin that cannot access Matrix user data, so messages and secrets are not at risk. This has been fixed in version 3.15.0.
### CVSS Metrics
- **CVSS Base Score**: 2.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**matrix-org - matrix-react-sdk**
Affected versions:
- < 3.15.0 (Status: affected)
### References
1. [](https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-52mq-6jcv-j79x)
2. [](https://github.com/matrix-org/matrix-react-sdk/pull/5657)
3. [](https://github.com/matrix-org/matrix-react-sdk/commit/b386f0c73b95ecbb6ea7f8f79c6ff5171a8dedd1)
4. [](https://www.npmjs.com/package/matrix-react-sdk) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0193
- **State**: PUBLISHED
- **Published Date**: January 02, 2024 at 18:05 UTC
- **Last Updated**: November 24, 2024 at 11:55 UTC
- **Reserved Date**: January 02, 2024 at 10:58 UTC
- **Assigned By**: redhat
### Vulnerability Description
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Unknown - Unknown**
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-362.24.1.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-362.24.1.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions**
Affected versions:
- 0:5.14.0-70.105.1.el9_0 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions**
Affected versions:
- 0:5.14.0-70.105.1.rt21.177.el9_0 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:5.14.0-284.55.1.el9_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:5.14.0-284.55.1.rt14.340.el9_2 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-22 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-11 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v6.8.1-407 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-19 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v1.0.0-479 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-7 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v0.4.0-247 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-5 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v1.1.0-227 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.1-470 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v2.9.6-14 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-2 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-24 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v5.8.6-10 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v0.1.0-525 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v0.1.0-224 (Status: unaffected)
**Red Hat - RHOL-5.8-RHEL-9**
Affected versions:
- v0.28.1-56 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [RHSA-2024:1018](https://access.redhat.com/errata/RHSA-2024:1018)
2. [RHSA-2024:1019](https://access.redhat.com/errata/RHSA-2024:1019)
3. [RHSA-2024:1248](https://access.redhat.com/errata/RHSA-2024:1248)
4. [RHSA-2024:2094](https://access.redhat.com/errata/RHSA-2024:2094)
5. [RHSA-2024:4412](https://access.redhat.com/errata/RHSA-2024:4412)
6. [RHSA-2024:4415](https://access.redhat.com/errata/RHSA-2024:4415)
7. [](https://access.redhat.com/security/cve/CVE-2024-0193)
8. [RHBZ#2255653](https://bugzilla.redhat.com/show_bug.cgi?id=2255653) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14156
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:43 UTC
- **Last Updated**: December 20, 2021 at 22:43 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56676
- **State**: PUBLISHED
- **Published Date**: December 28, 2024 at 09:46 UTC
- **Last Updated**: May 04, 2025 at 10:01 UTC
- **Reserved Date**: December 27, 2024 at 15:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
thermal: testing: Initialize some variables annoteded with _free()
Variables annotated with __free() need to be initialized if the function
can return before they get updated for the first time or the attempt to
free the memory pointed to by them upon function return may crash the
kernel.
Fix this issue in some places in the thermal testing code.
### Affected Products
**Linux - Linux**
Affected versions:
- f6a034f2df426e279f1ecad53626bab80c04796a (Status: affected)
- f6a034f2df426e279f1ecad53626bab80c04796a (Status: affected)
**Linux - Linux**
Affected versions:
- 6.12 (Status: affected)
- 0 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/526c132124a62be486bad1701f7e8e92212ccec6)
2. [](https://git.kernel.org/stable/c/0104dcdaad3a7afd141e79a5fb817a92ada910ac) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6481
- **State**: PUBLISHED
- **Published Date**: December 12, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to cause a denial of service (stack overflow and application crash) by wrapping many layers of multipart/mixed content around a document, a different vulnerability than CVE-2006-5874 and CVE-2006-6406.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31283](http://osvdb.org/31283)
2. [21609](http://www.securityfocus.com/bid/21609)
3. [](http://kolab.org/security/kolab-vendor-notice-14.txt)
4. [23460](http://secunia.com/advisories/23460)
5. [23347](http://secunia.com/advisories/23347)
6. [23404](http://secunia.com/advisories/23404)
7. [ADV-2006-4948](http://www.vupen.com/english/advisories/2006/4948)
8. [ADV-2008-0924](http://www.vupen.com/english/advisories/2008/0924/references)
9. [DSA-1238](http://www.debian.org/security/2006/dsa-1238)
10. [23417](http://secunia.com/advisories/23417)
11. [GLSA-200612-18](http://security.gentoo.org/glsa/glsa-200612-18.xml)
12. [2006-0072](http://www.trustix.org/errata/2006/0072/)
13. [SUSE-SA:2006:078](http://www.novell.com/linux/security/advisories/2006_78_clamav.html)
14. [29420](http://secunia.com/advisories/29420)
15. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html)
16. [23379](http://secunia.com/advisories/23379)
17. [](http://docs.info.apple.com/article.html?artnum=307562)
18. [](http://www.quantenblog.net/security/virus-scanner-bypass)
19. [MDKSA-2006:230](http://www.mandriva.com/security/advisories?name=MDKSA-2006:230)
20. [ADV-2006-5113](http://www.vupen.com/english/advisories/2006/5113)
21. [23411](http://secunia.com/advisories/23411)
22. [23362](http://secunia.com/advisories/23362) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3774
- **State**: PUBLISHED
- **Published Date**: July 17, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Network Layer component in Oracle Database Server 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95263](http://osvdb.org/95263)
2. [1028789](http://www.securitytracker.com/id/1028789)
3. [61207](http://www.securityfocus.com/bid/61207)
4. [SUSE-SU-2013:1448](http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00000.html)
5. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
6. [oracle-cpujuly2013-cve20133774(85651)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85651)
7. [](http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html)
8. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
9. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
10. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2247, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2247
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 16:44 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possibility of double free issue while running multiple instances of smp2p test because of proper protection is missing while using global variable in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/04/01/april-2019-code-aurora-security-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7656
- **State**: PUBLISHED
- **Published Date**: August 24, 2024 at 11:36 UTC
- **Last Updated**: August 26, 2024 at 15:35 UTC
- **Reserved Date**: August 09, 2024 at 21:35 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Image Hotspot by DevVN plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.5 via deserialization of untrusted input in the 'devvn_ihotspot_shortcode_func' function. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**levantoan - Image Hotspot by DevVN**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/624bdb9e-6c50-4a00-9a04-1a32c938d48b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/devvn-image-hotspot/trunk/admin/inc/add_shortcode_devvn_ihotspot.php#L16)
3. [](https://plugins.trac.wordpress.org/changeset/3139899/)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3379
- **State**: PUBLISHED
- **Published Date**: July 06, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: July 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Algorithmic complexity vulnerability in Hiki Wiki 0.6.0 through 0.6.5 and 0.8.0 through 0.8.5 allows remote attackers to cause a denial of service (CPU consumption) by performing a diff between large, crafted pages that trigger the worst case.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18785](http://www.securityfocus.com/bid/18785)
2. [26970](http://www.osvdb.org/26970)
3. [21150](http://secunia.com/advisories/21150)
4. [DSA-1119](http://www.debian.org/security/2006/dsa-1119)
5. [ADV-2006-2643](http://www.vupen.com/english/advisories/2006/2643)
6. [JVN#98836916](http://jvn.jp/jp/JVN%2398836916/index.html)
7. [](http://hikiwiki.org/en/advisory20060703.html)
8. [20741](http://secunia.com/advisories/20741)
9. [hiki-diff-dos(27507)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27507) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6614
- **State**: PUBLISHED
- **Published Date**: February 19, 2020 at 14:17 UTC
- **Last Updated**: August 06, 2024 at 21:36 UTC
- **Reserved Date**: December 08, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.exploit-db.com/exploits/22930/)
2. [](ftp://ftp2.dlink.com/PRODUCTS/DSR-250N/REVA/DSR-SERIES_RELEASE_NOTES_v3.14.pdf)
3. [](https://packetstormsecurity.com/files/118355/D-Link-DSR-250N-Backdoor.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7327
- **State**: PUBLISHED
- **Published Date**: February 23, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wireshark.org/security/wnpa-sec-2018-06.html)
2. [103158](http://www.securityfocus.com/bid/103158)
3. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420)
4. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2736
- **State**: PUBLISHED
- **Published Date**: March 25, 2025 at 05:00 UTC
- **Last Updated**: March 31, 2025 at 18:05 UTC
- **Reserved Date**: March 24, 2025 at 13:26 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/bwdates-report-details.php. The manipulation of the argument fromdate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Old Age Home Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-300758 | PHPGurukul Old Age Home Management System bwdates-report-details.php sql injection](https://vuldb.com/?id.300758)
2. [VDB-300758 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300758)
3. [Submit #522881 | Phpgurukul e-Diary Management System 1.0 SQL injection](https://vuldb.com/?submit.522881)
4. [](https://github.com/404heihei/CVE/issues/1)
5. [](https://phpgurukul.com/)
### Credits
- joke_umbrella (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6219
- **State**: PUBLISHED
- **Published Date**: December 04, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: December 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM Tivoli Netcool Security Manager 1.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-4059](http://www.vupen.com/english/advisories/2007/4059)
2. [IY95615](http://www-1.ibm.com/support/docview.wss?uid=swg1IY95615)
3. [1019026](http://www.securitytracker.com/id?1019026)
4. [27900](http://secunia.com/advisories/27900)
5. [26673](http://www.securityfocus.com/bid/26673)
6. [](http://www-1.ibm.com/support/docview.wss?uid=swg24017385) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41921
- **State**: PUBLISHED
- **Published Date**: April 28, 2022 at 12:16 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
novel-plus V3.6.1 allows unrestricted file uploads. Unrestricted file suffixes and contents can lead to server attacks and arbitrary code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/201206030/novel-plus/issues/62) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34382
- **State**: PUBLISHED
- **Published Date**: September 02, 2022 at 17:30 UTC
- **Last Updated**: September 16, 2024 at 23:56 UTC
- **Reserved Date**: June 23, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Command Update, Dell Update and Alienware Update versions prior to 4.6.0 contains a Local Privilege Escalation Vulnerability in the custom catalog configuration. A local malicious user may potentially exploit this vulnerability in order to elevate their privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Dell - Dell Command Update (DCU)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000202198) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1311
- **State**: PUBLISHED
- **Published Date**: April 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Yappa-NG before 2.3.2 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15107](http://secunia.com/advisories/15107)
2. [13372](http://www.securityfocus.com/bid/13372)
3. [15828](http://www.osvdb.org/15828)
4. [](http://sourceforge.net/project/shownotes.php?release_id=323206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41282
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:44 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V14.1.0.6 (Status: affected)
**Siemens - Teamcenter Visualization V13.2**
Affected versions:
- All versions < V13.2.0.12 (Status: affected)
**Siemens - Teamcenter Visualization V13.3**
Affected versions:
- All versions < V13.3.0.8 (Status: affected)
**Siemens - Teamcenter Visualization V14.0**
Affected versions:
- All versions < V14.0.0.4 (Status: affected)
**Siemens - Teamcenter Visualization V14.1**
Affected versions:
- All versions < V14.1.0.6 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-700053.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34821
- **State**: PUBLISHED
- **Published Date**: July 19, 2021 at 17:21 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability exists in AAT Novus Management System through 1.51.2. The WebUI has wrong HTTP 404 error handling implemented. A remote, unauthenticated attacker may be able to exploit the issue by sending malicious HTTP requests to non-existing URIs. The value of the URL path filename is copied into the HTML document as plain text tags.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FULLDISC: 20210709 Novus Managment System Vulnerabilities (CVE-2021-34820, CVE-2021-38421)](https://seclists.org/fulldisclosure/2021/Jul/20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1184
- **State**: PUBLISHED
- **Published Date**: January 14, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:156](http://www.mandriva.com/security/advisories?name=MDVSA-2011:156)
2. [DSA-2401](http://www.debian.org/security/2012/dsa-2401)
3. [SUSE-SU-2012:0155](http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html)
4. [RHSA-2012:0325](http://rhn.redhat.com/errata/RHSA-2012-0325.html)
5. [HPSBUX02860](http://marc.info/?l=bugtraq&m=136485229118404&w=2)
6. [](http://svn.apache.org/viewvc?view=rev&rev=1159309)
7. [RHSA-2012:0078](http://rhn.redhat.com/errata/RHSA-2012-0078.html)
8. [RHSA-2011:1845](http://www.redhat.com/support/errata/RHSA-2011-1845.html)
9. [](http://svn.apache.org/viewvc?view=rev&rev=1158180)
10. [RHSA-2012:0075](http://rhn.redhat.com/errata/RHSA-2012-0075.html)
11. [RHSA-2012:0074](http://rhn.redhat.com/errata/RHSA-2012-0074.html)
12. [](http://tomcat.apache.org/security-7.html)
13. [HPSBOV02762](http://marc.info/?l=bugtraq&m=133469267822771&w=2)
14. [](http://svn.apache.org/viewvc?view=rev&rev=1087655)
15. [](http://tomcat.apache.org/security-6.html)
16. [57126](http://secunia.com/advisories/57126)
17. [SSRT100825](http://marc.info/?l=bugtraq&m=133469267822771&w=2)
18. [](http://tomcat.apache.org/security-5.html)
19. [openSUSE-SU-2012:0208](http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00006.html)
20. [SSRT101146](http://marc.info/?l=bugtraq&m=136485229118404&w=2)
21. [RHSA-2012:0076](http://rhn.redhat.com/errata/RHSA-2012-0076.html)
22. [HPSBST02955](http://marc.info/?l=bugtraq&m=139344343412337&w=2)
23. [oval:org.mitre.oval:def:19169](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19169)
24. [RHSA-2012:0077](http://rhn.redhat.com/errata/RHSA-2012-0077.html)
25. [[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E)
26. [[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E)
27. [[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E)
28. [[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1589
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in GoSmart Message Board allows remote attackers to execute inject web script or HTML via the (1) Category parameter to Forum.asp or (2) MainMessageID parameter to ReplyToQuestion.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [gosmart-forum-mainmessageid-xss(17679)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17679)
2. [20041011 [MAxpatrol Security Advisory] Multiple vulnerabilities in GoSmart Message Board](http://marc.info/?l=bugtraq&m=109751522823011&w=2)
3. [11361](http://www.securityfocus.com/bid/11361)
4. [12790](http://secunia.com/advisories/12790/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22707
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 14:05 UTC
- **Last Updated**: January 10, 2025 at 19:16 UTC
- **Reserved Date**: January 06, 2023 at 12:03 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (author+) Cross-Site Scripting (XSS) vulnerability in Wpsoul Greenshift – animation and page builder blocks plugin <= 4.9.9 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Wpsoul - Greenshift – animation and page builder blocks**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/greenshift-animation-and-page-builder-blocks/wordpress-greenshift-animation-and-page-builder-blocks-plugin-4-9-9-svg-upload-to-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- n0paew (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3721
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 01, 2010 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21883
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21883) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35798, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35798 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35798
- **State**: PUBLISHED
- **Published Date**: December 29, 2020 at 23:38 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R6900P before 1.3.2.124, R7000 before 1.0.11.100, R7000P before 1.3.2.124, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7960P before 1.4.1.50, R8000 before 1.0.4.52, R7900P before 1.4.1.50, R8000P before 1.4.1.50, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.1.12, RAX45 before 1.0.2.66, RAX50 before 1.0.2.66, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, RBS850 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RS400 before 1.5.0.48, and XR300 before 1.0.3.50.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000062715/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2019-0218) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46547
- **State**: PUBLISHED
- **Published Date**: December 20, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 18:11 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/VirtualSer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromVirtualSer/fromVirtualSer.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23815
- **State**: PUBLISHED
- **Published Date**: April 06, 2023 at 04:58 UTC
- **Last Updated**: January 10, 2025 at 19:11 UTC
- **Reserved Date**: January 18, 2023 at 09:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Alan Jackson Multi-column Tag Map plugin <= 17.0.24 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Alan Jackson - Multi-column Tag Map**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/multi-column-tag-map/wordpress-multi-column-tag-map-plugin-17-0-24-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Lana Codes (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42265
- **State**: PUBLISHED
- **Published Date**: August 17, 2024 at 08:54 UTC
- **Last Updated**: May 04, 2025 at 09:25 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
both callers have verified that fd is not greater than ->max_fds;
however, misprediction might end up with
tofree = fdt->fd[fd];
being speculatively executed. That's wrong for the same reasons
why it's wrong in close_fd()/file_close_fd_locked(); the same
solution applies - array_index_nospec(fd, fdt->max_fds) could differ
from fd only in case of speculative execution on mispredicted path.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.320 (Status: unaffected)
- 5.4.282 (Status: unaffected)
- 5.10.224 (Status: unaffected)
- 5.15.165 (Status: unaffected)
- 6.1.104 (Status: unaffected)
- 6.6.45 (Status: unaffected)
- 6.10.4 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ed42e8ff509d2a61c6642d1825032072dab79f26)
2. [](https://git.kernel.org/stable/c/41a6c31df77bd8e050136b0a200b537da9e1084a)
3. [](https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368)
4. [](https://git.kernel.org/stable/c/3f480493550b6a23d3a65d095d6569d4a7f56a0f)
5. [](https://git.kernel.org/stable/c/5db999fff545b924b24c9afd368ef5c17279b176)
6. [](https://git.kernel.org/stable/c/da72e783afd27d9f487836b2e6738146c0edd149)
7. [](https://git.kernel.org/stable/c/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1)
8. [](https://git.kernel.org/stable/c/8aa37bde1a7b645816cda8b80df4753ecf172bf1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9958
- **State**: PUBLISHED
- **Published Date**: June 24, 2019 at 18:10 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSRF within the admin panel in Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to escalate privileges, or create new admin accounts by crafting a malicious web page that issues specific requests, using a target admin's session to process their requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://crawl3r.xyz/cve/cve-2019-9958/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25069
- **State**: PUBLISHED
- **Published Date**: March 05, 2022 at 00:29 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mark Text v0.16.3 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to perform remote code execution (RCE) via injecting a crafted payload into /lib/contentState/pasteCtrl.js.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/marktext/marktext/issues/2990)
2. [](https://github.com/marktext/marktext/pull/3002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4442
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 08, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.