System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6658 - **State**: PUBLISHED - **Published Date**: September 12, 2024 at 14:38 UTC - **Last Updated**: September 23, 2024 at 19:19 UTC - **Reserved Date**: July 10, 2024 at 14:36 UTC - **Assigned By**: ProgressSoftware ### Vulnerability Description Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects:  Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.0 (inclusive)    From 7.2.49.0 to 7.2.54.11 (inclusive)    7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.11 and all prior versions ECS All prior versions to 7.2.60.0 (inclusive) ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Progress - LoadMaster** Affected versions: - All Previous Versions (Status: affected) ### References 1. [](https://support.kemptechnologies.com/hc/en-us/articles/28910587250701) ### Credits - Huydoppa from giaohangtietkiem.vn
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3738 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 16:32 UTC - **Last Updated**: April 17, 2025 at 19:40 UTC - **Reserved Date**: April 16, 2025 at 14:00 UTC - **Assigned By**: drupal ### Vulnerability Description Vulnerability in Drupal Google Optimize.This issue affects Google Optimize: *.*. ### Affected Products **Drupal - Google Optimize** Affected versions: - *.* (Status: affected) ### References 1. [](https://www.drupal.org/sa-contrib-2025-039)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6329, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6329 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6329 - **State**: PUBLISHED - **Published Date**: March 14, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 06:01 UTC - **Reserved Date**: January 26, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description It was discovered that the Unitrends Backup (UB) before 10.1.0 libbpext.so authentication could be bypassed with a SQL injection, allowing a remote attacker to place a privilege escalation exploit on the target system and subsequently execute arbitrary commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.unitrends.com/UnitrendsBackup/s/article/000006003) 2. [44297](https://www.exploit-db.com/exploits/44297/) 3. [](https://support.unitrends.com/UnitrendsBackup/s/article/000001150) 4. [45913](https://www.exploit-db.com/exploits/45913/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29304 - **State**: PUBLISHED - **Published Date**: June 15, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 18:56 UTC - **Reserved Date**: April 04, 2023 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.16.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-31.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48974 - **State**: PUBLISHED - **Published Date**: November 14, 2024 at 21:27 UTC - **Last Updated**: November 18, 2024 at 15:32 UTC - **Reserved Date**: October 10, 2024 at 19:24 UTC - **Assigned By**: Baxter ### Vulnerability Description The ventilator does not perform proper file integrity checks when adopting firmware updates. This makes it possible for an attacker to force unauthorized changes to the device's configuration settings and/or compromise device functionality by pushing a compromised/illegitimate firmware file. This could disrupt the function of the device and/or cause unauthorized information disclosure. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-494: Security Weakness ### Affected Products **Baxter - Life2000 Ventilation System** Affected versions: - 06.08.00.00 and prior (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10733, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10733 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10733 - **State**: PUBLISHED - **Published Date**: September 16, 2020 at 14:55 UTC - **Last Updated**: August 04, 2024 at 11:14 UTC - **Reserved Date**: March 20, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights. ### Weakness Classification (CWE) - CWE-426: Security Weakness ### Affected Products **n/a - PostgreSQL** Affected versions: - 9.5, 9.6, 10, 11, 12 (Status: affected) ### References 1. [](https://www.postgresql.org/support/security/11/) 2. [](https://www.postgresql.org/about/news/2038/) 3. [](https://security.netapp.com/advisory/ntap-20201001-0006/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30474 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 15:23 UTC - **Last Updated**: August 03, 2024 at 06:48 UTC - **Reserved Date**: May 09, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC Series Router AC18_V15.03.05.19(6318) was discovered to contain a heap overflow in the httpd module when handling /goform/saveParentControlInfo request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13924 - **State**: PUBLISHED - **Published Date**: July 22, 2019 at 13:47 UTC - **Last Updated**: August 05, 2024 at 09:21 UTC - **Reserved Date**: July 11, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Lack of check to prevent the buffer length taking negative values can lead to stack overflow. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA6174A, QCA8081, QCS404, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130 ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking** Affected versions: - IPQ8074, MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA6174A, QCA8081, QCS404, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7082 - **State**: PUBLISHED - **Published Date**: December 21, 2013 at 00:00 UTC - **Last Updated**: August 06, 2024 at 17:53 UTC - **Reserved Date**: December 11, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [55996](http://secunia.com/advisories/55996) 2. [](http://typo3.org/teams/security/security-bulletins/typo3-flow/typo3-flow-sa-2013-001) 3. [100825](http://osvdb.org/100825) 4. [typo3flow-actioncontroller-xss(89614)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89614)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57678, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57678 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57678 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 00:00 UTC - **Last Updated**: February 03, 2025 at 19:32 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin/) 2. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2WlAc.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22313, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22313 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22313 - **State**: PUBLISHED - **Published Date**: June 03, 2021 at 15:19 UTC - **Last Updated**: August 03, 2024 at 18:37 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. ### Affected Products **n/a - EMUI;Magic UI** Affected versions: - EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0 (Status: affected) - Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2021/2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32449 - **State**: PUBLISHED - **Published Date**: July 07, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md) 2. [](https://github.com/winmt/my-vuls/tree/main/TOTOLINK%20EX300_V2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11919 - **State**: PUBLISHED - **Published Date**: November 27, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 08:24 UTC - **Reserved Date**: June 07, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, there is a potential heap overflow and memory corruption due to improper error handling in SOC infrastructure. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://source.codeaurora.org/quic/qsdk/oss/kernel/linux-msm/commit/?id=456a408d62cef797107e3b0de7d05bb211742bbd) 2. [](https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=085e7272b4c5a41b1ab26c683591864aefab14fe) 3. [](https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=87925782e640efb493f21bf0e255b6a638eea334) 4. [](https://www.codeaurora.org/security-bulletin/2018/11/05/november-2018-code-aurora-forum-security-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4665 - **State**: PUBLISHED - **Published Date**: May 15, 2025 at 20:09 UTC - **Last Updated**: May 16, 2025 at 15:15 UTC - **Reserved Date**: May 08, 2024 at 21:49 UTC - **Assigned By**: WPScan ### Vulnerability Description The EventPrime WordPress plugin before 3.5.0 does not properly validate permissions when updating bookings, allowing users to change/cancel bookings for other users. Additionally, the feature is lacking a nonce. ### Weakness Classification (CWE) - CWE-284 Improper Access Control: Security Weakness ### Affected Products **Unknown - EventPrime** Affected versions: - 3.4.9 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/50b78cac-cad1-4526-9655-ae0440739796/) ### Credits - caon - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0747, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0747 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0747 - **State**: PUBLISHED - **Published Date**: January 13, 2013 at 20:00 UTC - **Last Updated**: August 06, 2024 at 14:33 UTC - **Reserved Date**: January 02, 2013 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2013:0048](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=733305) 3. [](http://www.mozilla.org/security/announce/2013/mfsa2013-10.html) 4. [openSUSE-SU-2013:0131](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html) 5. [USN-1681-4](http://www.ubuntu.com/usn/USN-1681-4) 6. [oval:org.mitre.oval:def:16866](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16866) 7. [SUSE-SU-2013:0049](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html) 8. [USN-1681-1](http://www.ubuntu.com/usn/USN-1681-1) 9. [openSUSE-SU-2013:0149](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html) 10. [USN-1681-2](http://www.ubuntu.com/usn/USN-1681-2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1274 - **State**: PUBLISHED - **Published Date**: September 11, 2019 at 21:25 UTC - **Last Updated**: August 04, 2024 at 18:13 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. ### Affected Products **Microsoft - Windows** Affected versions: - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 10 Version 1703 for 32-bit Systems (Status: affected) - 10 Version 1703 for x64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1274)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1705 - **State**: PUBLISHED - **Published Date**: March 28, 2025 at 08:23 UTC - **Last Updated**: March 28, 2025 at 13:55 UTC - **Reserved Date**: February 25, 2025 at 23:40 UTC - **Assigned By**: Wordfence ### Vulnerability Description The tagDiv Composer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation within the td_ajax_get_views AJAX action. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **tagDiv - tagDiv Composer** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaa8c34-cf7b-4630-adc8-cbb534deff89?source=cve) 2. [](https://tagdiv.com/tagdiv-composer-page-builder-basics/) 3. [](https://themeforest.net/item/newspaper/5489609) 4. [](https://tagdiv.com/newspaper-changelog/) ### Credits - Truoc Phan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42912, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42912 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42912 - **State**: PUBLISHED - **Published Date**: December 16, 2021 at 16:54 UTC - **Last Updated**: August 04, 2024 at 03:47 UTC - **Reserved Date**: October 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command injection vulnerability. This vulnerability allows the attacker, once logged in, to send commands to the operating system as the root user via the ping diagnostic tool, bypassing the IP address field, and concatenating OS commands with a semicolon. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://fiberhome.com) 2. [](http://onu.com) 3. [](https://medium.com/%40windsormoreira/fiberhome-an5506-os-command-injection-cve-2021-42912-10b64fd10ce2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5627, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5627 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5627 - **State**: PUBLISHED - **Published Date**: October 01, 2013 at 17:00 UTC - **Last Updated**: August 06, 2024 at 21:14 UTC - **Reserved Date**: October 24, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20121203 MySQL Local/Remote FAST Account Password Cracking](http://seclists.org/fulldisclosure/2012/Dec/58) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=883719) 3. [20121205 Re: MySQL Local/Remote FAST Account Password Cracking](http://seclists.org/fulldisclosure/2012/Dec/83) 4. [[oss-security] 20121206 Re: CVE request: Mysql/Mariadb insecure salt-usage](http://seclists.org/oss-sec/2012/q4/424) 5. [MDVSA-2013:102](http://www.mandriva.com/security/advisories?name=MDVSA-2013:102) 6. [53372](http://secunia.com/advisories/53372) 7. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml) 8. [](https://mariadb.atlassian.net/browse/MDEV-3915)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4314 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:11 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7. ### Affected Products **n/a - iOS, tvOS, Safari, iTunes for Windows, iCloud for Windows** Affected versions: - Versions prior to: iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT209141) 2. [](https://support.apple.com/kb/HT209140) 3. [](https://support.apple.com/kb/HT209107) 4. [](https://support.apple.com/kb/HT209106) 5. [](https://support.apple.com/kb/HT209109)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31405 - **State**: PUBLISHED - **Published Date**: April 04, 2025 at 13:26 UTC - **Last Updated**: April 04, 2025 at 13:41 UTC - **Reserved Date**: March 28, 2025 at 10:59 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zankover Fami WooCommerce Compare allows PHP Local File Inclusion.This issue affects Fami WooCommerce Compare: from n/a through 1.0.5. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **zankover - Fami WooCommerce Compare** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/fami-woocommerce-compare/vulnerability/wordpress-fami-woocommerce-compare-plugin-1-0-5-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - Dimas Maulana (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30575 - **State**: PUBLISHED - **Published Date**: June 07, 2023 at 08:06 UTC - **Last Updated**: October 10, 2024 at 14:39 UTC - **Reserved Date**: April 12, 2023 at 20:53 UTC - **Assigned By**: apache ### Vulnerability Description Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-131: Security Weakness ### Affected Products **Apache Software Foundation - Apache Guacamole** Affected versions: - 0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv) ### Credits - Stefan Schiller (Sonar)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18246 - **State**: PUBLISHED - **Published Date**: March 23, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 01:56 UTC - **Reserved Date**: March 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The pcm_encode_frame function in libavcodec/pcm.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted media file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.libav.org/show_bug.cgi?id=1095)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22212 - **State**: PUBLISHED - **Published Date**: June 16, 2021 at 17:59 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection in 74cms 3.2.0 via the id parameter to wap/wap-company-show.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/blindkey/cve_like/issues/14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2276 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 09, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3348, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3348 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3348 - **State**: PUBLISHED - **Published Date**: September 24, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 06:22 UTC - **Reserved Date**: September 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Datavore Gyro 5.0 allows remote attackers to inject arbitrary web script or HTML via the cid parameter in a cat action to the home component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [gyro-cid-xss(53195)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53195) 2. [9640](http://www.exploit-db.com/exploits/9640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7316, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7316 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7316 - **State**: PUBLISHED - **Published Date**: July 04, 2017 at 02:00 UTC - **Last Updated**: August 05, 2024 at 15:56 UTC - **Reserved Date**: March 29, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Humax Digital HG100R 2.0.6 devices. There is XSS on the 404 page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://seclists.org/fulldisclosure/2017/Jun/45)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6228 - **State**: PUBLISHED - **Published Date**: February 20, 2009 at 23:00 UTC - **Last Updated**: August 07, 2024 at 11:20 UTC - **Reserved Date**: February 20, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pre Multi-Vendor Shopping Malls allows remote attackers to bypass authentication and gain administrative access by setting the (1) adminname and the (2) adminid cookies to "admin". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-3018](http://www.vupen.com/english/advisories/2008/3018) 2. [pmvsm-cookie-authentication-bypass(46388)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46388) 3. [6999](https://www.exploit-db.com/exploits/6999)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3234 - **State**: PUBLISHED - **Published Date**: June 03, 2020 at 17:55 UTC - **Last Updated**: November 15, 2024 at 17:11 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the virtual console authentication of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated but low-privileged, local attacker to log in to the Virtual Device Server (VDS) of an affected device by using a set of default credentials. The vulnerability is due to the presence of weak, hard-coded credentials. An attacker could exploit this vulnerability by authenticating to the targeted device and then connecting to VDS through the device’s virtual console by using the static credentials. A successful exploit could allow the attacker to access the Linux shell of VDS as the root user. ### Weakness Classification (CWE) - CWE-798: Cross-site Scripting (XSS) ### Affected Products **Cisco - Cisco IOS 12.2(60)EZ16** Affected versions: - n/a (Status: affected) ### References 1. [20200603 Cisco IOS Software for Cisco Industrial Routers Virtual Device Server Static Credentials Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cred-uPMp9zbY)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29205 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 22:25 UTC - **Last Updated**: April 22, 2025 at 17:58 UTC - **Reserved Date**: April 13, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-908: Security Weakness - CWE-476: NULL Pointer Dereference ### Affected Products **tensorflow - tensorflow** Affected versions: - < 2.6.4 (Status: affected) - >= 2.7.0rc0, < 2.7.2 (Status: affected) - >= 2.8.0rc0, < 2.8.1 (Status: affected) - >= 2.9.0rc0, < 2.9.0 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4) 2. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2) 3. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1) 4. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0) 5. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54ch-gjq5-4976) 6. [](https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9) 7. [](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L296-L320) 8. [](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L480-L482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46052 - **State**: PUBLISHED - **Published Date**: January 07, 2022 at 22:15 UTC - **Last Updated**: August 04, 2024 at 04:54 UTC - **Reserved Date**: January 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::Tuple::validate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/WebAssembly/binaryen/issues/4411)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48875 - **State**: PUBLISHED - **Published Date**: May 30, 2025 at 06:26 UTC - **Last Updated**: May 30, 2025 at 13:32 UTC - **Reserved Date**: May 27, 2025 at 20:14 UTC - **Assigned By**: GitHub_M ### Vulnerability Description FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.181, the system's incorrect validation of last_name and first_name during profile data updates allows for the injection of arbitrary JavaScript code, which will be executed in a flesh-message when the data is deleted, potentially leading to a Cross-Site Scripting (XSS) vulnerability. This issue has been patched in version 1.8.181. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **freescout-help-desk - freescout** Affected versions: - < 1.8.181 (Status: affected) ### References 1. [https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mjjx-rv96-w9hq](https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mjjx-rv96-w9hq) 2. [https://github.com/freescout-help-desk/freescout/commit/508dda16853a39fcb6c2b46ea7b7f442d5f7eda7](https://github.com/freescout-help-desk/freescout/commit/508dda16853a39fcb6c2b46ea7b7f442d5f7eda7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33539, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33539 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33539 - **State**: PUBLISHED - **Published Date**: April 29, 2024 at 05:23 UTC - **Last Updated**: August 08, 2024 at 16:06 UTC - **Reserved Date**: April 24, 2024 at 08:12 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor (Templates, Widgets) allows Stored XSS.This issue affects WPZOOM Addons for Elementor (Templates, Widgets): from n/a through 1.1.35. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WPZOOM - WPZOOM Addons for Elementor (Templates, Widgets)** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Khalid (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4369, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4369 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4369 - **State**: PUBLISHED - **Published Date**: June 07, 2023 at 01:51 UTC - **Last Updated**: December 28, 2024 at 00:53 UTC - **Reserved Date**: June 06, 2023 at 13:11 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Content Injection in versions up to, and including, 18.2. This is due to lacking authorization protections, checks against users editing other's posts, and lacking a security nonce, all on the wpfm_edit_file_title_desc AJAX action. This makes it possible for unauthenticated attackers to edit the content and title of every page on the site. ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N` ### Affected Products **nmedia - Frontend File Manager Plugin** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c434e6b8-0dd5-4ffe-93b1-1af614c08f85?source=cve) 2. [](https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities/) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2554359%40nmedia-user-file-uploader&new=2554359%40nmedia-user-file-uploader&sfp_email=&sfph_mail=) ### Credits - Jerome Bruandet
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0646 - **State**: PUBLISHED - **Published Date**: August 05, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:58 UTC - **Reserved Date**: August 01, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionID=15274) 2. [20030711 Trend Micro ActiveX Multiple Overflows](http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006488.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1375 - **State**: PUBLISHED - **Published Date**: May 26, 2009 at 15:16 UTC - **Last Updated**: August 07, 2024 at 05:13 UTC - **Reserved Date**: April 23, 2009 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The PurpleCircBuffer implementation in Pidgin (formerly Gaim) before 2.5.6 does not properly maintain a certain buffer, which allows remote attackers to cause a denial of service (memory corruption and application crash) via vectors involving the (1) XMPP or (2) Sametime protocol. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2009-5597](https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00075.html) 2. [RHSA-2009:1060](http://www.redhat.com/support/errata/RHSA-2009-1060.html) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=500491) 4. [GLSA-200905-07](http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml) 5. [35067](http://www.securityfocus.com/bid/35067) 6. [FEDORA-2009-5583](https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html) 7. [35329](http://secunia.com/advisories/35329) 8. [USN-781-1](http://www.ubuntu.com/usn/USN-781-1) 9. [54649](http://osvdb.org/54649) 10. [DSA-1805](http://debian.org/security/2009/dsa-1805) 11. [35294](http://secunia.com/advisories/35294) 12. [35188](http://secunia.com/advisories/35188) 13. [oval:org.mitre.oval:def:10829](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10829) 14. [35194](http://secunia.com/advisories/35194) 15. [FEDORA-2009-5552](https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html) 16. [35202](http://secunia.com/advisories/35202) 17. [35215](http://secunia.com/advisories/35215) 18. [ADV-2009-1396](http://www.vupen.com/english/advisories/2009/1396) 19. [](http://www.pidgin.im/news/security/?id=31) 20. [pidgin-purplecircbuffer-dos(50683)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50683) 21. [MDVSA-2009:173](http://www.mandriva.com/security/advisories?name=MDVSA-2009:173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1209 - **State**: PUBLISHED - **Published Date**: June 09, 2020 at 19:43 UTC - **Last Updated**: August 04, 2024 at 06:31 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory, aka 'Windows Network List Service Elevation of Privilege Vulnerability'. ### Affected Products **Microsoft - Windows 10 Version 2004 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 2004 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 2004 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 2004 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1209)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4215, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4215 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4215 - **State**: PUBLISHED - **Published Date**: October 10, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 10:08 UTC - **Reserved Date**: September 24, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Weblog in Mac OS X Server 10.4.11 does not properly check an error condition when a weblog posting access control list is specified for a user that has multiple short names, which might allow attackers to bypass intended access restrictions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31681](http://www.securityfocus.com/bid/31681) 2. [31718](http://www.securityfocus.com/bid/31718) 3. [32222](http://secunia.com/advisories/32222) 4. [macosx-weblog-weak-security(45787)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45787) 5. [ADV-2008-2780](http://www.vupen.com/english/advisories/2008/2780) 6. [1021030](http://www.securitytracker.com/id?1021030) 7. [APPLE-SA-2008-10-09](http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html) 8. [](http://support.apple.com/kb/HT3216)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31504, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31504 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31504 - **State**: PUBLISHED - **Published Date**: July 08, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 01:52 UTC - **Reserved Date**: April 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer Overflow vulnerability in SILA Embedded Solutions GmbH freemodbus v.2018-09-12 allows a remtoe attacker to cause a denial of service via the LINUXTCP server component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/CAPCOMIN/a0361511068dce21a557cf9fa01d0a02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41797 - **State**: REJECTED - **Published Date**: October 12, 2021 at 16:49 UTC - **Last Updated**: October 12, 2021 at 16:49 UTC - **Reserved Date**: September 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2980 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 06:31 UTC - **Last Updated**: March 31, 2025 at 12:48 UTC - **Reserved Date**: March 30, 2025 at 07:58 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in Legrand SMS PowerView 1.x. This vulnerability affects unknown code. The manipulation of the argument redirect leads to open redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **Legrand - SMS PowerView** Affected versions: - 1.x (Status: affected) ### References 1. [VDB-302032 | Legrand SMS PowerView redirect](https://vuldb.com/?id.302032) 2. [VDB-302032 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.302032) 3. [Submit #523212 | Legrand SMS Power View 1.x.x OS Command Injection](https://vuldb.com/?submit.523212) ### Credits - Fr1t0 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32548, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32548 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32548 - **State**: PUBLISHED - **Published Date**: June 13, 2023 at 00:00 UTC - **Last Updated**: January 03, 2025 at 19:23 UTC - **Reserved Date**: May 11, 2023 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description OS command injection vulnerability exists in WPS Office version 10.8.0.6186. If a remote attacker who can conduct a man-in-the-middle attack connects the product to a malicious server and sends a specially crafted data, an arbitrary OS command may be executed on the system where the product is installed. ### Affected Products **KINGSOFT JAPAN, INC. - WPS Office** Affected versions: - version 10.8.0.6186 (Status: affected) ### References 1. [](https://support.kingsoft.jp/about/20230605.html) 2. [](https://jvn.jp/en/jp/JVN36060509/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49804 - **State**: PUBLISHED - **Published Date**: May 01, 2025 at 14:09 UTC - **Last Updated**: May 04, 2025 at 08:45 UTC - **Reserved Date**: May 01, 2025 at 14:05 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: s390: avoid using global register for current_stack_pointer Commit 30de14b1884b ("s390: current_stack_pointer shouldn't be a function") made current_stack_pointer a global register variable like on many other architectures. Unfortunately on s390 it uncovers old gcc bug which is fixed only since gcc-9.1 [gcc commit 3ad7fed1cc87 ("S/390: Fix PR89775. Stackpointer save/restore instructions removed")] and backported to gcc-8.4 and later. Due to this bug gcc versions prior to 8.4 generate broken code which leads to stack corruptions. Current minimal gcc version required to build the kernel is declared as 5.1. It is not possible to fix all old gcc versions, so work around this problem by avoiding using global register variable for current_stack_pointer. ### Affected Products **Linux - Linux** Affected versions: - 30de14b1884ba609fc1acfba5b40309e3a6ccefe (Status: affected) - 30de14b1884ba609fc1acfba5b40309e3a6ccefe (Status: affected) **Linux - Linux** Affected versions: - 5.18 (Status: affected) - 0 (Status: unaffected) - 6.0.10 (Status: unaffected) - 6.1 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a478952a8ac44e32316dc046a063a7dc34825aa6) 2. [](https://git.kernel.org/stable/c/e3c11025bcd2142a61abe5806b2f86a0e78118df)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11818 - **State**: PUBLISHED - **Published Date**: May 08, 2019 at 15:34 UTC - **Last Updated**: August 04, 2024 at 23:03 UTC - **Reserved Date**: May 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Alkacon OpenCMS v10.5.4 and before is affected by stored cross site scripting (XSS) in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp). This allows an attacker to insert arbitrary JavaScript as user input (First Name or Last Name), which will be executed whenever the affected snippet is loaded. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/alkacon/opencms-core/issues/635) 2. [](https://www.openwall.com/lists/oss-security/2019/04/30/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17064 - **State**: PUBLISHED - **Published Date**: September 15, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 10:39 UTC - **Reserved Date**: September 15, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/sylogapply route. This could lead to command injection via the syslogIp parameter after /goform/clearlog is invoked. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1491, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1491 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1491 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 16:25 UTC - **Last Updated**: November 15, 2024 at 16:28 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco&nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying file system of the device. This vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the file system and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the file system of the underlying operating system.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. ### Affected Products **Cisco - Cisco Catalyst SD-WAN Manager** Affected versions: - 20.1.12 (Status: affected) - 19.2.1 (Status: affected) - 18.4.4 (Status: affected) - 18.4.5 (Status: affected) - 20.1.1.1 (Status: affected) - 20.1.1 (Status: affected) - 19.3.0 (Status: affected) - 19.2.2 (Status: affected) - 19.2.099 (Status: affected) - 18.3.6 (Status: affected) - 18.3.7 (Status: affected) - 19.2.0 (Status: affected) - 18.3.8 (Status: affected) - 19.0.0 (Status: affected) - 19.1.0 (Status: affected) - 18.4.302 (Status: affected) - 18.4.303 (Status: affected) - 19.2.097 (Status: affected) - 19.2.098 (Status: affected) - 17.2.10 (Status: affected) - 18.3.6.1 (Status: affected) - 19.0.1a (Status: affected) - 18.2.0 (Status: affected) - 18.4.3 (Status: affected) - 18.4.1 (Status: affected) - 17.2.8 (Status: affected) - 18.3.3.1 (Status: affected) - 18.4.0 (Status: affected) - 18.3.1 (Status: affected) - 17.2.6 (Status: affected) - 17.2.9 (Status: affected) - 18.3.4 (Status: affected) - 17.2.5 (Status: affected) - 18.3.1.1 (Status: affected) - 18.3.5 (Status: affected) - 18.4.0.1 (Status: affected) - 18.3.3 (Status: affected) - 17.2.7 (Status: affected) - 17.2.4 (Status: affected) - 18.3.0 (Status: affected) - 19.2.3 (Status: affected) - 18.4.501_ES (Status: affected) - 20.3.1 (Status: affected) - 20.1.2 (Status: affected) - 19.2.929 (Status: affected) - 19.2.31 (Status: affected) - 20.3.2 (Status: affected) - 19.2.32 (Status: affected) - 20.3.2_925 (Status: affected) - 20.3.2.1 (Status: affected) - 20.3.2.1_927 (Status: affected) - 18.4.6 (Status: affected) - 20.1.2_937 (Status: affected) - 20.4.1 (Status: affected) - 20.3.2_928 (Status: affected) - 20.3.2_929 (Status: affected) - 20.4.1.0.1 (Status: affected) - 20.3.2.1_930 (Status: affected) - 19.2.4 (Status: affected) - 20.4.1.1 (Status: affected) - 20.3.3 (Status: affected) - 19.2.4.0.1 (Status: affected) - 20.3.2_937 (Status: affected) ### References 1. [cisco-sa-vmanage-info-disclos-gGvm9Mfu](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2048, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2048 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2048 - **State**: PUBLISHED - **Published Date**: September 12, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:17 UTC - **Reserved Date**: April 02, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Unspecified vulnerability in Adobe ColdFusion 10 and earlier allows attackers to cause a denial of service via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50523](http://secunia.com/advisories/50523) 2. [85317](http://osvdb.org/85317) 3. [1027516](http://www.securitytracker.com/id?1027516) 4. [coldfusion-unspecified-dos(78410)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78410) 5. [](http://www.adobe.com/support/security/bulletins/apsb12-21.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2445 - **State**: PUBLISHED - **Published Date**: May 16, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 13:42 UTC - **Reserved Date**: May 02, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [OpenPKG-SA-2007.013](http://openpkg.com/go/OpenPKG-SA-2007.013) 2. [](http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm) 3. [SSA:2007-136-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650) 4. [25571](http://secunia.com/advisories/25571) 5. [oval:org.mitre.oval:def:10094](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094) 6. [VU#684664](http://www.kb.cert.org/vuls/id/684664) 7. [DSA-1613](http://www.debian.org/security/2008/dsa-1613) 8. [102987](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1) 9. [200871](http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1) 10. [34388](http://secunia.com/advisories/34388) 11. [36196](http://osvdb.org/36196) 12. [GLSA-200705-24](http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml) 13. [25273](http://secunia.com/advisories/25273) 14. [](http://www.coresecurity.com/?action=item&id=2148) 15. [](http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt) 16. [24023](http://www.securityfocus.com/bid/24023) 17. [libpng-trns-chunk-dos(34340)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34340) 18. [ADV-2008-0924](http://www.vupen.com/english/advisories/2008/0924/references) 19. [](http://irrlicht.sourceforge.net/changes.txt) 20. [25867](http://secunia.com/advisories/25867) 21. [](http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624) 22. [31168](http://secunia.com/advisories/31168) 23. [](https://issues.rpath.com/browse/RPL-1381) 24. [25329](http://secunia.com/advisories/25329) 25. [25461](http://secunia.com/advisories/25461) 26. [ADV-2007-1838](http://www.vupen.com/english/advisories/2007/1838) 27. [29420](http://secunia.com/advisories/29420) 28. [ADV-2007-2385](http://www.vupen.com/english/advisories/2007/2385) 29. [](http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624) 30. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html) 31. [25353](http://secunia.com/advisories/25353) 32. [](http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html) 33. [20070517 FLEA-2007-0018-1: libpng](http://www.securityfocus.com/archive/1/468910/100/0/threaded) 34. [30161](http://secunia.com/advisories/30161) 35. [GLSA-200805-07](http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml) 36. [25554](http://secunia.com/advisories/25554) 37. [25268](http://secunia.com/advisories/25268) 38. [DSA-1750](http://www.debian.org/security/2009/dsa-1750) 39. [1018078](http://www.securitytracker.com/id?1018078) 40. [2007-0019](http://www.trustix.org/errata/2007/0019/) 41. [SUSE-SR:2007:013](http://www.novell.com/linux/security/advisories/2007_13_sr.html) 42. [USN-472-1](http://www.ubuntu.com/usn/usn-472-1) 43. [27056](http://secunia.com/advisories/27056) 44. [RHSA-2007:0356](http://www.redhat.com/support/errata/RHSA-2007-0356.html) 45. [25292](http://secunia.com/advisories/25292) 46. [](http://docs.info.apple.com/article.html?artnum=307562) 47. [25787](http://secunia.com/advisories/25787) 48. [25742](http://secunia.com/advisories/25742) 49. [MDKSA-2007:116](http://www.mandriva.com/security/advisories?name=MDKSA-2007:116) 50. [24000](http://www.securityfocus.com/bid/24000) 51. [20080304 CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK](http://www.securityfocus.com/archive/1/489135/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51066 - **State**: PUBLISHED - **Published Date**: January 13, 2024 at 00:00 UTC - **Last Updated**: June 06, 2025 at 20:06 UTC - **Reserved Date**: December 18, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An authenticated remote code execution vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows attackers to arbitrarily execute commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7128 - **State**: PUBLISHED - **Published Date**: December 17, 2013 at 11:00 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: December 17, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Valve Bug Reporter in the valve-bugreporter package 2.10+bsos1 in Valve SteamOS Beta stores cleartext credentials in a .valve-bugreporter.cfg file upon a Remember Credentials action, which allows local users to obtain sensitive information by reading this file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ValveSoftware/SteamOS/issues/19)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15161 - **State**: PUBLISHED - **Published Date**: September 24, 2020 at 22:10 UTC - **Last Updated**: August 04, 2024 at 13:08 UTC - **Reserved Date**: June 25, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In PrestaShop from version 1.6.0.4 and before version 1.7.6.8 an attacker is able to inject javascript while using the contact form. The problem is fixed in 1.7.6.8 ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PrestaShop - PrestaShop** Affected versions: - > 1.6.0.4, < 1.7.6.8 (Status: affected) ### References 1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-5cp2-r794-w37w) 2. [](https://github.com/PrestaShop/PrestaShop/commit/562a231fec18a928e4a601860416fe11af274672) 3. [](https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.6.8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10699 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 11:06 UTC - **Reserved Date**: March 20, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **Datera, Inc - targetcli** Affected versions: - Fixed in targetcli-fb 2.1.52 (Status: affected) ### References 1. [GLSA-202008-22](https://security.gentoo.org/glsa/202008-22) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699) 3. [](https://github.com/open-iscsi/targetcli-fb/issues/162)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35226 - **State**: PUBLISHED - **Published Date**: October 11, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 09:29 UTC - **Reserved Date**: July 05, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP Data Services Management allows an attacker to copy the data from a request and echoed into the application's immediate response, it will lead to a Cross-Site Scripting vulnerability. The attacker would have to log in to the management console to perform such as an attack, only few of the pages are vulnerable in the DS management console. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SAP SE - SAP Data Services Management Console** Affected versions: - 4.2 (Status: affected) - 4.3 (Status: affected) ### References 1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) 2. [](https://launchpad.support.sap.com/#/notes/3167342)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3692 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 13:31 UTC - **Last Updated**: April 16, 2025 at 13:53 UTC - **Reserved Date**: April 16, 2025 at 01:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /oews/classes/Master.php?f=save_product. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **SourceCodester - Online Eyewear Shop** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-304981 | SourceCodester Online Eyewear Shop Master.php cross site scripting](https://vuldb.com/?id.304981) 2. [VDB-304981 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.304981) 3. [Submit #553520 | sourcecodester Online optical shop website v1.0 Stored XSS](https://vuldb.com/?submit.553520) 4. [](https://github.com/vulnofound/cve/blob/main/xss.md) 5. [](https://www.sourcecodester.com/) ### Credits - vulnofound (VulDB User) - vulnofound (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48716 - **State**: PUBLISHED - **Published Date**: June 20, 2024 at 11:13 UTC - **Last Updated**: May 04, 2025 at 08:21 UTC - **Reserved Date**: June 20, 2024 at 11:09 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd938x: fix incorrect used of portid Mixer controls have the channel id in mixer->reg, which is not same as port id. port id should be derived from chan_info array. So fix this. Without this, its possible that we could corrupt struct wcd938x_sdw_priv by accessing port_map array out of range with channel id instead of port id. ### Affected Products **Linux - Linux** Affected versions: - e8ba1e05bdc016700c85fad559a812c2e795442f (Status: affected) - e8ba1e05bdc016700c85fad559a812c2e795442f (Status: affected) - e8ba1e05bdc016700c85fad559a812c2e795442f (Status: affected) **Linux - Linux** Affected versions: - 5.14 (Status: affected) - 0 (Status: unaffected) - 5.15.22 (Status: unaffected) - 5.16.8 (Status: unaffected) - 5.17 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f) 2. [](https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95) 3. [](https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50017 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 18:54 UTC - **Last Updated**: May 04, 2025 at 09:43 UTC - **Reserved Date**: October 21, 2024 at 12:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: x86/mm/ident_map: Use gbpages only where full GB page should be mapped. When ident_pud_init() uses only GB pages to create identity maps, large ranges of addresses not actually requested can be included in the resulting table; a 4K request will map a full GB. This can include a lot of extra address space past that requested, including areas marked reserved by the BIOS. That allows processor speculation into reserved regions, that on UV systems can cause system halts. Only use GB pages when map creation requests include the full GB page of space. Fall back to using smaller 2M pages when only portions of a GB page are included in the request. No attempt is made to coalesce mapping requests. If a request requires a map entry at the 2M (pmd) level, subsequent mapping requests within the same 1G region will also be at the pmd level, even if adjacent or overlapping such requests could have been combined to map a full GB page. Existing usage starts with larger regions and then adds smaller regions, so this should not have any great consequence. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.6.78 (Status: unaffected) - 6.10.14 (Status: unaffected) - 6.11.3 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/d113f9723f2bfd9c6feeb899b8ddbee6b8a6e01f) 2. [](https://git.kernel.org/stable/c/d80a99892f7a992d103138fa4636b2c33abd6740) 3. [](https://git.kernel.org/stable/c/a23823098ab2c277c14fc110b97d8d5c83597195) 4. [](https://git.kernel.org/stable/c/cc31744a294584a36bf764a0ffa3255a8e69f036)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12737 - **State**: PUBLISHED - **Published Date**: October 02, 2019 at 18:47 UTC - **Last Updated**: August 04, 2024 at 23:32 UTC - **Reserved Date**: June 05, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description UserHashedTableAuth in JetBrains Ktor framework before 1.2.0-rc uses a One-Way Hash with a Predictable Salt for storing user credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5380 - **State**: PUBLISHED - **Published Date**: October 19, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 15:31 UTC - **Reserved Date**: October 11, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27965](http://secunia.com/advisories/27965) 2. [ADV-2007-4238](http://www.vupen.com/english/advisories/2007/4238) 3. [ADV-2007-3508](http://www.vupen.com/english/advisories/2007/3508) 4. [TA07-352A](http://www.us-cert.gov/cas/techalerts/TA07-352A.html) 5. [28136](http://secunia.com/advisories/28136) 6. [26096](http://www.securityfocus.com/bid/26096) 7. [GLSA-200711-17](http://security.gentoo.org/glsa/glsa-200711-17.xml) 8. [](http://bugs.gentoo.org/show_bug.cgi?id=195315) 9. [SUSE-SR:2007:025](http://www.novell.com/linux/security/advisories/2007_25_sr.html) 10. [](http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release) 11. [APPLE-SA-2007-12-17](http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html) 12. [](http://docs.info.apple.com/article.html?artnum=307179) 13. [27657](http://secunia.com/advisories/27657)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0075 - **State**: PUBLISHED - **Published Date**: January 18, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 18:16 UTC - **Reserved Date**: December 12, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-1397-1](http://www.ubuntu.com/usn/USN-1397-1) 2. [78374](http://osvdb.org/78374) 3. [mysql-server-cve20120075(72539)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72539) 4. [53372](http://secunia.com/advisories/53372) 5. [51526](http://www.securityfocus.com/bid/51526) 6. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml) 7. [48250](http://secunia.com/advisories/48250) 8. [SUSE-SU-2012:0984](http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html) 9. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html) 10. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687) 11. [DSA-2429](http://www.debian.org/security/2012/dsa-2429)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1546, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1546 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1546 - **State**: PUBLISHED - **Published Date**: July 06, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 01:06 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM API Connect 5.0.0.0 through 5.0.8.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 142650. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **IBM - API Connect** Affected versions: - 5.0.1.0 (Status: affected) - 5.0.0.0 (Status: affected) - 5.0.2.0 (Status: affected) - 5.0.5.0 (Status: affected) - 5.0.6.0 (Status: affected) - 5.0.6.1 (Status: affected) - 5.0.6.2 (Status: affected) - 5.0.7.0 (Status: affected) - 5.0.7.1 (Status: affected) - 5.0.3.0 (Status: affected) - 5.0.4.0 (Status: affected) - 5.0.7.2 (Status: affected) - 5.0.6.3 (Status: affected) - 5.0.6.4 (Status: affected) - 5.0.8.0 (Status: affected) - 5.0.8.1 (Status: affected) - 5.0.6.5 (Status: affected) - 5.0.6.6 (Status: affected) - 5.0.8.2 (Status: affected) - 5.0.8.3 (Status: affected) ### References 1. [ibm-api-cve20181546-info-disc(142650)](https://exchange.xforce.ibmcloud.com/vulnerabilities/142650) 2. [](https://www.ibm.com/support/pages/node/715299)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0478 - **State**: PUBLISHED - **Published Date**: January 25, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:19 UTC - **Reserved Date**: January 24, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WebCore on Apple Mac OS X 10.3.9 and 10.4.10, as used in Safari, does not properly parse HTML comments in TITLE elements, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within an HTML comment. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-2732](http://www.vupen.com/english/advisories/2007/2732) 2. [23893](http://secunia.com/advisories/23893) 3. [20070123 Safari Improperly Parses HTML Documents & BlogSpot XSS vulnerability](http://www.securityfocus.com/archive/1/457763/100/0/threaded) 4. [APPLE-SA-2007-07-31](http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html) 5. [32712](http://osvdb.org/32712) 6. [1018494](http://securitytracker.com/id?1018494) 7. [](http://www.beanfuzz.com/wordpress/?p=99) 8. [](http://docs.info.apple.com/article.html?artnum=306172) 9. [25159](http://www.securityfocus.com/bid/25159) 10. [safari-html-comment-xss(31846)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31846) 11. [26235](http://secunia.com/advisories/26235)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4157 - **State**: PUBLISHED - **Published Date**: May 01, 2025 at 08:31 UTC - **Last Updated**: May 01, 2025 at 15:43 UTC - **Reserved Date**: April 30, 2025 at 18:26 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/booking-details.php. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Boat Booking System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-306689 | PHPGurukul Boat Booking System booking-details.php sql injection](https://vuldb.com/?id.306689) 2. [VDB-306689 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306689) 3. [Submit #560863 | PHPGurukul Boat Booking System V1.0 SQL Injection](https://vuldb.com/?submit.560863) 4. [](https://github.com/Iandweb/CVE/issues/9) 5. [](https://phpgurukul.com/) ### Credits - Quest (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4426, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4426 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4426 - **State**: PUBLISHED - **Published Date**: December 13, 2019 at 15:50 UTC - **Last Updated**: September 16, 2024 at 16:43 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The Case Builder component shipped with 18.0.0.1 through 19.0.0.2 and IBM Case Manager 5.1.1 through 5.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 162772. ### Affected Products **IBM - Business Automation Workflow** Affected versions: - 18.0.0.1 (Status: affected) - 19.0.0.2 (Status: affected) **IBM - Case Manager** Affected versions: - 5.1.1 (Status: affected) - 5.2.1 (Status: affected) - 5.2.0 (Status: affected) - 5.3CD (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/1116087) 2. [](https://www.ibm.com/support/pages/node/1135552) 3. [ibm-baw-cve20194426-xss (162772)](https://exchange.xforce.ibmcloud.com/vulnerabilities/162772)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20284 - **State**: PUBLISHED - **Published Date**: March 26, 2021 at 16:39 UTC - **Last Updated**: August 03, 2024 at 17:37 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - binutils** Affected versions: - Binutils 2.35.1 (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=26931) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1937784) 3. [](https://security.netapp.com/advisory/ntap-20210521-0010/) 4. [GLSA-202208-30](https://security.gentoo.org/glsa/202208-30)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5518 - **State**: PUBLISHED - **Published Date**: October 26, 2006 at 16:00 UTC - **Last Updated**: August 07, 2024 at 19:55 UTC - **Reserved Date**: October 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in Christopher Fowler (Rhode Island) RSSonate allow remote attackers to execute arbitrary PHP code via a URL in the PROJECT_ROOT parameter to (1) xml2rss.php, (2) config_local.php, (3) rssonate.php, and (4) sql2xml.php in Src/getFeed/inc/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2605](https://www.exploit-db.com/exploits/2605) 2. [ADV-2006-4146](http://www.vupen.com/english/advisories/2006/4146) 3. [20654](http://www.securityfocus.com/bid/20654) 4. [22496](http://secunia.com/advisories/22496) 5. [29935](http://www.osvdb.org/29935) 6. [29937](http://www.osvdb.org/29937) 7. [29938](http://www.osvdb.org/29938) 8. [29936](http://www.osvdb.org/29936) 9. [rssonate-project-file-include(29703)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29703)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1037 - **State**: PUBLISHED - **Published Date**: February 07, 2024 at 06:46 UTC - **Last Updated**: August 01, 2024 at 18:26 UTC - **Reserved Date**: January 29, 2024 at 15:22 UTC - **Assigned By**: Wordfence ### Vulnerability Description The All-In-One Security (AIOS) – Security and Firewall plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 5.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **davidanderson - All-In-One Security (AIOS) – Security and Firewall** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b50772e5-5142-4f50-b5c0-6116a8821cba?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/all-in-one-wp-security-and-firewall/trunk/admin/wp-security-list-404.php#L32) 3. [](https://plugins.trac.wordpress.org/browser/all-in-one-wp-security-and-firewall/trunk/admin/wp-security-list-404.php#L50) 4. [](https://plugins.trac.wordpress.org/changeset/3032127/all-in-one-wp-security-and-firewall/tags/5.2.6/admin/wp-security-list-404.php) ### Credits - Matthew Rollings
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25117, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25117 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25117 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 16:25 UTC - **Last Updated**: August 28, 2024 at 17:57 UTC - **Reserved Date**: February 05, 2024 at 14:14 UTC - **Assigned By**: GitHub_M ### Vulnerability Description php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-73: Security Weakness - CWE-502: Deserialization of Untrusted Data ### Affected Products **dompdf - php-svg-lib** Affected versions: - < 0.5.2 (Status: affected) ### References 1. [https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273](https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273) 2. [https://github.com/dompdf/php-svg-lib/commit/732faa9fb4309221e2bd9b2fda5de44f947133aa](https://github.com/dompdf/php-svg-lib/commit/732faa9fb4309221e2bd9b2fda5de44f947133aa) 3. [https://github.com/dompdf/php-svg-lib/commit/8ffcc41bbde39f09f94b9760768086f12bbdce42](https://github.com/dompdf/php-svg-lib/commit/8ffcc41bbde39f09f94b9760768086f12bbdce42)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2410, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2410 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2410 - **State**: PUBLISHED - **Published Date**: August 18, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: August 18, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in sh_hash_compdata for Samhain 1.8.9 through 2.0.1 might allow attackers to cause a denial of service (null pointer dereference). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [11594](http://www.osvdb.org/11594) 2. [1012142](http://securitytracker.com/id?1012142)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20927 - **State**: PUBLISHED - **Published Date**: November 10, 2022 at 17:30 UTC - **Last Updated**: August 03, 2024 at 02:31 UTC - **Reserved Date**: November 02, 2021 at 13:28 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **Cisco - Cisco Adaptive Security Appliance (ASA) Software** Affected versions: - 9.14.1 (Status: affected) - 9.14.1.10 (Status: affected) - 9.14.1.15 (Status: affected) - 9.14.1.19 (Status: affected) - 9.14.1.30 (Status: affected) - 9.14.2 (Status: affected) - 9.14.2.4 (Status: affected) - 9.14.2.8 (Status: affected) - 9.14.2.13 (Status: affected) - 9.14.2.15 (Status: affected) - 9.14.3 (Status: affected) - 9.14.3.1 (Status: affected) - 9.14.3.9 (Status: affected) - 9.14.3.11 (Status: affected) - 9.14.3.13 (Status: affected) - 9.14.3.18 (Status: affected) - 9.14.3.15 (Status: affected) - 9.15.1 (Status: affected) - 9.15.1.7 (Status: affected) - 9.15.1.10 (Status: affected) - 9.15.1.15 (Status: affected) - 9.15.1.16 (Status: affected) - 9.15.1.17 (Status: affected) - 9.15.1.1 (Status: affected) - 9.15.1.21 (Status: affected) **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - 6.6.0 (Status: affected) - 6.6.0.1 (Status: affected) - 6.6.1 (Status: affected) - 6.6.3 (Status: affected) - 6.6.4 (Status: affected) - 6.6.5 (Status: affected) - 6.6.5.1 (Status: affected) - 6.6.5.2 (Status: affected) - 6.7.0 (Status: affected) - 6.7.0.1 (Status: affected) - 6.7.0.2 (Status: affected) - 6.7.0.3 (Status: affected) **Cisco - Cisco FirePOWER Services Software for ASA** Affected versions: - N/A (Status: affected) ### References 1. [cisco-sa-ssl-client-dos-cCrQPkA](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssl-client-dos-cCrQPkA)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9407 - **State**: PUBLISHED - **Published Date**: October 01, 2024 at 20:13 UTC - **Last Updated**: June 09, 2025 at 06:32 UTC - **Reserved Date**: October 01, 2024 at 10:55 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Unknown - Unknown** Affected versions: - 0 (Status: affected) **Unknown - Unknown** Affected versions: - 0 (Status: affected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 8100020241023085649.afee755d (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 4:4.9.4-16.el9_4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 4:5.2.2-9.el9_5 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 2:1.37.5-1.el9_5 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9.4 Extended Update Support** Affected versions: - 2:1.33.11-1.el9_4 (Status: unaffected) **Red Hat - Red Hat OpenShift Container Platform 4.16** Affected versions: - 416.94.202411201433-0 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 10** **Red Hat - Red Hat Enterprise Linux 10** **Red Hat - Red Hat OpenShift Container Platform 4** **Red Hat - Red Hat OpenShift Container Platform 4** ### References 1. [RHSA-2024:10147](https://access.redhat.com/errata/RHSA-2024:10147) 2. [RHSA-2024:8846](https://access.redhat.com/errata/RHSA-2024:8846) 3. [RHSA-2024:9051](https://access.redhat.com/errata/RHSA-2024:9051) 4. [RHSA-2024:9454](https://access.redhat.com/errata/RHSA-2024:9454) 5. [RHSA-2024:9459](https://access.redhat.com/errata/RHSA-2024:9459) 6. [RHSA-2024:9926](https://access.redhat.com/errata/RHSA-2024:9926) 7. [](https://access.redhat.com/security/cve/CVE-2024-9407) 8. [RHBZ#2315887](https://bugzilla.redhat.com/show_bug.cgi?id=2315887) ### Credits - Red Hat would like to thank Erik Sjölund (Upstream) for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2685 - **State**: PUBLISHED - **Published Date**: July 09, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 02:39 UTC - **Reserved Date**: July 09, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description siteadmin/adduser.php in Customer Paradigm PageDirector CMS does not properly restrict access, which allows remote attackers to bypass intended restrictions and add administrative users via a direct request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [65831](http://www.osvdb.org/65831) 2. [](http://packetstormsecurity.org/1006-exploits/pagedirector-sqladdadmin.txt) 3. [ADV-2010-1633](http://www.vupen.com/english/advisories/2010/1633) 4. [40367](http://secunia.com/advisories/40367) 5. [14089](http://www.exploit-db.com/exploits/14089)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2288 - **State**: PUBLISHED - **Published Date**: July 17, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:22 UTC - **Reserved Date**: July 17, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in PHPCounter 7.2 allows remote attackers to inject arbitrary web script or HTML via the EpochPrefix parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050713 Path Disclosure and XSS problem in PHP Counter 7.2](http://marc.info/?l=bugtraq&m=112129495128834&w=2) 2. [15816](http://secunia.com/advisories/15816) 3. [14256](http://www.securityfocus.com/bid/14256) 4. [1014478](http://securitytracker.com/id?1014478)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36601 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 17:58 UTC - **Last Updated**: August 04, 2024 at 17:30 UTC - **Reserved Date**: August 24, 2022 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot. ### Affected Products **Huawei - EMUI** Affected versions: - 10.1.0 (Status: affected) **Huawei - Magic UI** Affected versions: - 3.1.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/9/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24166 - **State**: PUBLISHED - **Published Date**: January 26, 2023 at 00:00 UTC - **Last Updated**: March 28, 2025 at 16:17 UTC - **Reserved Date**: January 23, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/formWifiBasicSet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9969 - **State**: PUBLISHED - **Published Date**: May 23, 2019 at 17:37 UTC - **Last Updated**: August 06, 2024 at 03:07 UTC - **Reserved Date**: December 16, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In libwebp 0.5.1, there is a double free bug in libwebpmux. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.chromium.org/p/webp/issues/detail?id=322)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5140 - **State**: PUBLISHED - **Published Date**: August 06, 2012 at 16:00 UTC - **Last Updated**: September 17, 2024 at 04:04 UTC - **Reserved Date**: May 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description wxBitcoin and bitcoind before 0.3.13 do not properly handle bitcoins associated with Bitcoin transactions that have zero confirmations, which allows remote attackers to cause a denial of service (invalid-transaction flood) by sending low-valued transactions without transaction fees. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://en.bitcoin.it/wiki/CVEs) 2. [](http://www.bitcoin.org/smf/index.php?topic=1306.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35985, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35985 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35985 - **State**: PUBLISHED - **Published Date**: August 20, 2021 at 18:10 UTC - **Last Updated**: September 16, 2024 at 16:12 UTC - **Reserved Date**: June 30, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Adobe - Acrobat Reader** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb21-51.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0020 - **State**: PUBLISHED - **Published Date**: January 24, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 07, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=671122) 2. [](https://bugzilla.gnome.org/show_bug.cgi?id=639882) 3. [](https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616) 4. [1024994](http://www.securitytracker.com/id?1024994) 5. [pango-pango-bo(64832)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64832) 6. [SUSE-SR:2011:005](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html) 7. [[oss-security] 20110118 CVE request: heap corruption in libpango](http://openwall.com/lists/oss-security/2011/01/18/6) 8. [70596](http://osvdb.org/70596) 9. [43100](http://secunia.com/advisories/43100) 10. [RHSA-2011:0180](http://www.redhat.com/support/errata/RHSA-2011-0180.html) 11. [[oss-security] 20110120 Re: CVE request: heap corruption in libpango](http://openwall.com/lists/oss-security/2011/01/20/2) 12. [ADV-2011-0186](http://www.vupen.com/english/advisories/2011/0186) 13. [42934](http://secunia.com/advisories/42934) 14. [45842](http://www.securityfocus.com/bid/45842) 15. [ADV-2011-0238](http://www.vupen.com/english/advisories/2011/0238)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46492, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46492 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46492 - **State**: PUBLISHED - **Published Date**: April 24, 2025 at 16:08 UTC - **Last Updated**: April 25, 2025 at 13:53 UTC - **Reserved Date**: April 24, 2025 at 14:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Pham Thanh Call Now PHT Blog allows Stored XSS. This issue affects Call Now PHT Blog: from n/a through 2.4.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Pham Thanh - Call Now PHT Blog** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/call-now-coccoc-pht-blog/vulnerability/wordpress-call-now-pht-blog-plugin-2-4-1-csrf-to-xss-vulnerability?_s_id=cve) ### Credits - johska (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21956 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 15:46 UTC - **Last Updated**: May 04, 2025 at 07:25 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Assign normalized_pix_clk when color depth = 14 [WHY & HOW] A warning message "WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397 calculate_phy_pix_clks+0xef/0x100 [amdgpu]" occurs because the display_color_depth == COLOR_DEPTH_141414 is not handled. This is observed in Radeon RX 6600 XT. It is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests. Also fixes the indentation in get_norm_pix_clk. (cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775) ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.4.292 (Status: unaffected) - 5.10.236 (Status: unaffected) - 5.15.180 (Status: unaffected) - 6.1.132 (Status: unaffected) - 6.6.84 (Status: unaffected) - 6.12.20 (Status: unaffected) - 6.13.8 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/cca3ab74f90176099b6392e8e894b52b27b3d080) 2. [](https://git.kernel.org/stable/c/0174a2e5770efee9dbd4b58963ed4d939298ff5e) 3. [](https://git.kernel.org/stable/c/0c0016712e5dc23ce4a7e673cbebc24a535d8c8a) 4. [](https://git.kernel.org/stable/c/dc831b38680c47d07e425871a9852109183895cf) 5. [](https://git.kernel.org/stable/c/a8f77e1658d78e4a8bb227a83bcee67de97f7634) 6. [](https://git.kernel.org/stable/c/04f90b505ad3a6eed474bbaa03167095fef5203a) 7. [](https://git.kernel.org/stable/c/27df30106690969f7d63604f0d49ed8e9bffa2cb) 8. [](https://git.kernel.org/stable/c/79e31396fdd7037c503e6add15af7cb00633ea92)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13959 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:41 UTC - **Reserved Date**: August 30, 2017 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9639 - **State**: PUBLISHED - **Published Date**: June 25, 2020 at 21:03 UTC - **Last Updated**: August 04, 2024 at 10:34 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . ### Affected Products **Adobe - Adobe Illustrator** Affected versions: - 24.1.2 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb20-37.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12264 - **State**: PUBLISHED - **Published Date**: January 07, 2025 at 04:22 UTC - **Last Updated**: January 07, 2025 at 16:20 UTC - **Reserved Date**: December 05, 2024 at 16:53 UTC - **Assigned By**: Wordfence ### Vulnerability Description The PayU CommercePro Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.8.3. This is due to /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost REST API endpoints not properly verifying a user's identity prior to setting the users ID and auth cookies. This makes it possible for unauthenticated attackers to create new administrative user accounts. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **payuplugin - PayU CommercePro Plugin** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bf037e4a-2dd7-4296-b86b-635901d2d68f?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/payu-india/tags/3.8.3/includes/class-payu-shipping-tax-api-calculation.php#L187) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39134 - **State**: PUBLISHED - **Published Date**: June 27, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 04:19 UTC - **Reserved Date**: June 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows attackers to cause a denial of service via the __zzip_fetch_disk_trailer() function at /zzip/zip.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gdraheim/zziplib/issues/165)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23608 - **State**: PUBLISHED - **Published Date**: February 22, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 19:02 UTC - **Reserved Date**: January 19, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **pjsip - pjproject** Affected versions: - <= 2.11.1 (Status: affected) ### References 1. [](https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62) 2. [](https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f) 3. [20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set](http://seclists.org/fulldisclosure/2022/Mar/1) 4. [](http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html) 5. [[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html) 6. [[debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update](https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html) 7. [GLSA-202210-37](https://security.gentoo.org/glsa/202210-37) 8. [[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html) 9. [DSA-5285](https://www.debian.org/security/2022/dsa-5285) 10. [[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update](https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6599 - **State**: PUBLISHED - **Published Date**: December 08, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 08:35 UTC - **Reserved Date**: December 08, 2023 at 00:00 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description Missing Standardized Error Handling Mechanism in GitHub repository microweber/microweber prior to 2.0. ### Weakness Classification (CWE) - CWE-544: Security Weakness ### Affected Products **microweber - microweber/microweber** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e) 2. [](https://github.com/microweber/microweber/commit/f7eb9e1c6e801346f07f3b0164a01ac5f2ca5cfd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7343 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3261, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3261 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3261 - **State**: PUBLISHED - **Published Date**: August 14, 2023 at 03:53 UTC - **Last Updated**: October 09, 2024 at 14:46 UTC - **Reserved Date**: June 15, 2023 at 06:50 UTC - **Assigned By**: trellix ### Vulnerability Description The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier contains a buffer overflow vulnerability in the librta.so.0.0.0 library.Successful exploitation could cause denial of service or unexpected behavior with respect to all interactions relying on the targeted vulnerable binary, including the ability to log in via the web server. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Dataprobe - iBoot PDU** Affected versions: - 1.43.03312023 (Status: affected) ### References 1. [](https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html) ### Credits - Sam Quinn - Douglas McKee
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20644, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20644 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20644 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 02:25 UTC - **Last Updated**: March 04, 2025 at 16:21 UTC - **Reserved Date**: November 01, 2024 at 01:21 UTC - **Assigned By**: MediaTek ### Vulnerability Description In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747. ### Weakness Classification (CWE) - CWE-1286: Security Weakness ### Affected Products **MediaTek, Inc. - MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798** Affected versions: - Modem NR15, NR16 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/March-2025)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2223 - **State**: PUBLISHED - **Published Date**: April 14, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 05:10 UTC - **Reserved Date**: March 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the web-based console management interface in Palo Alto Networks Traps (formerly Cyvera Endpoint Protection) 3.1.2.1546 allow remote attackers to inject arbitrary web script or HTML via the (1) Arguments, (2) FileName, or (3) URL parameter in a SOAP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20150329 CVE-2015-2223: Palo Alto Traps Server Stored XSS](http://www.securityfocus.com/archive/1/535113/100/0/threaded) 2. [](http://packetstormsecurity.com/files/131182/Palo-Alto-Traps-Server-3.1.2.1546-Cross-Site-Scripting.html) 3. [73704](http://www.securityfocus.com/bid/73704) 4. [](https://security.paloaltonetworks.com/CVE-2015-2223)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34697, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34697 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34697 - **State**: PUBLISHED - **Published Date**: September 23, 2021 at 02:25 UTC - **Last Updated**: November 07, 2024 at 21:59 UTC - **Reserved Date**: June 15, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Protection Against Distributed Denial of Service Attacks feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct denial of service (DoS) attacks to or through the affected device. This vulnerability is due to incorrect programming of the half-opened connections limit, TCP SYN flood limit, or TCP SYN cookie features when the features are configured in vulnerable releases of Cisco IOS XE Software. An attacker could exploit this vulnerability by attempting to flood traffic to or through the affected device. A successful exploit could allow the attacker to initiate a DoS attack to or through an affected device. ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-665: Security Weakness ### Affected Products **Cisco - Cisco IOS XE Software** Affected versions: - n/a (Status: affected) ### References 1. [20210922 Cisco IOS XE Software Protection Against Distributed Denial of Service Attacks Feature Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-tguGuYq)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10676 - **State**: PUBLISHED - **Published Date**: July 20, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 17:41 UTC - **Reserved Date**: June 29, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On D-Link DIR-600M devices before C1_v3.05ENB01_beta_20170306, XSS was found in the form2userconfig.cgi username parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://iscouncil.blogspot.com/2017/07/stored-xss-in-d-link-dir-600m-router.html) 2. [](ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-600M/REVC/DIR-600M_REVC_FIRMWARE_PATCH_NOTES_3.05B01_EN.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22679, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22679 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22679 - **State**: PUBLISHED - **Published Date**: February 03, 2025 at 14:23 UTC - **Last Updated**: February 03, 2025 at 15:37 UTC - **Reserved Date**: January 07, 2025 at 21:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Job Board Manager allows Reflected XSS. This issue affects Job Board Manager: from n/a through 2.1.60. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PickPlugins - Job Board Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/job-board-manager/vulnerability/wordpress-job-board-manager-plugin-2-1-60-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - 0xd4rk5id3 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0613 - **State**: PUBLISHED - **Published Date**: October 13, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:21 UTC - **Reserved Date**: July 19, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1457](http://www.osvdb.org/1457) 2. [20000711 Cisco Secure PIX Firewall TCP Reset Vulnerability](http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml) 3. [20000320 PIX DMZ Denial of Service - TCP Resets](http://www.securityfocus.com/templates/archive.pike?list=1&msg=B3D6883199DBD311868100A0C9FC2CDC046B72%40protea.citec.net) 4. [1454](http://www.securityfocus.com/bid/1454) 5. [cisco-pix-firewall-tcp(4928)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4928)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33152 - **State**: REJECTED - **Last Updated**: February 13, 2025 at 16:28 UTC - **Reserved Date**: May 18, 2021 at 00:31 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18391 - **State**: PUBLISHED - **Published Date**: October 19, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: October 16, 2018 at 00:00 UTC - **Assigned By**: Kaspersky ### Vulnerability Description User Privilege Escalation in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1. ### Affected Products **Moxa - ThingsPro IIoT Gateway and Device Management Software Solutions** Affected versions: - 2.1 (Status: affected) ### References 1. [](https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/10/18/klcert-18-019-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-user-privilege-escalation/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0486 - **State**: PUBLISHED - **Published Date**: March 27, 2018 at 16:00 UTC - **Last Updated**: August 06, 2024 at 09:20 UTC - **Reserved Date**: December 19, 2013 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Knot DNS before 1.5.2 allows remote attackers to cause a denial of service (application crash) via a crafted DNS message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.labs.nic.cz/knot/knot-dns/issues/294) 2. [70097](http://www.securityfocus.com/bid/70097) 3. [knotdns-cve20140486-dos(96185)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96185)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27181 - **State**: PUBLISHED - **Published Date**: March 11, 2025 at 20:11 UTC - **Last Updated**: March 11, 2025 at 20:39 UTC - **Reserved Date**: February 19, 2025 at 22:28 UTC - **Assigned By**: adobe ### Vulnerability Description Substance3D - Modeler versions 1.15.0 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Adobe - Substance3D - Modeler** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-21.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21635 - **State**: PUBLISHED - **Published Date**: October 18, 2022 at 00:00 UTC - **Last Updated**: September 24, 2024 at 15:53 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.29 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2022.html) 2. [](https://security.netapp.com/advisory/ntap-20221028-0013/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8519 - **State**: PUBLISHED - **Published Date**: June 15, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 16:41 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to execute arbitrary code in the context of the current user when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8547. ### Affected Products **Microsoft Corporation - Internet Explorer** Affected versions: - Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2. (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8519) 2. [98899](http://www.securityfocus.com/bid/98899)