System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13511 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:07 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for CorelliCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CorelliCoin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0084 - **State**: PUBLISHED - **Published Date**: March 10, 2020 at 20:03 UTC - **Last Updated**: August 04, 2024 at 05:47 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In several functions of NotificationManagerService.java, there are missing permission checks. This could lead to local escalation of privilege by creating fake system notifications with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143339775 ### Affected Products **n/a - Android** Affected versions: - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2020-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1253, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1253 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1253 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:19 UTC - **Reserved Date**: November 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Abuse 2.00 and earlier allows local users to gain privileges via command line arguments that specify alternate Lisp scripts that run at escalated privileges, which can contain functions that execute commands or modify files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.idefense.com/advisory/11.01.02.txt) 2. [abuse-lisp-gain-privileges(11300)](http://www.iss.net/security_center/static/11300.php) 3. [20021101 iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse](http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0055.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0760 - **State**: PUBLISHED - **Published Date**: February 13, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 07:54 UTC - **Reserved Date**: February 13, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.4.1.0 and earlier, and Sentinel Keys Server 1.0.4.0 and earlier, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-6483. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27735](http://www.securityfocus.com/bid/27735) 2. [20080211 Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0](http://www.securityfocus.com/archive/1/487954/100/0/threaded) 3. [3646](http://securityreason.com/securityalert/3646) 4. [](http://aluigi.altervista.org/adv/sentinella-adv.txt) 5. [28863](http://secunia.com/advisories/28863) 6. [ADV-2008-0499](http://www.vupen.com/english/advisories/2008/0499)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48541 - **State**: PUBLISHED - **Published Date**: October 24, 2024 at 00:00 UTC - **Last Updated**: October 24, 2024 at 18:15 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Incorrect access control in the firmware update and download processes of Ruochan Smart v4.4.7 allows attackers to access sensitive information by analyzing the code and data within the APK file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.ruochanit.com/) 2. [](https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ruochan.dabai/com.ruochan.dabai.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7741, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7741 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7741 - **State**: PUBLISHED - **Published Date**: October 06, 2020 at 14:30 UTC - **Last Updated**: September 16, 2024 at 16:42 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects the package hellojs before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1). ### CVSS Metrics - **CVSS Base Score**: 9.9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H` ### Affected Products **n/a - hellojs** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546) 2. [](https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545) 3. [](https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669) ### Credits - Anonymous Reporter
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31830 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 14:51 UTC - **Last Updated**: April 01, 2025 at 16:26 UTC - **Reserved Date**: April 01, 2025 at 13:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Uriahs Victor Printus allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Printus: from n/a through 1.2.6. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Uriahs Victor - Printus** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/printus-cloud-printing-for-woocommerce/vulnerability/wordpress-printus-plugin-1-2-6-broken-access-control-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6703 - **State**: PUBLISHED - **Published Date**: November 25, 2016 at 16:00 UTC - **Last Updated**: August 06, 2024 at 01:36 UTC - **Reserved Date**: August 11, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description A remote code execution vulnerability in an Android runtime library in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-01 could enable an attacker using a specially crafted payload to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Android runtime. Android ID: A-30765246. ### Affected Products **Google Inc. - Android** Affected versions: - Android-4.4.4 (Status: affected) - Android-5.0.2 (Status: affected) - Android-5.1.1 (Status: affected) - Android-6.0 (Status: affected) - Android-6.0.1 (Status: affected) ### References 1. [94161](http://www.securityfocus.com/bid/94161) 2. [](https://source.android.com/security/bulletin/2016-11-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42527 - **State**: PUBLISHED - **Published Date**: March 16, 2022 at 14:03 UTC - **Last Updated**: April 23, 2025 at 18:50 UTC - **Reserved Date**: October 15, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-788: OS Command Injection ### Affected Products **Adobe - Premiere Elements** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5887, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5887 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5887 - **State**: PUBLISHED - **Published Date**: November 14, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 20:04 UTC - **Reserved Date**: November 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in CampusNewsDetails.asp in Dynamic Dataworx NuSchool 1.0 allows remote attackers to execute arbitrary SQL commands via the NewsID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2757](https://www.exploit-db.com/exploits/2757) 2. [20061111 NuSchool 1.0 (CampusNewsDetails.asp) Remote SQL Injection Exploit](http://www.securityfocus.com/archive/1/451336/100/0/threaded) 3. [21006](http://www.securityfocus.com/bid/21006) 4. [1017217](http://securitytracker.com/id?1017217) 5. [ADV-2006-4475](http://www.vupen.com/english/advisories/2006/4475) 6. [1855](http://securityreason.com/securityalert/1855) 7. [22830](http://secunia.com/advisories/22830) 8. [nuschool-campusnewsdetails-sql-injection(30196)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30196)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34000 - **State**: PUBLISHED - **Published Date**: June 14, 2023 at 07:30 UTC - **Last Updated**: January 02, 2025 at 20:42 UTC - **Reserved Date**: May 25, 2023 at 11:25 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. IDOR vulnerability leading to PII Disclosure in WooCommerce Stripe Payment Gateway plugin <= 7.4.0 versions. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **WooCommerce - WooCommerce Stripe Payment Gateway** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-payment-gateway-plugin-7-4-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve) 2. [](https://patchstack.com/articles/unauthenticated-idor-to-pii-disclosure-vulnerability-in-woocommerce-stripe-gateway-plugin?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5542, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5542 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5542 - **State**: PUBLISHED - **Published Date**: June 07, 2024 at 12:33 UTC - **Last Updated**: August 01, 2024 at 21:18 UTC - **Reserved Date**: May 30, 2024 at 18:16 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Navigation Menu widget of the plugin's Mega Menu extension in all versions up to, and including, 2.0.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **litonice13 - Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5151f429-b1f3-43d4-94cf-3ff382b80190?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3096299/master-addons) ### Credits - Craig Smith
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0153, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0153 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0153 - **State**: PUBLISHED - **Published Date**: May 17, 2019 at 15:41 UTC - **Last Updated**: August 04, 2024 at 17:44 UTC - **Reserved Date**: November 13, 2018 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Buffer overflow in subsystem in Intel(R) CSME 12.0.0 through 12.0.34 may allow an unauthenticated user to potentially enable escalation of privilege via network access. ### Affected Products **n/a - Intel(R) Converged Security & Management Engine (CSME)** Affected versions: - Versions before 12.0.35. (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html) 2. [](https://support.f5.com/csp/article/K71265658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0422 - **State**: PUBLISHED - **Published Date**: February 18, 2025 at 07:57 UTC - **Last Updated**: February 18, 2025 at 15:05 UTC - **Reserved Date**: January 13, 2025 at 14:29 UTC - **Assigned By**: NCSC.ch ### Vulnerability Description An authenticated user in the "bestinformed Web" application can execute commands on the underlying server running the application. (Remote Code Execution) For this, the user must be able to create "ScriptVars" with the type „script" and preview them by, for example, creating a new "Info". By default, admin users have those permissions, but with the granular permission system, those permissions may be assigned to other users. An attacker is able to execute commands on the server running the "bestinformed Web" application if an account with the correct permissions was compromised before. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cordaware - bestinformed Web** Affected versions: - 0 (Status: affected) - 6.2.2.5 (Status: unaffected) ### References 1. [](https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html) ### Credits - Manuel Kiesel (cyllective AG) - David Miller (cyllective AG)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4500, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4500 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4500 - **State**: PUBLISHED - **Published Date**: October 31, 2012 at 16:00 UTC - **Last Updated**: August 06, 2024 at 20:35 UTC - **Reserved Date**: August 21, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Announcements module 6.x-1.x before 6.x-1.5 for Drupal allows remote authenticated users with the "access announcements" permission to bypass node access restrictions and possibly have other unspecified impact. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20121004 CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/10/04/6) 2. [](http://drupal.org/node/1761038) 3. [](http://drupal.org/node/1762480) 4. [55283](http://www.securityfocus.com/bid/55283) 5. [[oss-security] 20121007 Re: CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/10/07/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5033, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5033 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5033 - **State**: PUBLISHED - **Published Date**: July 20, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html) 2. [104699](http://www.securityfocus.com/bid/104699) 3. [1041250](http://www.securitytracker.com/id/1041250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7811, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7811 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7811 - **State**: PUBLISHED - **Published Date**: June 09, 2017 at 16:00 UTC - **Last Updated**: August 06, 2024 at 02:04 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows an attacker on the same network segment to bypass access restriction to perform arbitrary operations via unspecified vectors. ### Affected Products **Corega Inc - CG-WLR300NX** Affected versions: - firmware Ver. 1.20 and earlier (Status: affected) ### References 1. [JVN#23549283](https://jvn.jp/en/jp/JVN23549283/index.html) 2. [](http://corega.jp/support/security/20161111_wlr300nx.htm) 3. [94248](http://www.securityfocus.com/bid/94248)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3933 - **State**: PUBLISHED - **Published Date**: March 25, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 17:09 UTC - **Reserved Date**: November 08, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths. ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **n/a - openexr** Affected versions: - OpenEXR 3.1.2 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2019783) 2. [FEDORA-2022-18e14f460c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/) 3. [GLSA-202210-31](https://security.gentoo.org/glsa/202210-31) 4. [DSA-5299](https://www.debian.org/security/2022/dsa-5299) 5. [[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2971, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2971 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2971 - **State**: PUBLISHED - **Published Date**: January 24, 2017 at 07:40 UTC - **Last Updated**: August 05, 2024 at 14:09 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the JPEG decoder routine. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier.** Affected versions: - Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. (Status: affected) ### References 1. [95690](http://www.securityfocus.com/bid/95690) 2. [](http://www.talosintelligence.com/reports/TALOS-2016-0259/) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30722 - **State**: PUBLISHED - **Published Date**: April 15, 2025 at 20:31 UTC - **Last Updated**: April 19, 2025 at 00:11 UTC - **Reserved Date**: March 25, 2025 at 20:11 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Oracle Corporation - MySQL Cluster** Affected versions: - 7.6.0 (Status: affected) - 8.0.0 (Status: affected) - 8.4.0 (Status: affected) - 9.0.0 (Status: affected) **Oracle Corporation - MySQL Client** Affected versions: - 8.0.0 (Status: affected) - 8.4.0 (Status: affected) - 9.0.0 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2025.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36096 - **State**: PUBLISHED - **Published Date**: September 08, 2022 at 20:30 UTC - **Last Updated**: April 23, 2025 at 17:12 UTC - **Reserved Date**: July 15, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description The XWiki Platform Index UI is an Index of all pages, attachments, orphans and deleted pages and attachments for XWiki Platform, a generic wiki platform. Prior to versions 13.10.6 and 14.3, it's possible to store JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3. As a workaround, modify fix the vulnerability by editing the wiki page `XWiki.DeletedAttachments` with the object editor, open the `JavaScriptExtension` object and apply on the content the changes that can be found on the fix commit. ### CVSS Metrics - **CVSS Base Score**: 8.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-80: Security Weakness ### Affected Products **xwiki - xwiki-platform** Affected versions: - >= 2.2-milestone-1, < 13.10.6 (Status: affected) - >= 14.0, < 14.3 (Status: affected) ### References 1. [](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gjmq-x5x7-wc36) 2. [](https://github.com/xwiki/xwiki-platform/commit/6705b0cd0289d1c90ed354bd4ecc1508c4b25745) 3. [](https://jira.xwiki.org/browse/XWIKI-19613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13429 - **State**: PUBLISHED - **Published Date**: May 24, 2020 at 17:24 UTC - **Last Updated**: August 04, 2024 at 12:18 UTC - **Reserved Date**: May 24, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description legend.ts in the piechart-panel (aka Pie Chart Panel) plugin before 1.5.0 for Grafana allows XSS via the Values Header (aka legend header) option. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/grafana/piechart-panel/releases/tag/v1.5.0) 2. [](https://github.com/grafana/piechart-panel/issues/218)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29052 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 17:01 UTC - **Last Updated**: May 03, 2025 at 00:40 UTC - **Reserved Date**: March 14, 2024 at 23:05 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Storage Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) ### References 1. [Windows Storage Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16242 - **State**: PUBLISHED - **Published Date**: November 26, 2019 at 15:30 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, there is an engineering application named omamock that is vulnerable to OS command injection. An attacker with physical access to the device can abuse this vulnerability to execute arbitrary OS commands as the root user via the application's UI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.nccgroup.trust/uk/our-research/?research=Technical+advisories) 2. [](https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-alcatel-flip-2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4795 - **State**: PUBLISHED - **Published Date**: September 14, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 19:23 UTC - **Reserved Date**: September 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport software in HP-UX B.11.11 and B.11.23 before 20060912 allows local users to cause a denial of service via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21909](http://secunia.com/advisories/21909) 2. [1016841](http://securitytracker.com/id?1016841) 3. [22010](http://secunia.com/advisories/22010) 4. [19999](http://www.securityfocus.com/bid/19999) 5. [1596](http://securityreason.com/securityalert/1596) 6. [HPSBUX02151](http://www.securityfocus.com/archive/1/445893/100/0/threaded) 7. [SSRT051021](http://www.securityfocus.com/archive/1/445893/100/0/threaded) 8. [](http://support.avaya.com/elmodocs2/security/ASA-2006-193.htm) 9. [oval:org.mitre.oval:def:5427](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5427) 10. [ADV-2006-3597](http://www.vupen.com/english/advisories/2006/3597)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21009 - **State**: PUBLISHED - **Published Date**: January 13, 2021 at 22:47 UTC - **Last Updated**: April 23, 2025 at 19:47 UTC - **Reserved Date**: December 18, 2020 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Campaign Classic Gold Standard 10 (and earlier), 20.3.1 (and earlier), 20.2.3 (and earlier), 20.1.3 (and earlier), 19.2.3 (and earlier) and 19.1.7 (and earlier) are affected by a server-side request forgery (SSRF) vulnerability. Successful exploitation could allow an attacker to use the Campaign instance to issue unauthorized requests to internal or external resources. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **Adobe - Campaign** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/campaign/apsb21-04.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4398 - **State**: REJECTED - **Published Date**: October 13, 2013 at 10:00 UTC - **Last Updated**: September 17, 2024 at 04:24 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31753, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31753 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31753 - **State**: PUBLISHED - **Published Date**: June 13, 2022 at 15:06 UTC - **Last Updated**: August 03, 2024 at 07:26 UTC - **Reserved Date**: May 27, 2022 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) **Huawei - EMUI** Affected versions: - 10.1.0 (Status: affected) - 10.1.1 (Status: affected) - 11.0.0 (Status: affected) - 12.0.0 (Status: affected) - 11.0.1 (Status: affected) **Huawei - Magic UI** Affected versions: - 3.1.0 (Status: affected) - 3.1.1 (Status: affected) - 4.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/6/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25848 - **State**: PUBLISHED - **Published Date**: December 31, 2020 at 07:45 UTC - **Last Updated**: September 17, 2024 at 00:11 UTC - **Reserved Date**: September 23, 2020 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description HGiga MailSherlock contains weak authentication flaw that attackers grant privilege remotely with default password generation mechanism. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **HGiga - MailSherlock MSR45/SSR45** Affected versions: - unspecified (Status: affected) **HGiga - MailSherlock MSR45/SSR45** Affected versions: - unspecified (Status: affected) **HGiga - MailSherlock MSR45/SSR45** Affected versions: - unspecified (Status: affected) **HGiga - MailSherlock MSR45/SSR45** Affected versions: - unspecified (Status: affected) **HGiga - MailSherlock MSR45/SSR45** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-4256-cfc5a-1.html) ### Credits - Robin Tung, Dio Lin of CHT Security Co., Ltd.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2287, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2287 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2287 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:59 UTC - **Last Updated**: August 01, 2024 at 19:11 UTC - **Reserved Date**: March 07, 2024 at 16:39 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Knight Lab Timeline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.9.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **nuknightlab - Knight Lab Timeline** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/afb3e68e-6f79-4c46-b41e-8fd6eb43c755?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?old_path=/knight-lab-timelinejs/tags/3.9.3.3&old=3051910&new_path=/knight-lab-timelinejs/tags/3.9.3.4&new=3051910&sfp_email=&sfph_mail=) ### Credits - Tien Luong
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23034 - **State**: PUBLISHED - **Published Date**: September 14, 2021 at 17:58 UTC - **Last Updated**: August 03, 2024 at 18:58 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description On BIG-IP version 16.x before 16.1.0 and 15.1.x before 15.1.3.1, when a DNS profile using a DNS cache resolver is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - BIG-IP** Affected versions: - 16.x before 16.1.0 and 15.1.x before 15.1.3.1 (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K30523121)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3050 - **State**: PUBLISHED - **Published Date**: June 16, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 18:16 UTC - **Reserved Date**: June 16, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in detail.php in SixCMS 6.0, and other versions before 6.0.6patch2, allows remote attackers to read arbitrary files via a .. (dot dot) sequence and trailing null (%00) byte in the template parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [sixcms-detail-directory-traversal(27107)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27107) 2. [18395](http://www.securityfocus.com/bid/18395) 3. [](http://www.majorsecurity.de/advisory/major_rls17.txt) 4. [1016282](http://securitytracker.com/id?1016282) 5. [20060619 Re: [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities](http://www.securityfocus.com/archive/1/437639/100/0/threaded) 6. [1101](http://securityreason.com/securityalert/1101) 7. [20060612 [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities](http://www.securityfocus.com/archive/1/437047/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6130 - **State**: PUBLISHED - **Published Date**: November 26, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:54 UTC - **Reserved Date**: November 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27965](http://secunia.com/advisories/27965) 2. [26618](http://www.securityfocus.com/bid/26618) 3. [](https://bugs.gentoo.org/show_bug.cgi?id=193132) 4. [27848](http://secunia.com/advisories/27848) 5. [SUSE-SR:2007:025](http://www.novell.com/linux/security/advisories/2007_25_sr.html) 6. [ADV-2007-4039](http://www.vupen.com/english/advisories/2007/4039) 7. [](http://www.gnu.org/software/gnump3d/ChangeLog)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11587, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11587 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11587 - **State**: PUBLISHED - **Published Date**: August 23, 2019 at 13:49 UTC - **Last Updated**: September 17, 2024 at 02:06 UTC - **Reserved Date**: April 29, 2019 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description Various exposed resources of the ViewLogging class in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allow remote attackers to modify various settings via Cross-site request forgery (CSRF). ### Affected Products **Atlassian - Jira** Affected versions: - unspecified (Status: affected) - 8.0.0 (Status: affected) - unspecified (Status: affected) - 8.3.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/JRASERVER-69782)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4912, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4912 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4912 - **State**: PUBLISHED - **Published Date**: June 29, 2010 at 18:00 UTC - **Last Updated**: September 16, 2024 at 20:27 UTC - **Reserved Date**: June 29, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) complete an SSL handshake with an HTTPS client even if this client is unauthorized, which might allow remote attackers to bypass intended access restrictions via an HTTPS session, aka Bug ID CSCso10876. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28023 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 19:07 UTC - **Last Updated**: October 21, 2024 at 14:36 UTC - **Reserved Date**: March 10, 2023 at 03:59 UTC - **Assigned By**: HCL ### Vulnerability Description A cross site request forgery vulnerability in the BigFix WebUI Software Distribution interface site version 44 and before allows an NMO attacker to access files on server side systems (server machine and all the ones in its network).  ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **HCL Software - HCL BigFix WebUI Software Distribution** Affected versions: - <=44 (Status: affected) ### References 1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106123)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11414 - **State**: PUBLISHED - **Published Date**: March 31, 2020 at 12:15 UTC - **Last Updated**: August 04, 2024 at 11:28 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Progress Telerik UI for Silverlight before 2020.1.330. The RadUploadHandler class in RadUpload for Silverlight expects a web request that provides the file location of the uploading file along with a few other parameters. The uploading file location should be inside the directory where the upload handler class is defined. Before 2020.1.330, a crafted web request could result in uploads to arbitrary locations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.telerik.com/devtools/silverlight/controls/radupload/how-to/secure-upload-file-path)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1872, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1872 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1872 - **State**: PUBLISHED - **Published Date**: April 17, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:40 UTC - **Reserved Date**: April 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in home.news.php in Comdev News Publisher 4.1.2 allows remote attackers to execute arbitrary SQL commands via the arcmonth parameter. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29697](http://secunia.com/advisories/29697) 2. [28622](http://www.securityfocus.com/bid/28622) 3. [newspublisher-index-sql-injection(41663)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41663) 4. [5362](https://www.exploit-db.com/exploits/5362)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33294 - **State**: PUBLISHED - **Published Date**: April 04, 2023 at 04:46 UTC - **Last Updated**: August 03, 2024 at 08:01 UTC - **Reserved Date**: June 14, 2022 at 10:44 UTC - **Assigned By**: qualcomm ### Vulnerability Description Transient DOS in Modem due to NULL pointer dereference while receiving response of lwm2m registration/update/bootstrap request message. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - 9205 LTE Modem (Status: affected) - 9206 LTE Modem (Status: affected) - 9207 LTE Modem (Status: affected) - MDM8207 (Status: affected) - QCA4004 (Status: affected) - QTS110 (Status: affected) - Snapdragon 1100 Wearable Platform (Status: affected) - Snapdragon 1200 Wearable Platform (Status: affected) - Snapdragon Wear 1300 Platform (Status: affected) - Snapdragon X5 LTE Modem (Status: affected) - WCD9306 (Status: affected) - WCD9330 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46837 - **State**: PUBLISHED - **Published Date**: August 30, 2022 at 00:00 UTC - **Last Updated**: August 04, 2024 at 05:17 UTC - **Reserved Date**: August 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://downloads.asterisk.org/pub/security/AST-2021-006.html) 2. [[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html) 3. [DSA-5285](https://www.debian.org/security/2022/dsa-5285)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48010 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 16:23 UTC - **Last Updated**: May 21, 2025 at 16:47 UTC - **Reserved Date**: May 14, 2025 at 17:45 UTC - **Assigned By**: drupal ### Vulnerability Description Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal One Time Password allows Functionality Bypass.This issue affects One Time Password: from 0.0.0 before 1.3.0. ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **Drupal - One Time Password** Affected versions: - 0.0.0 (Status: affected) ### References 1. [](https://www.drupal.org/sa-contrib-2025-061) ### Credits - Conrad Lara (cmlara) - danielveza - Kim Pepper (kim.pepper) - Lee Rowlands (larowlan) - Greg Knaddison (greggles) - Juraj Nemec (poker10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5620, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5620 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5620 - **State**: PUBLISHED - **Published Date**: June 04, 2025 at 23:31 UTC - **Last Updated**: June 05, 2025 at 14:11 UTC - **Reserved Date**: June 04, 2025 at 11:10 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection - CWE-77: Security Weakness ### Affected Products **D-Link - DIR-816** Affected versions: - 1.10CNB05 (Status: affected) ### References 1. [VDB-311106 | D-Link DIR-816 setipsec_config os command injection](https://vuldb.com/?id.311106) 2. [VDB-311106 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311106) 3. [Submit #589220 | D-Link DIR816 1.10CNB05 OS Command Injection](https://vuldb.com/?submit.589220) 4. [](https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_48/48.md) 5. [](https://www.dlink.com/) ### Credits - pjqwudi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1702, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1702 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1702 - **State**: PUBLISHED - **Published Date**: January 17, 2013 at 01:30 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 16, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-1703-1](http://www.ubuntu.com/usn/USN-1703-1) 2. [53372](http://secunia.com/advisories/53372) 3. [](http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html) 4. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml) 5. [RHSA-2013:0219](http://rhn.redhat.com/errata/RHSA-2013-0219.html) 6. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) 7. [oval:org.mitre.oval:def:17186](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0231, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0231 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0231 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 20:00 UTC - **Last Updated**: November 29, 2024 at 15:18 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Transport Layer Security (TLS) library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of the affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious TLS message to an interface enabled for Secure Layer Socket (SSL) services on an affected device. Messages using SSL Version 3 (SSLv3) or SSL Version 2 (SSLv2) cannot be be used to exploit this vulnerability. An exploit could allow the attacker to cause a buffer underflow, triggering a crash on an affected device. This vulnerability affects Cisco ASA Software and Cisco FTD Software that is running on the following Cisco products: Adaptive Security Virtual Appliance (ASAv), Firepower Threat Defense Virtual (FTDv), Firepower 2100 Series Security Appliance. Cisco Bug IDs: CSCve18902, CSCve34335, CSCve38446. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - Cisco Adaptive Security Appliance** Affected versions: - Cisco Adaptive Security Appliance (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa3) 2. [1040725](http://www.securitytracker.com/id/1040725) 3. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0740, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0740 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0740 - **State**: PUBLISHED - **Published Date**: April 26, 2024 at 09:36 UTC - **Last Updated**: August 01, 2024 at 18:18 UTC - **Reserved Date**: January 19, 2024 at 14:28 UTC - **Assigned By**: eclipse ### Vulnerability Description Eclipse Target Management: Terminal and Remote System Explorer (RSE) version <= 4.5.400 has a remote code execution vulnerability that does not require authentication. The fixed version is included in Eclipse IDE 2024-03 ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Eclipse Foundation - Eclipse Target Management** Affected versions: - 0 (Status: affected) ### References 1. [](https://git.eclipse.org/r/c/tm/org.eclipse.tm/+/202145) 2. [](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/171) ### Credits - Xin-Yue,Song (CHT Security) - yc (CHT Security)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4662 - **State**: PUBLISHED - **Published Date**: January 29, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: June 24, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api) 2. [](http://issues.civicrm.org/jira/browse/CRM-12765)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5351, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5351 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5351 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 14:18 UTC - **Last Updated**: August 04, 2024 at 19:54 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54098, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54098 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54098 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 11:13 UTC - **Last Updated**: December 12, 2024 at 15:23 UTC - **Reserved Date**: November 29, 2024 at 02:34 UTC - **Assigned By**: huawei ### Vulnerability Description Service logic error vulnerability in the system service module Impact: Successful exploitation of this vulnerability may affect service integrity. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H` ### Weakness Classification (CWE) - CWE-840: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 4.2.0 (Status: affected) - 4.0.0 (Status: affected) - 3.1.0 (Status: affected) - 3.0.0 (Status: affected) - 2.1.0 (Status: affected) - 2.0.0 (Status: affected) **Huawei - EMUI** Affected versions: - 14.0.0 (Status: affected) - 13.0.0 (Status: affected) - 12.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2024/12/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51760 - **State**: PUBLISHED - **Published Date**: November 09, 2024 at 11:51 UTC - **Last Updated**: November 09, 2024 at 15:48 UTC - **Reserved Date**: November 01, 2024 at 11:50 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RistrettoApps Dashing Memberships allows Reflected XSS.This issue affects Dashing Memberships: from n/a through 1.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **RistrettoApps - Dashing Memberships** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/dashing-memberships/wordpress-dashing-memberships-plugin-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7085, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7085 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7085 - **State**: PUBLISHED - **Published Date**: January 15, 2025 at 16:38 UTC - **Last Updated**: January 15, 2025 at 20:18 UTC - **Reserved Date**: July 24, 2024 at 17:09 UTC - **Assigned By**: OpenText ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Solutions Business Manager (SBM) allows Stored XSS.  The vulnerability could result in the exposure of private information to an unauthorized actor. This issue affects Solutions Business Manager (SBM): through 12.2.1. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **OpenText™ - Solutions Business Manager (SBM)** Affected versions: - 0 (Status: affected) ### References 1. [](https://portal.microfocus.com/s/article/KM000036201?language=en_US) ### Credits - Wiktoria Lewandowska
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26236 - **State**: PUBLISHED - **Published Date**: March 18, 2021 at 12:55 UTC - **Last Updated**: August 03, 2024 at 20:19 UTC - **Reserved Date**: January 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236) 2. [](https://www.exploit-db.com/exploits/49660) 3. [](https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2494 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:07 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.13 and prior (Status: affected) ### References 1. [106625](http://www.securityfocus.com/bid/106625) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 3. [](https://security.netapp.com/advisory/ntap-20190118-0002/) 4. [RHSA-2019:2484](https://access.redhat.com/errata/RHSA-2019:2484) 5. [RHSA-2019:2511](https://access.redhat.com/errata/RHSA-2019:2511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49061 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:54 UTC - **Last Updated**: May 04, 2025 at 08:28 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link When using a fixed-link, the altr_tse_pcs driver crashes due to null-pointer dereference as no phy_device is provided to tse_pcs_fix_mac_speed function. Fix this by adding a check for phy_dev before calling the tse_pcs_fix_mac_speed() function. Also clean up the tse_pcs_fix_mac_speed function a bit. There is no need to check for splitter_base and sgmii_adapter_base because the driver will fail if these 2 variables are not derived from the device tree. ### Affected Products **Linux - Linux** Affected versions: - fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4 (Status: affected) - fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4 (Status: affected) - fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4 (Status: affected) - fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4 (Status: affected) - fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4 (Status: affected) **Linux - Linux** Affected versions: - 4.8 (Status: affected) - 0 (Status: unaffected) - 5.4.190 (Status: unaffected) - 5.10.112 (Status: unaffected) - 5.15.35 (Status: unaffected) - 5.17.4 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/7e59fdf9547c4f948d1d917ec7ffa5fb5ac53bdb) 2. [](https://git.kernel.org/stable/c/08d5e3e954537931c8da7428034808d202e98299) 3. [](https://git.kernel.org/stable/c/62a48383ebe2e159fd68425dd3e16d4c6bd6599a) 4. [](https://git.kernel.org/stable/c/6c020f05253df04c3480b586fe188a3582740049) 5. [](https://git.kernel.org/stable/c/a6aaa00324240967272b451bfa772547bd576ee6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34551 - **State**: PUBLISHED - **Published Date**: July 27, 2022 at 13:12 UTC - **Last Updated**: August 03, 2024 at 09:15 UTC - **Reserved Date**: June 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sims v1.0 was discovered to allow path traversal when downloading attachments. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/rawchen/sims/issues/7) 2. [](http://cwe.mitre.org/data/definitions/23.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14616 - **State**: PUBLISHED - **Published Date**: July 15, 2020 at 17:34 UTC - **Last Updated**: September 27, 2024 at 18:31 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Reporting). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 2.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Oracle Corporation - Hospitality Reporting and Analytics** Affected versions: - 9.1.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3332 - **State**: PUBLISHED - **Published Date**: June 21, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 21, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Satellite.php in Satel Lite for PhpNuke allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the name parameter in a modload action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35183](http://osvdb.org/35183) 2. [20070326 Satel Lite for PhpNuke (Satellite.php) <= Local File Inclusion](http://www.securityfocus.com/archive/1/463828/100/0/threaded) 3. [satellite-satellite-file-include(33214)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33214) 4. [23143](http://www.securityfocus.com/bid/23143) 5. [2830](http://securityreason.com/securityalert/2830)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14785 - **State**: PUBLISHED - **Published Date**: August 09, 2019 at 12:37 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 09, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The "CP Contact Form with PayPal" plugin before 1.2.99 for WordPress has XSS in the publishing wizard via the wp-admin/admin.php?page=cp_contact_form_paypal.php&pwizard=1 cp_contactformpp_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/cp-contact-form-with-paypal/#developers) 2. [](https://www.pluginvulnerabilities.com/2019/06/24/reflected-cross-site-scripting-xss-vulnerability-in-cp-contact-form-with-paypal/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6252 - **State**: PUBLISHED - **Published Date**: December 04, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 03, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Microsoft Windows Live Messenger 8.0 and earlier, when gestual emoticons are enabled, allows remote attackers to cause a denial of service (CPU consumption) via a long string composed of ":D" sequences, which are interpreted as emoticons. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20061125 Re: DoS in Microsoft Windows Live Messenger <= 8.0](http://www.securityfocus.com/archive/1/452645/100/0/threaded) 2. [20061124 DoS in Microsoft Windows Live Messenger <= 8.0](http://www.securityfocus.com/archive/1/452620/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50711 - **State**: PUBLISHED - **Published Date**: January 02, 2024 at 20:02 UTC - **Last Updated**: February 13, 2025 at 17:19 UTC - **Reserved Date**: December 11, 2023 at 17:53 UTC - **Assigned By**: GitHub_M ### Vulnerability Description vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **rust-vmm - vmm-sys-util** Affected versions: - >= 0.5.0, < 0.12.0 (Status: affected) ### References 1. [https://github.com/rust-vmm/vmm-sys-util/security/advisories/GHSA-875g-mfp6-g7f9](https://github.com/rust-vmm/vmm-sys-util/security/advisories/GHSA-875g-mfp6-g7f9) 2. [https://github.com/rust-vmm/vmm-sys-util/commit/30172fca2a8e0a38667d934ee56682247e13f167](https://github.com/rust-vmm/vmm-sys-util/commit/30172fca2a8e0a38667d934ee56682247e13f167) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5XMCLV2P3ANS3XN4NXZTV4PUNTLWUNJ/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJI7D273R6G5RUC246KTI2YY3AXZKZMD/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5286, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5286 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5286 - **State**: PUBLISHED - **Published Date**: April 20, 2020 at 16:55 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In PrestaShop between versions 1.7.4.0 and 1.7.6.5, there is a reflected XSS when uploading a wrong file. The problem is fixed in 1.7.6.5 ### CVSS Metrics - **CVSS Base Score**: 4.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PrestaShop - PrestaShop** Affected versions: - >= 1.7.4.0, < 1.7.6.5 (Status: affected) ### References 1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-98j8-hvjv-x47j) 2. [](https://github.com/PrestaShop/PrestaShop/commit/fc0625fb0a9aab1835515f1bea52e8e063384da7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16713 - **State**: PUBLISHED - **Published Date**: September 26, 2018 at 22:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402084) with a buffer containing user defined content. The driver's subroutine will execute a rdmsr instruction with the user's buffer for input, and provide output from the instruction. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://downwithup.github.io/CVEPosts.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51803 - **State**: PUBLISHED - **Published Date**: March 31, 2024 at 00:00 UTC - **Last Updated**: August 20, 2024 at 19:40 UTC - **Reserved Date**: December 26, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description LinuxServer.io Heimdall before 2.5.7 does not prevent use of icons that have non-image data such as the "<?php ?>" substring. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/linuxserver/Heimdall/pull/1167) 2. [](https://github.com/linuxserver/Heimdall/pull/1173) 3. [](https://github.com/linuxserver/Heimdall/releases/tag/v2.5.7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15897 - **State**: PUBLISHED - **Published Date**: December 05, 2019 at 15:31 UTC - **Last Updated**: August 05, 2024 at 01:03 UTC - **Reserved Date**: September 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description beegfs-ctl in ThinkParQ BeeGFS through 7.1.3 allows Authentication Bypass via communication with a BeeGFS metadata server (which is typically not exposed to external networks). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.hpcsec.com/2019/12/04/cve-2019-15897/) 2. [](https://seclists.org/bugtraq/2019/Dec/7) 3. [](http://packetstormsecurity.com/files/155573/BeeGFS-7.1.3-Privilege-Escalation.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30273 - **State**: PUBLISHED - **Published Date**: April 11, 2024 at 18:11 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 16:04 UTC - **Assigned By**: adobe ### Vulnerability Description Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Adobe - Illustrator** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb24-25.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45718 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 21:45 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2021-0128.html) 2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1131 - **State**: PUBLISHED - **Published Date**: March 20, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:19 UTC - **Reserved Date**: March 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in KnowledgeBuilder, referred to as KnowledgeBase, allows remote attackers to execute arbitrary PHP code by modifying the page parameter to reference a URL on a remote web server that contains the code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10504](http://secunia.com/advisories/10504) 2. [20050312 KnowledgeBase](http://marc.info/?l=bugtraq&m=111066494323543&w=2) 3. [knowledgebuilder-indexphp-file-include(14078)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14078) 4. [20031224 Remote Code Execution in Knowledge Builder.](http://www.securityfocus.com/archive/1/348359) 5. [9292](http://www.securityfocus.com/bid/9292) 6. [3228](http://www.osvdb.org/3228)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0402 - **State**: PUBLISHED - **Published Date**: February 03, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 04:31 UTC - **Reserved Date**: February 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in client/new_account.php in Domain Technologie Control (DTC) before 0.29.16 allows remote attackers to execute arbitrary SQL commands via the (1) familyname, (2) christname, (3) company_name, (4) is_company, (5) email, (6) phone, (7) fax, (8) addr1, (9) addr2, (10) addr3, (11) zipcode, (12) city, (13) state, (14) country, and (15) vat_num parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33496](http://www.securityfocus.com/bid/33496) 2. [domaintechnologie-newaccount-sql-injection(48292)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48292) 3. [](http://freshmeat.net/projects/dtc/?branch_id=22759&release_id=292973) 4. [51631](http://osvdb.org/51631) 5. [33698](http://secunia.com/advisories/33698) 6. [](http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commitdiff%3Bh=056e1d1849ff3aa183a410e2aab1c1c3e969247d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15904 - **State**: PUBLISHED - **Published Date**: July 22, 2020 at 22:25 UTC - **Last Updated**: August 04, 2024 at 13:30 UTC - **Reserved Date**: July 22, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow in the patching routine of bsdiff4 before 1.2.0 allows an attacker to write to heap memory (beyond allocated bounds) via a crafted patch file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ilanschnell/bsdiff4/commit/49a4cee2feef7deaf9d89e5e793a8824930284d7) 2. [](https://github.com/ilanschnell/bsdiff4/blob/master/CHANGELOG.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5562, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5562 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5562 - **State**: PUBLISHED - **Published Date**: December 15, 2008 at 17:45 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ASPPortal stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for xportal.mdb. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7361](https://www.exploit-db.com/exploits/7361) 2. [4727](http://securityreason.com/securityalert/4727)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5970 - **State**: PUBLISHED - **Published Date**: October 21, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 17:29 UTC - **Reserved Date**: October 01, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description hostd-vmdb in VMware ESXi 4.0 through 5.0 and ESX 4.0 through 4.1 allows remote attackers to cause a denial of service (hostd-vmdb service outage) by modifying management traffic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [vmware-esxi-cve20135970-dos(88135)](https://exchange.xforce.ibmcloud.com/vulnerabilities/88135) 2. [63216](http://www.securityfocus.com/bid/63216) 3. [1029206](http://www.securitytracker.com/id/1029206) 4. [](http://www.vmware.com/security/advisories/VMSA-2013-0012.html) 5. [98719](http://osvdb.org/98719)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28572 - **State**: PUBLISHED - **Published Date**: May 02, 2022 at 12:36 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AX1806 v1.0.0.1 was discovered to contain a command injection vulnerability in `SetIPv6Status` function ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/F0und-icu/TempName/tree/main/TendaAX18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1852, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1852 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1852 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:58 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 23, 2024 at 17:25 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.4.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page which is the edit users page. This vulnerability was partially patched in version 3.4.9.2, and was fully patched in 3.4.9.3. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **cbutlerjr - WP-Members Membership Plugin** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/033069d2-8e0f-4c67-b18c-fdd471d85f87?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-members/trunk/includes/vendor/rocketgeek-utilities/includes/utilities.php#L168) 3. [](https://plugins.trac.wordpress.org/browser/wp-members/trunk/includes/class-wp-members-user.php#L524) 4. [](https://plugins.trac.wordpress.org/browser/wp-members/trunk/includes/class-wp-members-user-profile.php#L566) ### Credits - Craig Smith
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0810, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0810 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0810 - **State**: PUBLISHED - **Published Date**: February 12, 2020 at 13:14 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 19, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention. ### Affected Products **Linux Foundation - Linux kernel** Affected versions: - before 3.3 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=794557) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=e5d4e1c3ccee18c68f23d62ba77bda26e893d4f0) 3. [](https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=bcf6b1d78c0bde228929c388978ed3af9a623463)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4932, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4932 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4932 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 12:31 UTC - **Last Updated**: May 19, 2025 at 12:57 UTC - **Reserved Date**: May 18, 2025 at 06:42 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in projectworlds Online Lawyer Management System 1.0. Affected by this issue is some unknown functionality of the file /lawyer_registation.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **projectworlds - Online Lawyer Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-309494 | projectworlds Online Lawyer Management System lawyer_registation.php sql injection](https://vuldb.com/?id.309494) 2. [VDB-309494 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309494) 3. [Submit #579676 | projectworlds Online Lawyer Management System Project Using PHP MYSQL V1.0 SQL Injection](https://vuldb.com/?submit.579676) 4. [](https://github.com/hhhanxx/attack/issues/12) ### Credits - attackxu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3501 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:52 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3040-1](http://www.ubuntu.com/usn/USN-3040-1) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 3. [RHSA-2016:1601](http://rhn.redhat.com/errata/RHSA-2016-1601.html) 4. [1036362](http://www.securitytracker.com/id/1036362) 5. [91787](http://www.securityfocus.com/bid/91787) 6. [91949](http://www.securityfocus.com/bid/91949)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2543 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 17:25 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.4 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6461 - **State**: REJECTED - **Published Date**: March 15, 2017 at 21:00 UTC - **Last Updated**: March 15, 2017 at 20:57 UTC - **Reserved Date**: March 03, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3399 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:18 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - Advanced Outbound Telephony** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) ### References 1. [95531](http://www.securityfocus.com/bid/95531) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-23565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-23565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-23565 - **State**: PUBLISHED - **Published Date**: November 05, 2021 at 16:09 UTC - **Last Updated**: August 04, 2024 at 14:58 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Irfanview v4.53 allows attackers to execute arbitrary code via a crafted JPEG 2000 file. Related to a "Data from Faulting Address controls Branch Selection starting at JPEG2000!ShowPlugInSaveOptions_W+0x0000000000032850". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/KamasuOri/publicResearch/tree/master/poc/irfanview/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9159, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9159 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9159 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, lack of input validation OEMCrypto_GetRandom can cause potential buffer overflow. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4291 - **State**: PUBLISHED - **Published Date**: August 01, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco IOS XE 2.x before 2.4.3 and 2.5.x before 2.5.1 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted series of fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCtd72617. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033131](http://www.securitytracker.com/id/1033131) 2. [20150730 Cisco ASR 1000 Series Aggregation Services Routers Fragmented Packet Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150730-asr1k)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20142, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20142 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20142 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 13:02 UTC - **Last Updated**: August 03, 2024 at 02:02 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 Android-12 Android-12L (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2022-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32625 - **State**: PUBLISHED - **Published Date**: June 02, 2021 at 19:35 UTC - **Last Updated**: August 03, 2024 at 23:25 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB). ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-680: Security Weakness ### Affected Products **redis - redis** Affected versions: - < 6.0.14 (Status: affected) - >= 6.2.0, < 6.2.4 (Status: affected) ### References 1. [](https://github.com/redis/redis/security/advisories/GHSA-46cp-x4x9-6pfq) 2. [](https://github.com/redis/redis/releases/tag/6.0.14) 3. [](https://github.com/redis/redis/releases/tag/6.2.4) 4. [FEDORA-2021-916f861096](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/) 5. [FEDORA-2021-0ad4bec5b1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2878, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2878 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2878 - **State**: PUBLISHED - **Published Date**: October 04, 2011 at 20:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 20, 2011 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Google Chrome before 14.0.835.202 does not properly restrict access to the window prototype, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://code.google.com/p/chromium/issues/detail?id=95671) 2. [oval:org.mitre.oval:def:14470](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14470) 3. [](http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25972 - **State**: PUBLISHED - **Published Date**: March 01, 2024 at 09:31 UTC - **Last Updated**: November 04, 2024 at 19:38 UTC - **Reserved Date**: February 13, 2024 at 05:50 UTC - **Assigned By**: jpcert ### Vulnerability Description Initialization of a resource with an insecure default vulnerability in OET-213H-BTS1 sold in Japan by Atsumi Electric Co., Ltd. allows a network-adjacent unauthenticated attacker to configure and control the affected product. ### Affected Products **Zhejiang Uniview Technologies Co.,Ltd and Atsumi Electric Co., Ltd. - OET-213H-BTS1** Affected versions: - all firmware versions (Status: affected) ### References 1. [](https://www.atsumi.co.jp/info-20240229.html) 2. [](https://www.atsumi.co.jp/pdf/oet-213h-bts1.pdf) 3. [](https://jvn.jp/en/jp/JVN77203800/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44302 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 08:44 UTC - **Last Updated**: August 02, 2024 at 19:59 UTC - **Reserved Date**: September 28, 2023 at 09:44 UTC - **Assigned By**: dell ### Vulnerability Description Dell DM5500 5.14.0.0 and prior contain an improper authentication vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain access of resources or functionality that could possibly lead to execute arbitrary code. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **Dell - Dell PowerProtect Data Manager DM5500 Appliance** Affected versions: - DM5500 5.14 and below (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4409 - **State**: PUBLISHED - **Published Date**: September 18, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:12 UTC - **Reserved Date**: June 20, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit in Apple iOS before 8 makes it easier for remote attackers to track users during private browsing via a crafted web site that reads HTML5 application-cache data that had been stored during normal browsing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [69937](http://www.securityfocus.com/bid/69937) 2. [](http://support.apple.com/kb/HT6441) 3. [1030866](http://www.securitytracker.com/id/1030866) 4. [69882](http://www.securityfocus.com/bid/69882) 5. [JVNDB-2014-004316](http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004316.html) 6. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html) 7. [](http://support.apple.com/kb/HT6440) 8. [JVN#45442753](http://jvn.jp/en/jp/JVN45442753/index.html) 9. [apple-cve20144409-sec-bypass(96074)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96074)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11101 - **State**: PUBLISHED - **Published Date**: July 07, 2017 at 18:00 UTC - **Last Updated**: September 16, 2024 at 18:09 UTC - **Reserved Date**: July 07, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description When SWFTools 0.9.2 processes a crafted file in swfcombine, it can lead to a NULL Pointer Dereference in the swf_Relocate() function in lib/modules/swftools.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/matthiaskramm/swftools/issues/26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1164 - **State**: PUBLISHED - **Published Date**: May 07, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:45 UTC - **Reserved Date**: December 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WinVNC installs the WinVNC3 registry key with permissions that give Special Access (read and modify) to the Everybody group, which allows users to read and modify sensitive information such as passwords and gain access to the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20001118 WinVNC 3.3.x](http://archives.neohapsis.com/archives/bugtraq/2000-11/0253.html) 2. [1961](http://www.securityfocus.com/bid/1961) 3. [winvnc-modify-registry(5545)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5545)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1569, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1569 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1569 - **State**: PUBLISHED - **Published Date**: February 10, 2015 at 20:00 UTC - **Last Updated**: September 17, 2024 at 03:33 UTC - **Reserved Date**: February 10, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fortinet FortiClient 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof SSL VPN servers via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf) 2. [20150129 Fortinet FortiClient Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2015/Jan/124)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29168 - **State**: PUBLISHED - **Published Date**: February 17, 2023 at 00:00 UTC - **Last Updated**: March 19, 2025 at 14:16 UTC - **Reserved Date**: November 27, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability in Projectworlds Online Doctor Appointment Booking System, allows attackers to gain sensitive information via the q parameter to the getuser.php endpoint. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://projectworlds.in/free-projects/php-projects/online-doctor-appointment-booking-system-php-and-mysql/%2C) 2. [](https://projectworlds.in/wp-content/uploads/2020/05/PHP-Doctor-Appointment-System.zip) 3. [](https://www.exploit-db.com/exploits/49059)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0845 - **State**: PUBLISHED - **Published Date**: July 20, 2011 at 22:36 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Database Control component in Oracle Enterprise Manager Grid Control 10.1.0.6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html) 2. [48794](http://www.securityfocus.com/bid/48794) 3. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9794 - **State**: PUBLISHED - **Published Date**: September 29, 2017 at 21:00 UTC - **Last Updated**: September 17, 2024 at 03:02 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description When a cluster is operating in secure mode, a user with read privileges for specific data regions can use the gfsh command line utility to execute queries. In Apache Geode before 1.2.1, the query results may contain data from another user's concurrently executing gfsh query, potentially revealing data that the user is not authorized to view. ### Affected Products **Apache Software Foundation - Apache Geode** Affected versions: - 1.0.0 (Status: affected) - 1.1.0 (Status: affected) - 1.1.1 (Status: affected) - 1.2.0 (Status: affected) ### References 1. [[geode-user] 20170929 [SECURITY] CVE-2017-9794 Apache Geode gfsh query vulnerability](http://mail-archives.apache.org/mod_mbox/geode-user/201709.mbox/%3cCAEwge-FqzrT+deCkNkM-EQZuKfg-XuqY4cGjFiqxoKBVduY1Zw%40mail.gmail.com%3e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2516 - **State**: PUBLISHED - **Published Date**: May 05, 2023 at 00:00 UTC - **Last Updated**: February 12, 2025 at 16:42 UTC - **Reserved Date**: May 04, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **nilsteampassnet - nilsteampassnet/teampass** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716) 2. [](https://github.com/nilsteampassnet/teampass/commit/39b774cba118ca5383b0a51a71b1e7dea2761927)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21133 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 19:05 UTC - **Last Updated**: January 24, 2025 at 04:56 UTC - **Reserved Date**: December 04, 2024 at 17:19 UTC - **Assigned By**: adobe ### Vulnerability Description Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **Adobe - Illustrator on iPad** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-04.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6434 - **State**: PUBLISHED - **Published Date**: October 07, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 16, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description gpExec in GoPro HERO 3+ allows remote attackers to execute arbitrary commands via a the (1) a1 or (2) a2 parameter in a restart action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-14-348/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38643 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 15:32 UTC - **Last Updated**: November 22, 2024 at 16:51 UTC - **Reserved Date**: June 19, 2024 at 00:17 UTC - **Assigned By**: qnap ### Vulnerability Description A missing authentication for critical function vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote attackers to gain access to and execute certain functions. We have already fixed the vulnerability in the following version: Notes Station 3 3.9.7 and later ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **QNAP Systems Inc. - Notes Station 3** Affected versions: - 3.9.x (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-24-36) ### Credits - Thomas Fady
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13513 - **State**: PUBLISHED - **Published Date**: February 15, 2025 at 07:33 UTC - **Last Updated**: February 18, 2025 at 16:13 UTC - **Reserved Date**: January 17, 2025 at 16:13 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including the plugin's clientToken, which in turn can be used to change user account information including emails and account type. This allows attackers to then change account passwords resulting in a complete site takeover. Version 2.4.2.3 disabled logging but left sites with existing log files vulnerable. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **oliverpos - Oliver POS – A WooCommerce Point of Sale (POS)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bf6b7d8d-fb13-4eb4-b0b4-d0a10ad2a21e?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/oliver-pos/trunk/includes/models/class-pos-bridge-user.php#L373) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3234731%40oliver-pos%2Ftrunk&old=3056051%40oliver-pos%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45373 - **State**: PUBLISHED - **Published Date**: September 24, 2024 at 23:48 UTC - **Last Updated**: September 25, 2024 at 16:57 UTC - **Reserved Date**: September 05, 2024 at 20:11 UTC - **Assigned By**: icscert ### Vulnerability Description Once logged in to ProGauge MAGLINK LX4 CONSOLE, a valid user can change their privileges to administrator. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Dover Fueling Solutions (DFS) - ProGauge MAGLINK LX CONSOLE** Affected versions: - 0 (Status: affected) **Dover Fueling Solutions (DFS) - ProGauge MAGLINK LX4 CONSOLE** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04) ### Credits - Pedro Umbelino of Bitsight reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30618 - **State**: PUBLISHED - **Published Date**: September 03, 2021 at 19:25 UTC - **Last Updated**: August 03, 2024 at 22:40 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Chromium: CVE-2021-30618 Inappropriate implementation in DevTools ### Affected Products **Microsoft - Microsoft Edge (Chromium-based)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-30618) 2. [FEDORA-2021-02b301441f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/)