System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1959
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 06:31 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible memory corruption due to lack of bound check of input index in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8096AU, AQT1000, AR8035, CSR6030, CSRB31024, FSM10055, FSM10056, MDM8207, MDM9150, MDM9206, MDM9207, MDM9230, MDM9250, MDM9330, MDM9607, MDM9628, MDM9630, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, QCA1990, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6694AU, QCA6696, QCA8337, QCA9367, QCA9377, QCA9379, QCM2290, QCM4290, QCM6125, QCM6490, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QCS6490, QCX315, QET4101, QSM8350, QSW8573, Qualcomm215, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 455, SD 636, SD 675, SD 8C, SD 8CX, SD205, SD210, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD6 ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7059
- **State**: PUBLISHED
- **Published Date**: August 06, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 06:17 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
Aruba ClearPass prior to 6.6.9 has a vulnerability in the API that helps to coordinate cluster actions. An authenticated user with the "mon" permission could use this vulnerability to obtain cluster credentials which could allow privilege escalation. This vulnerability is only present when authenticated as a user with "mon" permission.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32880
- **State**: PUBLISHED
- **Published Date**: January 02, 2024 at 02:49 UTC
- **Last Updated**: November 14, 2024 at 19:32 UTC
- **Reserved Date**: May 16, 2023 at 03:04 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In battery, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308076.
### Affected Products
**MediaTek, Inc. - MT6762, MT6765, MT6833, MT6879, MT6883, MT6885, MT6983, MT8167, MT8168, MT8188, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/January-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6167
- **State**: PUBLISHED
- **Published Date**: November 29, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 28, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44158](http://osvdb.org/44158)
2. [26634](http://www.securityfocus.com/bid/26634)
3. [27756](http://secunia.com/advisories/27756)
4. [SUSE-SR:2007:024](http://www.novell.com/linux/security/advisories/2007_24_sr.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2139
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117610049
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7528
- **State**: PUBLISHED
- **Published Date**: August 06, 2024 at 12:38 UTC
- **Last Updated**: August 09, 2024 at 15:10 UTC
- **Reserved Date**: August 05, 2024 at 23:30 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1895951)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-33/)
3. [](https://www.mozilla.org/security/advisories/mfsa2024-35/)
4. [](https://www.mozilla.org/security/advisories/mfsa2024-37/)
### Credits
- Jason Kratzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3007
- **State**: PUBLISHED
- **Published Date**: June 13, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in SHOUTcast 1.9.5 allow remote attackers to inject arbitrary HTML or web script via the DJ fields (1) Description, (2) URL, (3) Genre, (4) AIM, and (5) ICQ.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-2254](http://www.vupen.com/english/advisories/2006/2254)
2. [20524](http://secunia.com/advisories/20524)
3. [GLSA-200607-05](http://www.gentoo.org/security/en/glsa/glsa-200607-05.xml)
4. [21005](http://secunia.com/advisories/21005)
5. [20060608 bug of script injection in shoutcast servers](http://marc.info/?l=bugtraq&m=114980135615062&w=2)
6. [shoutcast-djfields-xss(27129)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27129)
7. [18376](http://www.securityfocus.com/bid/18376) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6804
- **State**: PUBLISHED
- **Published Date**: February 28, 2020 at 22:38 UTC
- **Last Updated**: August 04, 2024 at 09:11 UTC
- **Reserved Date**: January 10, 2020 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A reflected XSS vulnerability exists within the gateway, allowing an attacker to craft a specialized URL which could steal the user's authentication token. When combined with CVE-2020-6803, an attacker could fully compromise the system.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Mozilla - WebThings Gateway**
Affected versions:
- 0.3.0 (Status: affected)
- 0.12.0 (Status: affected)
### References
1. [](https://github.com/mozilla-iot/gateway/pull/2446)
### Credits
- Panagiotis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3818
- **State**: PUBLISHED
- **Published Date**: January 16, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 09:53 UTC
- **Reserved Date**: August 27, 2008 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco ONS 15310-CL, 15310-MA, 15327, 15454, 15454 SDH, and 15600 with software 7.0.2 through 7.0.6, 7.2.2, 8.0.x, 8.5.1, and 8.5.2 allows remote attackers to cause a denial of service (control-card reset) via a crafted TCP session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [cisco-ons-controlcard-dos(47940)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47940)
2. [ADV-2009-0139](http://www.vupen.com/english/advisories/2009/0139)
3. [20090114 Cisco ONS Platform Crafted Packet Vulnerability](http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4fa.shtml)
4. [1021592](http://securitytracker.com/id?1021592)
5. [33261](http://www.securityfocus.com/bid/33261) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30775
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:54 UTC
- **Last Updated**: March 27, 2025 at 18:56 UTC
- **Reserved Date**: March 26, 2025 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AmentoTech Private Limited WPGuppy allows SQL Injection. This issue affects WPGuppy: from n/a through 1.1.3.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**AmentoTech Private Limited - WPGuppy**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpguppy-lite/vulnerability/wordpress-wpguppy-plugin-1-1-3-sql-injection-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2926
- **State**: PUBLISHED
- **Published Date**: January 11, 2017 at 04:40 UTC
- **Last Updated**: August 05, 2024 at 14:09 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**n/a - Adobe Flash Player 24.0.0.186 and earlier.**
Affected versions:
- Adobe Flash Player 24.0.0.186 and earlier. (Status: affected)
### References
1. [GLSA-201702-20](https://security.gentoo.org/glsa/201702-20)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb17-02.html)
3. [RHSA-2017:0057](http://rhn.redhat.com/errata/RHSA-2017-0057.html)
4. [1037570](http://www.securitytracker.com/id/1037570)
5. [95350](http://www.securityfocus.com/bid/95350) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3964
- **State**: PUBLISHED
- **Published Date**: December 01, 2021 at 11:25 UTC
- **Last Updated**: August 03, 2024 at 17:09 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**elgg - elgg/elgg**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a)
2. [](https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7846
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4557
- **State**: PUBLISHED
- **Published Date**: November 30, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT101139](http://marc.info/?l=bugtraq&m=136612293908376&w=2)
2. [DSA-2579](http://www.debian.org/security/2012/dsa-2579)
3. [](http://svn.apache.org/viewvc?view=revision&revision=1227298)
4. [oval:org.mitre.oval:def:18938](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938)
5. [](http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22)
6. [oval:org.mitre.oval:def:19284](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284)
7. [openSUSE-SU-2013:0248](http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=871685)
9. [HPSBUX02866](http://marc.info/?l=bugtraq&m=136612293908376&w=2)
10. [openSUSE-SU-2013:0243](http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html)
11. [[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E)
12. [[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E)
13. [[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E)
14. [[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E)
15. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E)
16. [[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E)
17. [[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E)
18. [[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E)
19. [[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E)
20. [[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E)
21. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E)
22. [[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E)
23. [[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E)
24. [[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5064
- **State**: PUBLISHED
- **Published Date**: July 20, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
### Affected Products
**n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions**
Affected versions:
- Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html)
2. [1041250](http://www.securitytracker.com/id/1041250)
3. [104701](http://www.securityfocus.com/bid/104701)
4. [](https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0475
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 10:30 UTC
- **Last Updated**: March 03, 2025 at 12:07 UTC
- **Reserved Date**: January 14, 2025 at 19:02 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GitLab - GitLab**
Affected versions:
- 15.10 (Status: affected)
- 17.8 (Status: affected)
- 17.9 (Status: affected)
### References
1. [GitLab Issue #513142](https://gitlab.com/gitlab-org/gitlab/-/issues/513142)
2. [HackerOne Bug Bounty Report #2932309](https://hackerone.com/reports/2932309)
### Credits
- Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1437
- **State**: PUBLISHED
- **Published Date**: January 28, 2020 at 14:24 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: January 26, 2013 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.
### Affected Products
**Perl Toolchain Gang - Module-Metadata**
Affected versions:
- before 1.000015 (Status: affected)
### References
1. [](https://metacpan.org/changes/distribution/Module-Metadata)
2. [](http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114904.html)
3. [](http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114912.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0104
- **State**: PUBLISHED
- **Published Date**: February 18, 2019 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 01:56 UTC
- **Reserved Date**: November 13, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient file protection in uninstall routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [107109](http://www.securityfocus.com/bid/107109)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01)
3. [](https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5515
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 13:00 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: May 30, 2024 at 06:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Stock Management System 1.0. It has been classified as critical. Affected is an unknown function of the file createBrand.php. The manipulation of the argument brandName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266586 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Stock Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-266586 | SourceCodester Stock Management System createBrand.php sql injection](https://vuldb.com/?id.266586)
2. [VDB-266586 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.266586)
3. [Submit #345714 | SourceCodester Stock Management System in PHP V1.0 SQL](https://vuldb.com/?submit.345714)
4. [](https://github.com/HaojianWang/cve/issues/1)
### Credits
- Wang Haojian (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54535
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 19:36 UTC
- **Last Updated**: January 23, 2025 at 21:28 UTC
- **Reserved Date**: December 03, 2024 at 22:50 UTC
- **Assigned By**: apple
### Vulnerability Description
A path handling issue was addressed with improved logic. This issue is fixed in watchOS 11.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1. An attacker with access to calendar data could also read reminders.
### Affected Products
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121566)
2. [](https://support.apple.com/en-us/121565)
3. [](https://support.apple.com/en-us/121563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16215
- **State**: PUBLISHED
- **Published Date**: September 18, 2019 at 11:07 UTC
- **Last Updated**: August 05, 2024 at 01:10 UTC
- **Reserved Date**: September 11, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Markdown parser in Zulip server before 2.0.5 used a regular expression vulnerable to exponential backtracking. A user who is logged into the server could send a crafted message causing the server to spend an effectively arbitrary amount of CPU time and stall the processing of future messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.zulip.org/2019/09/11/zulip-server-2-0-5-security-release/)
2. [](https://github.com/zulip/zulip/commit/5797f013b3be450c146a4141514bda525f2f1b51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27822
- **State**: PUBLISHED
- **Published Date**: December 08, 2020 at 00:07 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, and 21.0.0.Final. When an application uses the OpenTracing API's java-interceptors, there is a possibility of a memory leak. This flaw allows an attacker to impact the availability of the server. The highest threat from this vulnerability is to system availability.
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**n/a - wildfly**
Affected versions:
- 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, 21.0.0.Final (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1904060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33739
- **State**: PUBLISHED
- **Published Date**: June 16, 2022 at 21:25 UTC
- **Last Updated**: August 03, 2024 at 08:09 UTC
- **Reserved Date**: June 15, 2022 at 00:00 UTC
- **Assigned By**: ca
### Vulnerability Description
CA Clarity 15.8 and below and 15.9.0 contain an insecure XML parsing vulnerability that could allow a remote attacker to potentially view the contents of any file on the system.
### Affected Products
**n/a - CA Clarity**
Affected versions:
- 15.8 and below, 15.9.0 (Status: affected)
### References
1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20645) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47322
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:35 UTC
- **Last Updated**: May 04, 2025 at 07:08 UTC
- **Reserved Date**: May 21, 2024 at 14:28 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT
Fix an Oopsable condition in pnfs_mark_request_commit() when we're
putting a set of writes on the commit list to reschedule them after a
failed pNFS attempt.
### Affected Products
**Linux - Linux**
Affected versions:
- 9c455a8c1e146dac3a6d1405fe6a7096177b9546 (Status: affected)
- 9c455a8c1e146dac3a6d1405fe6a7096177b9546 (Status: affected)
- 9c455a8c1e146dac3a6d1405fe6a7096177b9546 (Status: affected)
- 9c455a8c1e146dac3a6d1405fe6a7096177b9546 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.7 (Status: affected)
- 0 (Status: unaffected)
- 5.10.52 (Status: unaffected)
- 5.12.19 (Status: unaffected)
- 5.13.4 (Status: unaffected)
- 5.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153)
2. [](https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb)
3. [](https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd)
4. [](https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32649
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 17:53 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 16, 2024 at 14:15 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-95: Security Weakness
### Affected Products
**vyperlang - vyper**
Affected versions:
- <= 0.3.10 (Status: affected)
### References
1. [https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h](https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4844
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2144
- **State**: PUBLISHED
- **Published Date**: March 09, 2020 at 15:01 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Rundeck Plugin 3.6.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
### Affected Products
**Jenkins project - Jenkins Rundeck Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1702)
2. [[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/03/09/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7158
- **State**: PUBLISHED
- **Published Date**: September 02, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: September 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Numara FootPrints 7.5a through 7.5a1 and 8.0 through 8.0a allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) transcriptFile parameter to MRcgi/MRchat.pl or (2) LOADFILE parameter to MRcgi/MRABLoad2.pl. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42816](http://osvdb.org/42816)
2. [](https://footprintssupport.numarasoftware.com/MRcgi/MRTicketPage.pl?USER=&MRP=0&PROJECTID=4&MR=89552&MAXMININC=&MAJOR_MODE=DETAILS)
3. [28390](http://secunia.com/advisories/28390)
4. [27373](http://www.securityfocus.com/bid/27373)
5. [footprints-transcriptfile-command-execution(39810)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39810)
6. [42813](http://osvdb.org/42813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32981
- **State**: PUBLISHED
- **Published Date**: June 10, 2022 at 19:42 UTC
- **Last Updated**: August 03, 2024 at 07:54 UTC
- **Reserved Date**: June 10, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e1278444446fc97778a5e5c99bca1ce0bbc5ec9)
2. [[oss-security] 20220614 CVE-2022-32981: Linux kernel for powerpc 32-bit, buffer overflow in ptrace PEEKUSER/POKEUSER](http://www.openwall.com/lists/oss-security/2022/06/14/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6066
- **State**: PUBLISHED
- **Published Date**: March 27, 2017 at 01:55 UTC
- **Last Updated**: August 05, 2024 at 15:18 UTC
- **Reserved Date**: February 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Subrion CMS 4.0.5 has CSRF in admin/languages/edit/1/. The attacker can perform any Edit Language action, and can optionally insert XSS via the title parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97087](http://www.securityfocus.com/bid/97087)
2. [](http://www.yiwang6.cn/Subrion-CSRF.docx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2038
- **State**: PUBLISHED
- **Published Date**: June 12, 2009 at 17:28 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 12, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Finnish Bank Payment module 2.2 for osCommerce has unknown impact and attack vectors related to bank charges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [finnishbank-unspecified-security-bypass(51007)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51007)
2. [35385](http://secunia.com/advisories/35385)
3. [](http://www.cert.fi/haavoittuvuudet/2009/haavoittuvuus-2009-046.html)
4. [](http://addons.oscommerce.com/info/5485) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3106
- **State**: PUBLISHED
- **Published Date**: April 13, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 10, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Pulp before 2.8.3 creates a temporary directory during CA key generation in an insecure manner.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pulp.plan.io/issues/1827)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1324926)
3. [[oss-security] 20160519 Pulp 2.8.3 Released to address multiple CVEs](http://www.openwall.com/lists/oss-security/2016/05/20/1)
4. [[oss-security] 20160418 CVE-2013-7450: Pulp < 2.3.0 distributed the same CA key to all users](http://www.openwall.com/lists/oss-security/2016/04/18/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23162
- **State**: PUBLISHED
- **Published Date**: January 22, 2021 at 13:11 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sensitive information disclosure and weak encryption in Pyrescom Termod4 time management devices before 10.04k allows remote attackers to read a session-file and obtain plain-text user credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pyres.com/en/solutions/termod-4/)
2. [](https://github.com/Outpost24/Pyrescom-Termod-PoC)
3. [](https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14329
- **State**: PUBLISHED
- **Published Date**: July 17, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/samtools/htslib/issues/736) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16314
- **State**: PUBLISHED
- **Published Date**: September 01, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: September 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in admincp.php in idreamsoft iCMS 7.0.11. When verifying CSRF_TOKEN, if CSRF_TOKEN does not exist, only the Referer header is validated, which can be bypassed via an admincp.php substring in this header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/idreamsoft/iCMS/issues/35) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5681
- **State**: PUBLISHED
- **Published Date**: December 24, 2020 at 01:20 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in self-extracting files created by EpsonNet SetupManager versions 2.2.14 and earlier, and Offirio SynergyWare PrintDirector versions 1.6x/1.6y and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**SEIKO EPSON CORPORATION - EpsonNet SetupManager and Offirio SynergyWare PrintDirector**
Affected versions:
- EpsonNet SetupManager versions 2.2.14 and earlier, and Offirio SynergyWare PrintDirector versions 1.6x/1.6y and earlier (Status: affected)
### References
1. [](https://www.epson.jp/support/misc_t/201217_oshirase.htm)
2. [](https://jvn.jp/en/jp/JVN94244575/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27923
- **State**: PUBLISHED
- **Published Date**: March 03, 2021 at 08:41 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html)
2. [FEDORA-2021-0ece308612](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/)
3. [FEDORA-2021-15845d3abe](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/)
4. [FEDORA-2021-9016a9b7bd](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/)
5. [GLSA-202107-33](https://security.gentoo.org/glsa/202107-33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33638
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 00:00 UTC
- **Last Updated**: January 10, 2025 at 15:08 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the Edit_BasicSSID_5G interface at /goform/aspForm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://hackmd.io/%400dayResearch/ryyALdiV3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3919
- **State**: PUBLISHED
- **Published Date**: August 23, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 23:55 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process insecurely extracts the fields from the "clips" table of its SQLite database, leading to a buffer overflow on the stack. An attacker can send a series of HTTP requests to trigger this vulnerability.
### Affected Products
**Samsung - SmartThings Hub STH-ETH-250**
Affected versions:
- Firmware version 0.20.17 (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0583) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2827
- **State**: PUBLISHED
- **Published Date**: May 22, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 13:49 UTC
- **Reserved Date**: May 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in LEAD Technologies LEADTOOLS ISIS ActiveX Control (ltisi14E.ocx) 14.5.0.44 and earlier allows remote attackers to execute arbitrary code via a long DriverName property.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24093](http://www.securityfocus.com/bid/24093)
2. [25349](http://secunia.com/advisories/25349)
3. [ADV-2007-1900](http://www.vupen.com/english/advisories/2007/1900)
4. [36032](http://osvdb.org/36032)
5. [leadtools-isis-activex-bo(34437)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34437)
6. [](http://www.shinnai.altervista.org/moaxb/20070522/leadisistxt.html)
7. [](http://moaxb.blogspot.com/2007/05/moaxb-22-leadtools-isis-control.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30674
- **State**: REJECTED
- **Published Date**: April 08, 2024 at 00:00 UTC
- **Last Updated**: May 27, 2024 at 00:14 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5165
- **State**: PUBLISHED
- **Published Date**: November 19, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in eTicket 1.5.7 allow remote attackers to execute arbitrary SQL commands via the pri parameter to (1) index.php, (2) open.php, (3) open_raw.php, and (4) newticket.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.digitrustgroup.com/advisories/web-application-security-eticket2.html)
2. [30877](http://secunia.com/advisories/30877)
3. [eticket-pri-sql-injection(43398)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43398)
4. [](http://www.eticketsupport.com/announcements/170_is_in_the_building-t91.0.html)
5. [1020379](http://www.securitytracker.com/id?1020379)
6. [29973](http://www.securityfocus.com/bid/29973) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0179
- **State**: PUBLISHED
- **Published Date**: June 11, 2020 at 14:43 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1536
- **State**: PUBLISHED
- **Published Date**: November 08, 2007 at 20:00 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: November 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Codeworx Technologies DCP-Portal 5.3.1 allow remote attackers to inject arbitrary web script or HTML via (1) the q parameter to search.php and (2) the year parameter to calendar.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7141](http://www.securityfocus.com/bid/7141)
2. [20030318 Some XSS vulns](http://archives.neohapsis.com/archives/bugtraq/2003-03/0275.html)
3. [7022](http://www.osvdb.org/7022)
4. [8358](http://secunia.com/advisories/8358)
5. [dcpportal-search-calendar-xss(11602)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11602)
6. [7144](http://www.securityfocus.com/bid/7144)
7. [7021](http://www.osvdb.org/7021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0005
- **State**: PUBLISHED
- **Published Date**: January 21, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 04:17 UTC
- **Reserved Date**: December 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted H.263 encoded movie file that triggers memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33386](http://www.securityfocus.com/bid/33386)
2. [quicktime-h263-movie-code-execution(48158)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48158)
3. [TA09-022A](http://www.us-cert.gov/cas/techalerts/TA09-022A.html)
4. [APPLE-SA-2009-01-21](http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html)
5. [ADV-2009-0212](http://www.vupen.com/english/advisories/2009/0212)
6. [](http://support.apple.com/kb/HT3403)
7. [oval:org.mitre.oval:def:6187](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6187)
8. [33632](http://secunia.com/advisories/33632) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49466
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:13 UTC
- **Last Updated**: May 04, 2025 at 08:38 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
regulator: scmi: Fix refcount leak in scmi_regulator_probe
of_find_node_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
### Affected Products
**Linux - Linux**
Affected versions:
- 0fbeae70ee7ce98e18a47337cd1f205dd88589e9 (Status: affected)
- 0fbeae70ee7ce98e18a47337cd1f205dd88589e9 (Status: affected)
- 0fbeae70ee7ce98e18a47337cd1f205dd88589e9 (Status: affected)
- 0fbeae70ee7ce98e18a47337cd1f205dd88589e9 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9ebbfa73d69909b7c737f599fd4ebd42318fc881)
2. [](https://git.kernel.org/stable/c/299a002161c7bfb72e99ba45e5b660aecc344ea0)
3. [](https://git.kernel.org/stable/c/4a59c763ef9b68c711dc2fd2ef4a6648da5480ee)
4. [](https://git.kernel.org/stable/c/68d6c8476fd4f448e70e0ab31ff972838ac41dae) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2093
- **State**: PUBLISHED
- **Published Date**: June 07, 2019 at 19:34 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In huff_dec_1D of nlc_dec.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-119292397.
### Affected Products
**Android - Android**
Affected versions:
- Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26631
- **State**: PUBLISHED
- **Published Date**: May 19, 2022 at 14:53 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: February 03, 2021 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
Improper input validation vulnerability in Mangboard commerce package could lead to occur for abnormal request. A remote attacker can exploit this vulnerability to manipulate the total order amount into a negative number and then pay for the order.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Hometory Co.,Ltd - Mangboard commerce package**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66724) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34156
- **State**: PUBLISHED
- **Published Date**: August 16, 2022 at 07:01 UTC
- **Last Updated**: August 03, 2024 at 08:16 UTC
- **Reserved Date**: July 23, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
'Hulu / フールー' App for iOS versions prior to 3.0.81 improperly verifies server certificates, which may allow an attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
### Affected Products
**HJ Holdings, Inc. - 'Hulu / フールー' App for iOS**
Affected versions:
- versions prior to 3.0.81 (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN81563390/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4993
- **State**: PUBLISHED
- **Published Date**: May 05, 2021 at 15:45 UTC
- **Last Updated**: September 16, 2024 at 20:42 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar SIEM 7.3 and 7.4 when decompressing or verifying signature of zip files processes data in a way that may be vulnerable to path traversal attacks. IBM X-Force ID: 192905.
### Affected Products
**IBM - QRadar SIEM**
Affected versions:
- 7.3 (Status: affected)
- 7.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6449672)
2. [ibm-qradar-cve20204993-path-traversal (192905)](https://exchange.xforce.ibmcloud.com/vulnerabilities/192905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6655
- **State**: PUBLISHED
- **Published Date**: December 20, 2006 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 18:43 UTC
- **Reserved Date**: December 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The procfs implementation in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was mounted with mount_procfs -o linux, which results in a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1017293](http://securitytracker.com/id?1017293)
2. [NetBSD-SA2006-026](ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-026.txt.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50316
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 00:22 UTC
- **Last Updated**: January 28, 2025 at 15:17 UTC
- **Reserved Date**: December 07, 2023 at 01:29 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1
is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**IBM - Sterling B2B Integrator**
Affected versions:
- 6.0.0.0 (Status: affected)
- 6.2.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7176072) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6258
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 24, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31966
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones through 6.3 SP3 HF4, 6900w Series SIP Phone through 6.3.3, and 6970 Conference Unit through 5.1.1 SP8 allows an authenticated attacker with administrative privilege to conduct an argument injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to access sensitive information, modify system configuration or execute arbitrary commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3735
- **State**: PUBLISHED
- **Published Date**: July 18, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 12, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-490-1](http://www.ubuntu.com/usn/usn-490-1)
2. [26176](http://secunia.com/advisories/26176)
3. [26107](http://secunia.com/advisories/26107)
4. [USN-503-1](http://www.ubuntu.com/usn/usn-503-1)
5. [MDVSA-2008:047](http://www.mandriva.com/security/advisories?name=MDVSA-2008:047)
6. [26179](http://secunia.com/advisories/26179)
7. [HPSBUX02156](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579)
8. [ADV-2007-4256](http://www.vupen.com/english/advisories/2007/4256)
9. [25589](http://secunia.com/advisories/25589)
10. [HPSBUX02153](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742)
11. [MDKSA-2007:152](http://www.mandriva.com/security/advisories?name=MDKSA-2007:152)
12. [GLSA-200708-09](http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml)
13. [DSA-1339](http://www.debian.org/security/2007/dsa-1339)
14. [DSA-1391](http://www.debian.org/security/2007/dsa-1391)
15. [](http://www.mozilla.org/security/announce/2007/mfsa2007-18.html)
16. [26151](http://secunia.com/advisories/26151)
17. [MDVSA-2007:047](http://www.mandriva.com/security/advisories?name=MDVSA-2007:047)
18. [28135](http://secunia.com/advisories/28135)
19. [26216](http://secunia.com/advisories/26216)
20. [SSRT061236](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579)
21. [26103](http://secunia.com/advisories/26103)
22. [26072](http://secunia.com/advisories/26072)
23. [ADV-2007-2565](http://www.vupen.com/english/advisories/2007/2565)
24. [26149](http://secunia.com/advisories/26149)
25. [ADV-2008-0082](http://www.vupen.com/english/advisories/2008/0082)
26. [103177](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1)
27. [ADV-2007-2564](http://www.vupen.com/english/advisories/2007/2564)
28. [DSA-1337](http://www.debian.org/security/2007/dsa-1337)
29. [26211](http://secunia.com/advisories/26211)
30. [26159](http://secunia.com/advisories/26159)
31. [SUSE-SA:2007:049](http://www.novell.com/linux/security/advisories/2007_49_mozilla.html)
32. [SSRT061181](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742)
33. [DSA-1338](http://www.debian.org/security/2007/dsa-1338)
34. [oval:org.mitre.oval:def:11066](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11066)
35. [](ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt)
36. [mozilla-javascript-eng-code-execution(35459)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35459)
37. [](http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html)
38. [26095](http://secunia.com/advisories/26095)
39. [20070724 FLEA-2007-0033-1: firefox thunderbird](http://www.securityfocus.com/archive/1/474542/100/0/threaded)
40. [26258](http://secunia.com/advisories/26258)
41. [27326](http://secunia.com/advisories/27326)
42. [28363](http://secunia.com/advisories/28363)
43. [24946](http://www.securityfocus.com/bid/24946)
44. [26460](http://secunia.com/advisories/26460)
45. [26106](http://secunia.com/advisories/26106)
46. [20070701-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc)
47. [RHSA-2007:0724](http://www.redhat.com/support/errata/RHSA-2007-0724.html)
48. [20070720 rPSA-2007-0148-1 firefox thunderbird](http://www.securityfocus.com/archive/1/474226/100/0/threaded)
49. [RHSA-2007:0723](http://www.redhat.com/support/errata/RHSA-2007-0723.html)
50. [26271](http://secunia.com/advisories/26271)
51. [RHSA-2007:0722](http://www.redhat.com/support/errata/RHSA-2007-0722.html)
52. [1018408](http://www.securitytracker.com/id?1018408)
53. [201516](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1)
54. [26204](http://secunia.com/advisories/26204)
55. [26205](http://secunia.com/advisories/26205)
56. [26572](http://secunia.com/advisories/26572)
57. [26096](http://secunia.com/advisories/26096) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3338
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 16:08 UTC
- **Last Updated**: September 16, 2024 at 17:17 UTC
- **Reserved Date**: June 07, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to bypass security restrictions, caused by improper restrictions on the create new user account functionality. An attacker could exploit this vulnerability to create unprivileged user accounts. IBM X-Force ID: 78286.
### Affected Products
**IBM - InfoSphere Guardium**
Affected versions:
- 8.0 (Status: affected)
- 8.01 (Status: affected)
- 8.2 (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21611126)
2. [infosphereguardium-useracct-create (78286)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78286) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14382
- **State**: PUBLISHED
- **Published Date**: July 30, 2019 at 18:34 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: July 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DSM in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/)
2. [openSUSE-SU-2019:2212](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html)
3. [openSUSE-SU-2019:2213](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21067
- **State**: PUBLISHED
- **Published Date**: April 08, 2020 at 17:24 UTC
- **Last Updated**: August 05, 2024 at 12:19 UTC
- **Reserved Date**: April 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with M(6.0) software. There is an information disclosure in a Trustlet because an address is logged. The Samsung ID is SVE-2018-11600 (July 2018).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27988
- **State**: PUBLISHED
- **Published Date**: November 16, 2020 at 16:54 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios XI before 5.7.5 is vulnerable to XSS in Manage Users (Username field).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/downloads/nagios-xi/change-log/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33693
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 13:34 UTC
- **Last Updated**: August 03, 2024 at 08:09 UTC
- **Reserved Date**: June 15, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Exposure of Sensitive Information in CID Manager prior to SMR Jul-2022 Release 1 allows local attacker to access iccid via log.
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Q(10), R(11), S(12) (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0347
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 21:31 UTC
- **Last Updated**: November 14, 2024 at 16:32 UTC
- **Reserved Date**: January 09, 2024 at 14:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file signup_teacher.php. The manipulation of the argument Password leads to weak password requirements. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250115.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-521: Security Weakness
### Affected Products
**SourceCodester - Engineers Online Portal**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.250115)
2. [](https://vuldb.com/?ctiid.250115)
3. [](https://mega.nz/file/2d8GiY4Z#QSKItMUgIsW1-A-QPs9dgUSd2SCZfDg4aHORttFpUF0)
### Credits
- ahmed8199 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4668
- **State**: PUBLISHED
- **Published Date**: September 09, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 08, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in Rob Hensley AckerTodo 4.0 allows remote attackers to inject arbitrary web script or HTML via the task_id parameter in an edit_task command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1531](http://securityreason.com/securityalert/1531)
2. [ADV-2006-3517](http://www.vupen.com/english/advisories/2006/3517)
3. [21810](http://secunia.com/advisories/21810)
4. [20060907 XSS in AckerTodo v4.0](http://www.securityfocus.com/archive/1/445465/100/0/threaded)
5. [ackertodo-index-xss(28810)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28810)
6. [20060926 Re: XSS in AckerTodo v4.0](http://www.securityfocus.com/archive/1/447071/100/100/threaded)
7. [28611](http://www.osvdb.org/28611)
8. [19894](http://www.securityfocus.com/bid/19894) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4265
- **State**: PUBLISHED
- **Published Date**: November 23, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130821 Re: CVE Request: FFmpeg 2.0.1 multiple problems](http://www.openwall.com/lists/oss-security/2013/08/21/11)
2. [](http://www.ffmpeg.org/security.html)
3. [GLSA-201603-06](https://security.gentoo.org/glsa/201603-06)
4. [](https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5756
- **State**: PUBLISHED
- **Published Date**: February 19, 2019 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 09, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [106767](http://www.securityfocus.com/bid/106767)
2. [RHSA-2019:0309](https://access.redhat.com/errata/RHSA-2019:0309)
3. [DSA-4395](https://www.debian.org/security/2019/dsa-4395)
4. [](https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html)
5. [](https://crbug.com/895152)
6. [FEDORA-2019-561eae4626](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/)
7. [FEDORA-2019-05a780936d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5227
- **State**: PUBLISHED
- **Published Date**: May 27, 2025 at 03:00 UTC
- **Last Updated**: May 27, 2025 at 13:36 UTC
- **Reserved Date**: May 26, 2025 at 18:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Small CRM 3.0 and classified as critical. This issue affects some unknown processing of the file /admin/manage-tickets.php. The manipulation of the argument aremark leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Small CRM**
Affected versions:
- 3.0 (Status: affected)
### References
1. [VDB-310325 | PHPGurukul Small CRM manage-tickets.php sql injection](https://vuldb.com/?id.310325)
2. [VDB-310325 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310325)
3. [Submit #583423 | phpgurukul Small CRM v3.0 SQL Injection](https://vuldb.com/?submit.583423)
4. [](https://github.com/bleakTS/myCVE/issues/18)
5. [](https://phpgurukul.com/)
### Credits
- QKset (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1708
- **State**: PUBLISHED
- **Published Date**: March 27, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: March 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in lib/db/ez_sql.php in ttCMS 4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the lib_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3563](https://www.exploit-db.com/exploits/3563)
2. [ttcms-ezsql-file-include(33202)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33202)
3. [ADV-2007-1102](http://www.vupen.com/english/advisories/2007/1102)
4. [37198](http://osvdb.org/37198)
5. [23139](http://www.securityfocus.com/bid/23139) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48417
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 12:30 UTC
- **Last Updated**: May 21, 2025 at 13:51 UTC
- **Reserved Date**: May 20, 2025 at 07:34 UTC
- **Assigned By**: SEC-VLab
### Vulnerability Description
The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**eCharge Hardy Barth - cPH2 / cPP2 charging stations**
Affected versions:
- <=2.2.0 (Status: affected)
### References
1. [](https://r.sec-consult.com/echarge)
### Credits
- Stefan Viehböck | SEC Consult Vulnerability Lab |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0636
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 03:35 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter of a certain URL, different URL from CVE-2018-0634.
### Affected Products
**NEC Corporation - HC100RC**
Affected versions:
- Ver1.0.1 and earlier (Status: affected)
### References
1. [JVN#84825660](https://jvn.jp/en/jp/JVN84825660/index.html)
2. [](https://jpn.nec.com/security-info/secinfo/nv18-011.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30917
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 08:31 UTC
- **Last Updated**: December 04, 2024 at 15:26 UTC
- **Reserved Date**: April 21, 2023 at 08:42 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In DMService, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13447
- **State**: PUBLISHED
- **Published Date**: July 17, 2019 at 19:14 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Sertek Xpare 3.67. The login form does not sanitize input data. Because of this, a malicious agent could access the backend database via SQL injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cyberoo.com/2019/07/16/cyberoo-identifica-vulnerabilita-0day/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1190
- **State**: PUBLISHED
- **Published Date**: April 11, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 13, 2006 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 5.01 through 6 does not always return the correct IOleClientSite information when dynamically creating an embedded object, which could cause Internet Explorer to run the object in the wrong security context or zone, and allow remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18957](http://secunia.com/advisories/18957)
2. [oval:org.mitre.oval:def:1735](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1735)
3. [1015900](http://securitytracker.com/id?1015900)
4. [17455](http://www.securityfocus.com/bid/17455)
5. [oval:org.mitre.oval:def:1541](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1541)
6. [MS06-013](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013)
7. [ie-ioleclientsite-execute-code(25552)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25552)
8. [ADV-2006-1318](http://www.vupen.com/english/advisories/2006/1318)
9. [oval:org.mitre.oval:def:965](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A965)
10. [VU#959649](http://www.kb.cert.org/vuls/id/959649)
11. [oval:org.mitre.oval:def:1783](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1783) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51367
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 00:00 UTC
- **Last Updated**: November 27, 2024 at 17:01 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the component \Users\username.BlackBoard of BlackBoard v2.0.0.2 allows attackers to execute arbitrary code via uploading a crafted .xml file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blackboard.com)
2. [](https://github.com/Gelcon/PoCofBlackBoard2.0.0.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1020008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1020008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1020008
- **State**: PUBLISHED
- **Published Date**: July 29, 2019 at 14:14 UTC
- **Last Updated**: August 05, 2024 at 03:14 UTC
- **Reserved Date**: July 26, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
stacktable.js before 1.0.4 allows XSS.
### Affected Products
**stacktable.js - stacktable.js**
Affected versions:
- < 1.0.4 (Status: affected)
### References
1. [](https://github.com/WebFirst/stacktable.js/security/advisories/GHSA-r9j3-hgxr-75xg) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46793
- **State**: PUBLISHED
- **Published Date**: April 06, 2023 at 12:44 UTC
- **Last Updated**: January 10, 2025 at 19:06 UTC
- **Reserved Date**: December 08, 2022 at 09:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in AdTribes.Io Product Feed PRO for WooCommerce plugin <= 12.4.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**AdTribes.io - Product Feed PRO for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woo-product-feed-pro/wordpress-product-feed-pro-for-woocommerce-plugin-12-3-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5984
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: January 06, 2021 at 16:15 UTC
- **Reserved Date**: August 12, 2015 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8206
- **State**: PUBLISHED
- **Published Date**: July 11, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:46 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections, aka "Windows FTP Server Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8206)
2. [104629](http://www.securityfocus.com/bid/104629)
3. [1041262](http://www.securitytracker.com/id/1041262) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8777
- **State**: PUBLISHED
- **Published Date**: September 16, 2024 at 05:44 UTC
- **Last Updated**: September 16, 2024 at 13:53 UTC
- **Reserved Date**: September 13, 2024 at 09:43 UTC
- **Assigned By**: twcert
### Vulnerability Description
OMFLOW from The SYSCOM Group has an information leakage vulnerability, allowing unauthorized remote attackers to read arbitrary system configurations. If LDAP authentication is enabled, attackers can obtain plaintext credentials.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**The SYSCOM Group - OMFLOW**
Affected versions:
- 1.1.6.0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-8071-46589-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-8072-928a5-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24267
- **State**: PUBLISHED
- **Published Date**: February 05, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 23:19 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yinluming13579/gpac_defects/blob/main/gpac_3.md)
2. [](https://github.com/gpac/gpac/issues/2571)
3. [](https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45817
- **State**: REJECTED
- **Last Updated**: October 14, 2024 at 17:24 UTC
- **Reserved Date**: October 13, 2023 at 12:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41056
- **State**: PUBLISHED
- **Published Date**: November 09, 2022 at 00:00 UTC
- **Last Updated**: January 02, 2025 at 21:31 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41056) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1350, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1350
- **State**: PUBLISHED
- **Published Date**: February 05, 2013 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 20:22 UTC
- **Reserved Date**: March 10, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The PowerVR SGX driver in Android before 2.3.6 allows attackers to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://jon.oberheide.org/files/levitator.c)
2. [](http://code.google.com/p/android/issues/detail?id=21522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4230, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4230
- **State**: PUBLISHED
- **Published Date**: November 16, 2010 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: November 11, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in a certain ActiveX control for the Camtron CMNC-200 Full HD IP Camera and TecVoz CMNC-200 Megapixel IP Camera with firmware 1.102A-008 allows remote attackers to execute arbitrary code via a long string in the first argument to the connect method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15504](http://www.exploit-db.com/exploits/15504)
2. [20101112 TWSL2010-006: Multiple Vulnerabilities in Camtron CMNC-200 IP Camera](http://www.securityfocus.com/archive/1/514753/100/0/threaded)
3. [](https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44866
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 18:30 UTC
- **Reserved Date**: August 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow in the GuitarPro1::read function of MuseScore Studio v4.3.2 allows attackers to to execute arbitrary code or cause a Denial of Service (DoS) via opening a crafted GuitarPro file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://musescore.org/ko/download/musescore.msi)
2. [](https://github.com/moonadon9/CVE_2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25216
- **State**: PUBLISHED
- **Published Date**: April 07, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 21:00 UTC
- **Reserved Date**: February 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formSetFirewallCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9393
- **State**: PUBLISHED
- **Published Date**: September 22, 2017 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:02 UTC
- **Reserved Date**: June 02, 2017 at 00:00 UTC
- **Assigned By**: ca
### Vulnerability Description
CA Identity Manager r12.6 to r12.6 SP8, 14.0, and 14.1 allows remote attackers to potentially identify passwords of locked accounts through an exhaustive search.
### Affected Products
**CA Technologies - Identity Manager**
Affected versions:
- 12.6 through 12.6 SP8 (Status: affected)
- 14.0 (Status: affected)
- 14.1 (Status: affected)
### References
1. [100956](http://www.securityfocus.com/bid/100956)
2. [](https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20170921-01--security-notice-for-ca-identity-manager.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46738
- **State**: PUBLISHED
- **Published Date**: January 03, 2024 at 15:35 UTC
- **Last Updated**: August 27, 2024 at 20:47 UTC
- **Reserved Date**: October 25, 2023 at 14:30 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CubeFS is an open-source cloud-native file storage system. A security vulnerability was found in CubeFS HandlerNode in versions prior to 3.3.1 that could allow authenticated users to send maliciously-crafted requests that would crash the ObjectNode and deny other users from using it. The root cause was improper handling of incoming HTTP requests that could allow an attacker to control the ammount of memory that the ObjectNode would allocate. A malicious request could make the ObjectNode allocate more memory that the machine had available, and the attacker could exhaust memory by way of a single malicious request. An attacker would need to be authenticated in order to invoke the vulnerable code with their malicious request and have permissions to delete objects. In addition, the attacker would need to know the names of existing buckets of the CubeFS deployment - otherwise the request would be rejected before it reached the vulnerable code. As such, the most likely attacker is an inside user or an attacker that has breached the account of an existing user in the cluster. The issue has been patched in v3.3.1. There is no other mitigation besides upgrading.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**cubefs - cubefs**
Affected versions:
- < 3.3.1 (Status: affected)
### References
1. [https://github.com/cubefs/cubefs/security/advisories/GHSA-qc6v-g3xw-grmx](https://github.com/cubefs/cubefs/security/advisories/GHSA-qc6v-g3xw-grmx)
2. [https://github.com/cubefs/cubefs/commit/dd46c24873c8f3df48d0a598b704ef9bd24b1ec1](https://github.com/cubefs/cubefs/commit/dd46c24873c8f3df48d0a598b704ef9bd24b1ec1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3153
- **State**: PUBLISHED
- **Published Date**: May 01, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10131)
2. [1032233](http://www.securitytracker.com/id/1032233)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
4. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
5. [USN-2591-1](http://www.ubuntu.com/usn/USN-2591-1)
6. [openSUSE-SU-2015:0861](http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html)
7. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html)
8. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
9. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743)
10. [](http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html)
11. [](https://support.apple.com/kb/HT205031)
12. [74408](http://www.securityfocus.com/bid/74408)
13. [](http://curl.haxx.se/docs/adv_20150429.html)
14. [DSA-3240](http://www.debian.org/security/2015/dsa-3240) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2111
- **State**: PUBLISHED
- **Published Date**: May 30, 2023 at 07:49 UTC
- **Last Updated**: January 10, 2025 at 16:13 UTC
- **Reserved Date**: April 17, 2023 at 08:05 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database.
### Weakness Classification (CWE)
- CWE-89 SQL Injection: SQL Injection
### Affected Products
**Unknown - Fast & Effective Popups & Lead-Generation for WordPress**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2)
### Credits
- rSolutions Security Team
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21534
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 20:53 UTC
- **Last Updated**: January 22, 2025 at 18:28 UTC
- **Reserved Date**: December 24, 2024 at 23:18 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27280
- **State**: PUBLISHED
- **Published Date**: April 10, 2022 at 20:23 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the web_exec parameter at /apply.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wu610777031/IoT_Hunter/blob/main/Inhand%20InRouter%20900%20Industrial%204G%20Router%20%20Vulnerabilities%28XSS%29.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6033
- **State**: REJECTED
- **Last Updated**: October 06, 2022 at 00:00 UTC
- **Reserved Date**: September 01, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22578
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 17:59 UTC
- **Last Updated**: August 03, 2024 at 03:14 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved validation. This issue is fixed in tvOS 15.3, iOS 15.3 and iPadOS 15.3, watchOS 8.4, macOS Monterey 12.2. A malicious application may be able to gain root privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213053)
2. [](https://support.apple.com/en-us/HT213054)
3. [](https://support.apple.com/en-us/HT213057)
4. [](https://support.apple.com/en-us/HT213059) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2789
- **State**: PUBLISHED
- **Published Date**: August 19, 2022 at 22:32 UTC
- **Last Updated**: April 16, 2025 at 16:12 UTC
- **Reserved Date**: August 11, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-345 Insufficient Verification of Data Authenticity, and can display logic that is different than the compiled logic.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**Emerson Electric - Proficy Machine Edition**
Affected versions:
- all (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-06)
### Credits
- Sharon Brizinov of Claroty reported this vulnerability to Emerson and CISA |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38244
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 16:54 UTC
- **Last Updated**: December 31, 2024 at 23:03 UTC
- **Reserved Date**: June 11, 2024 at 22:36 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Kernel Streaming Service Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13114
- **State**: PUBLISHED
- **Published Date**: February 04, 2025 at 06:00 UTC
- **Last Updated**: February 04, 2025 at 18:26 UTC
- **Reserved Date**: January 01, 2025 at 14:45 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Projects Portfolio with Client Testimonials WordPress plugin through 3.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WP Projects Portfolio with Client Testimonials**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/0cecda12-590a-42a6-b10b-e0efe7fb3a3a/)
### Credits
- Hassan Khan Yusufzai - Splint3r7
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8549
- **State**: PUBLISHED
- **Published Date**: February 03, 2020 at 16:43 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: February 03, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored XSS in the Strong Testimonials plugin before 2.40.1 for WordPress can result in an attacker performing malicious actions such as stealing session tokens.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/10056)
2. [](https://github.com/MachoThemes/strong-testimonials/blob/master/changelog.txt)
3. [](https://www.getastra.com/blog/911/plugin-exploit/stored-xss-vulnerability-found-in-strong-testimonials-plugin/)
4. [](https://www.jinsonvarghese.com/stored-xss-vulnerability-in-strong-testimonials-plugin/)
5. [](http://packetstormsecurity.com/files/156369/WordPress-Strong-Testimonials-2.40.1-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45774
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 18:25 UTC
- **Last Updated**: May 13, 2025 at 19:27 UTC
- **Reserved Date**: September 08, 2024 at 01:57 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 1:2.06-104.el9_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat OpenShift Container Platform 4**
### References
1. [RHSA-2025:6990](https://access.redhat.com/errata/RHSA-2025:6990)
2. [](https://access.redhat.com/security/cve/CVE-2024-45774)
3. [RHBZ#2337461](https://bugzilla.redhat.com/show_bug.cgi?id=2337461)
4. [](https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20545
- **State**: PUBLISHED
- **Published Date**: December 16, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:15 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In bindArtworkAndColors of MediaControlPanel.java, there is a possible way to crash the phone due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-239368697
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9865
- **State**: PUBLISHED
- **Published Date**: October 24, 2024 at 06:50 UTC
- **Last Updated**: October 24, 2024 at 13:43 UTC
- **Reserved Date**: October 11, 2024 at 13:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ep_booking_attendee_fields’ fields in all versions up to, and including, 4.0.4.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the transaction log for a booking.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**metagauss - EventPrime – Events Calendar, Bookings and Tickets**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/18ded977-5297-4b6f-b9f3-0567f995d08a?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3168585%40eventprime-event-calendar-management&new=3168585%40eventprime-event-calendar-management&sfp_email=&sfph_mail=)
3. [](https://plugins.trac.wordpress.org/changeset/3170503/)
### Credits
- D.Sim |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4696
- **State**: PUBLISHED
- **Published Date**: July 01, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 19, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3302](http://www.debian.org/security/2015/dsa-3302)
2. [GLSA-201602-03](https://security.gentoo.org/glsa/201602-03)
3. [75331](http://www.securityfocus.com/bid/75331)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html)
5. [USN-2670-1](http://www.ubuntu.com/usn/USN-2670-1)
6. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192)
7. [FEDORA-2015-10601](http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html)
8. [[oss-security] 20150621 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7](http://www.openwall.com/lists/oss-security/2015/06/21/3)
9. [1032771](http://www.securitytracker.com/id/1032771)
10. [openSUSE-SU-2015:1212](http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html)
11. [RHSA-2015:1917](http://rhn.redhat.com/errata/RHSA-2015-1917.html)
12. [[oss-security] 20150617 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7](http://www.openwall.com/lists/oss-security/2015/06/17/3) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.