System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15492
- **State**: PUBLISHED
- **Published Date**: August 18, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 09:54 UTC
- **Reserved Date**: August 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.radware.com/app/answers/answer_view/a_id/17879/~/security-advisory-sentinel-reflection-ddos)
2. [](https://github.com/mspaling/sentinel-ddos-signature/blob/master/sentinel-ddos-signature.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2428
- **State**: PUBLISHED
- **Published Date**: February 06, 2009 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 03:52 UTC
- **Reserved Date**: February 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webs.c in GoAhead WebServer before 2.1.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an HTTP POST request that contains a Content-Length header but no body data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://data.goahead.com/Software/Webserver/2.1.8/release.htm#fixed-vulnerability-to-malicious-code-in-webs-c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2025
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7145
- **State**: PUBLISHED
- **Published Date**: March 07, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: September 05, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5)
2. [[oss-security] 20160905 Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis](http://www.openwall.com/lists/oss-security/2016/09/05/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5967
- **State**: PUBLISHED
- **Published Date**: January 25, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 05:47 UTC
- **Reserved Date**: January 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netis WF2419 V2.2.36123 devices allow XSS via the Description parameter on the Bandwidth Control Rule Settings page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/145513/Netis-WF2419-HTML-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43361
- **State**: PUBLISHED
- **Published Date**: September 29, 2022 at 01:50 UTC
- **Last Updated**: May 20, 2025 at 19:39 UTC
- **Reserved Date**: November 04, 2021 at 00:00 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MedData HBYS allows SQL Injection.This issue affects HBYS: from unspecified before 1.1.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**MedData - HBYS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/bartutku/CVE-2021-43361/blob/main/CVE-2021-43361.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0807
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1939
- **State**: PUBLISHED
- **Published Date**: April 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 20, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19828](http://secunia.com/advisories/19828)
2. [19839](http://secunia.com/advisories/19839)
3. [ethereal-asn1based-dissector-dos(26030)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26030)
4. [20210](http://secunia.com/advisories/20210)
5. [FEDORA-2006-456](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00194.html)
6. [ethereal-dcerpc-dissector-dos(26021)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26021)
7. [MDKSA-2006:077](http://www.mandriva.com/security/advisories?name=MDKSA-2006:077)
8. [](http://www.ethereal.com/appnotes/enpa-sa-00023.html)
9. [ethereal-display-filter-dos(26017)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26017)
10. [19769](http://secunia.com/advisories/19769)
11. [19962](http://secunia.com/advisories/19962)
12. [FEDORA-2006-461](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00195.html)
13. [ethereal-per-diss-dos(26033)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26033)
14. [1015985](http://securitytracker.com/id?1015985)
15. [ethereal-rpc-dos(26020)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26020)
16. [ethereal-gsmsms-dissector-dos(26028)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26028)
17. [GLSA-200604-17](http://www.gentoo.org/security/en/glsa/glsa-200604-17.xml)
18. [ADV-2006-1501](http://www.vupen.com/english/advisories/2006/1501)
19. [DSA-1049](http://www.debian.org/security/2006/dsa-1049)
20. [19805](http://secunia.com/advisories/19805)
21. [](http://support.avaya.com/elmodocs2/security/ASA-2006-128.htm)
22. [20060501-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc)
23. [SUSE-SR:2006:010](http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html)
24. [20117](http://secunia.com/advisories/20117)
25. [17682](http://www.securityfocus.com/bid/17682)
26. [20944](http://secunia.com/advisories/20944)
27. [ethereal-dcerpcnt-dissector-dos(26032)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26032)
28. [oval:org.mitre.oval:def:11030](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11030)
29. [ethereal-asn1-dissector-dos(26022)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26022)
30. [RHSA-2006:0420](http://www.redhat.com/support/errata/RHSA-2006-0420.html)
31. [19958](http://secunia.com/advisories/19958) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46499
- **State**: PUBLISHED
- **Published Date**: January 27, 2022 at 20:21 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pcmacdon/jsish/issues/76) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35646
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 19:19 UTC
- **Last Updated**: September 18, 2024 at 18:41 UTC
- **Reserved Date**: June 15, 2023 at 02:50 UTC
- **Assigned By**: google_android
### Vulnerability Description
In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27121
- **State**: PUBLISHED
- **Published Date**: November 06, 2020 at 18:15 UTC
- **Last Updated**: November 13, 2024 at 17:44 UTC
- **Reserved Date**: October 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) Software could allow an authenticated, remote attacker to cause the Cisco XCP Authentication Service on an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of login requests. An attacker could exploit this vulnerability by sending a crafted client login request to an affected device. A successful exploit could allow the attacker to cause a process to crash, resulting in a DoS condition for new login attempts. Users who are authenticated at the time of the attack would not be affected. There are workarounds that address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**Cisco - Cisco Unified Communications Manager IM and Presence Service**
Affected versions:
- n/a (Status: affected)
### References
1. [20201104 Cisco Unified Communications Manager IM and Presence Service Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-dos-uTx2dqu2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29906
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 06:53 UTC
- **Last Updated**: August 05, 2024 at 16:52 UTC
- **Reserved Date**: March 21, 2024 at 15:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Stored XSS.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**realmag777 - WordPress Meta Data and Taxonomies Filter (MDTF)**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3783
- **State**: PUBLISHED
- **Published Date**: October 26, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:38 UTC
- **Reserved Date**: October 26, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Simplenews Statistics 6.x before 6.x-2.0, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vector.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37128](http://secunia.com/advisories/37128)
2. [](http://drupal.org/node/611002)
3. [](http://drupal.org/node/590098)
4. [36790](http://www.securityfocus.com/bid/36790)
5. [simplenews-unspecified-xss(53905)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48376
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 07:52 UTC
- **Last Updated**: August 02, 2024 at 21:30 UTC
- **Reserved Date**: November 16, 2023 at 03:49 UTC
- **Assigned By**: twcert
### Vulnerability Description
SmartStar Software CWS is a web-based integration platform, its file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SmartStar Software - CWS Web-Base**
Affected versions:
- v10.25 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7595-d58b1-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4304
- **State**: PUBLISHED
- **Published Date**: April 29, 2024 at 11:52 UTC
- **Last Updated**: August 01, 2024 at 20:33 UTC
- **Reserved Date**: April 29, 2024 at 07:37 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A Cross-Site Scripting XSS vulnerability has been detected on GT3 Soluciones SWAL. This vulnerability consists in a reflected XSS in the Titular parameter inside Gestion 'Documental > Seguimiento de Expedientes > Alta de Expedientes'.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GT3 Soluciones - SWAL **
Affected versions:
- 2.0 (r2301) (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/vulnerability-swal-platform-gt3-soluciones)
### Credits
- David Padilla |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0226
- **State**: PUBLISHED
- **Published Date**: March 19, 2013 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Keyboard Shortcut Utility module 7.x-1.x before 7.x-1.1 for Drupal does not properly check node restrictions, which allows (1) remote authenticated users with the "view shortcuts" permission to read nodes or (2) remote authenticated users with the "admin shortcuts" permission to read, edit, or delete nodes via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drupal.org/node/1896752)
2. [[oss-security] 20130124 Re: CVE request for Drupal contributed modules](http://www.openwall.com/lists/oss-security/2013/01/25/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1715
- **State**: PUBLISHED
- **Published Date**: May 03, 2019 at 16:20 UTC
- **Last Updated**: November 19, 2024 at 19:08 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Deterministic Random Bit Generator (DRBG), also known as Pseudorandom Number Generator (PRNG), used in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a cryptographic collision, enabling the attacker to discover the private key of an affected device. The vulnerability is due to insufficient entropy in the DRBG when generating cryptographic keys. An attacker could exploit this vulnerability by generating a large number of cryptographic keys on an affected device and looking for collisions with target devices. A successful exploit could allow the attacker to impersonate an affected target device or to decrypt traffic secured by an affected key that is sent to or from an affected target device.
### Weakness Classification (CWE)
- CWE-332: Security Weakness
### Affected Products
**Cisco - Cisco Adaptive Security Appliance (ASA) Software**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Cisco Firepower Threat Defense (FTD) Software**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [20190501 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-entropy) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1264
- **State**: PUBLISHED
- **Published Date**: April 06, 2025 at 04:21 UTC
- **Last Updated**: April 07, 2025 at 14:53 UTC
- **Reserved Date**: February 12, 2025 at 20:56 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to SQL Injection via the 'orderBy' parameter in all versions up to, and including, 1.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**aioseo - Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2d582e-4f50-4b55-9f3b-3c46d96c0927?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Api/Api.php#L42)
3. [](https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Api/LinkStatusTable.php#L31)
4. [](https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Core/Database.php#L1357)
5. [](https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Core/Database.php#L552)
6. [](https://wordpress.org/plugins/broken-link-checker-seo)
7. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3263416%40broken-link-checker-seo&new=3263416%40broken-link-checker-seo&sfp_email=&sfph_mail=)
### Credits
- Christiaan Swiers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37918
- **State**: PUBLISHED
- **Published Date**: July 20, 2024 at 09:01 UTC
- **Last Updated**: August 02, 2024 at 04:04 UTC
- **Reserved Date**: June 10, 2024 at 21:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPCone.Com ConeBlog – WordPress Blog Widgets allows Stored XSS.This issue affects ConeBlog – WordPress Blog Widgets: from n/a through 1.4.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPCone.com - ConeBlog – WordPress Blog Widgets**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/coneblog-widgets/wordpress-coneblog-plugin-1-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5346
- **State**: PUBLISHED
- **Published Date**: October 09, 2012 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 09, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in wp-live.php in the WP Live.php module 1.2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/files/108282/wplivephp-xss.txt)
2. [51220](http://www.securityfocus.com/bid/51220)
3. [wplivephp-wplive-xss(72080)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72080) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4675
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-25024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-25024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-25024
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 21:55 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: December 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly coerce an immutable reference into a mutable reference, leading to memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2018-0019.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-web/RUSTSEC-2018-0019.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31164
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 18:01 UTC
- **Last Updated**: March 28, 2025 at 19:57 UTC
- **Reserved Date**: March 27, 2025 at 02:44 UTC
- **Assigned By**: redhat-cnalr
### Vulnerability Description
heap-buffer overflow in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via create_line_with_spline.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**xfig - fig2dev**
Affected versions:
- 3.2.9a (Status: affected)
### References
1. [](https://sourceforge.net/p/mcj/tickets/184/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32128
- **State**: PUBLISHED
- **Published Date**: June 22, 2022 at 18:42 UTC
- **Last Updated**: August 03, 2024 at 07:32 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/service/increment/add/im.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2891
- **State**: PUBLISHED
- **Published Date**: August 20, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in list.php in PHP Scripts Now Riddles allows remote attackers to execute arbitrary SQL commands via the catid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/0907-exploits/riddledepot-sqlxss.txt)
2. [56123](http://www.osvdb.org/56123)
3. [35932](http://secunia.com/advisories/35932)
4. [riddles-list-sql-injection(51872)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51872) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17404
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 14:48 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nokia IMPACT < 18A: allows full path disclosure
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nokia.com/networks/solutions/impact-iot-platform/)
2. [](https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30115
- **State**: PUBLISHED
- **Published Date**: June 01, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 06:40 UTC
- **Reserved Date**: May 02, 2022 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
### Weakness Classification (CWE)
- CWE-325: Security Weakness
### Affected Products
**n/a - https://github.com/curl/curl**
Affected versions:
- Fixed in 7.83.1 (Status: affected)
### References
1. [](https://hackerone.com/reports/1557449)
2. [](https://security.netapp.com/advisory/ntap-20220609-0009/)
3. [[oss-security] 20221026 [SECURITY ADVISORY] CVE-2022-42916: HSTS bypass via IDN (curl)](http://www.openwall.com/lists/oss-security/2022/10/26/4)
4. [GLSA-202212-01](https://security.gentoo.org/glsa/202212-01)
5. [[oss-security] 20221221 curl: CVE-2022-43551: Another HSTS bypass via IDN](http://www.openwall.com/lists/oss-security/2022/12/21/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1992
- **State**: PUBLISHED
- **Published Date**: March 17, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:17 UTC
- **Reserved Date**: January 22, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HPE ArcSight ESM before 6.8c, and ArcSight ESM Express before 6.9.1, allows remote authenticated users to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035307](http://www.securitytracker.com/id/1035307)
2. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05048753) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36969
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 00:00 UTC
- **Last Updated**: November 19, 2024 at 17:16 UTC
- **Reserved Date**: June 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMS Made Simple v2.2.17 is vulnerable to Remote Command Execution via the File Upload Function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://okankurtulus.com.tr/2023/06/26/cms-made-simple-v2-2-17-file-upload-remote-code-execution-rce-authenticated/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15439
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 16:27 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Samsung XCover4 Android device with a build fingerprint of samsung/xcover4ltedo/xcover4lte:8.1.0/M1AJQ/G390YDXU2BSA1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kryptowire.com/android-firmware-2019/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22672, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22672
- **State**: PUBLISHED
- **Published Date**: May 10, 2021 at 12:29 UTC
- **Last Updated**: August 03, 2024 at 18:51 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics' CNCSoft ScreenEditor in versions prior to v1.01.30 could allow the corruption of data, a denial-of-service condition, or code execution. The vulnerability may allow an attacker to remotely execute arbitrary code.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - Delta Electronics CNCSoft ScreenEditor**
Affected versions:
- CNCSoft ScreenEditor versions prior to v1.01.30 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-124-02)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-524/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2616
- **State**: PUBLISHED
- **Published Date**: May 26, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the search script in (1) AlstraSoft Web Host Directory 1.2, aka (2) HyperStop WebHost Directory 1.2, allows remote attackers to execute arbitrary SQL commands via the uri parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [webhostdirectory-search-sql-injection(26653)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26653)
2. [955](http://securityreason.com/securityalert/955)
3. [hs-webhostdirectory-search-sql-injection(26658)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26658)
4. [ADV-2006-1972](http://www.vupen.com/english/advisories/2006/1972)
5. [20060523 AlstraSoft Web Host Directory v1.2](http://www.securityfocus.com/archive/1/434912/100/0/threaded)
6. [20276](http://secunia.com/advisories/20276)
7. [20278](http://secunia.com/advisories/20278)
8. [ADV-2006-1973](http://www.vupen.com/english/advisories/2006/1973) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6339
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 07:33 UTC
- **Last Updated**: August 21, 2024 at 20:53 UTC
- **Reserved Date**: June 25, 2024 at 21:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Phlox PRO theme for WordPress is vulnerable to Reflected Cross-Site Scripting via search parameters in all versions up to, and including, 5.16.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**averta - Phlox PRO**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2b5ad113-f739-455a-9db6-b4f300b92837?source=cve)
2. [](https://owasp.org/www-community/attacks/xss/)
3. [](https://github.com/skmorshed75/ferdykorp/blob/9176d0782558ac2bd620777174e942cefc27fb21/wp-content/themes/phlox/templates/theme-parts/entry/search-advanced.php#L69)
### Credits
- kauenavarro |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3728
- **State**: PUBLISHED
- **Published Date**: September 30, 2019 at 21:48 UTC
- **Last Updated**: May 20, 2025 at 16:04 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
RSA BSAFE Crypto-C Micro Edition versions from 4.0.0.0 before 4.0.5.4 and from 4.1.0 before 4.1.4, RSA BSAFE Micro Edition Suite versions from 4.0.0 before 4.0.13 and from 4.1.0 before 4.4 and RSA Crypto-C versions from 6.0.0 through 6.4.* are vulnerable to an out-of-bounds read vulnerability when processing DSA signature. A malicious remote user could potentially exploit this vulnerability to cause a crash in the library of the affected system.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Dell - RSA BSAFE Crypto-C Micro Edition**
Affected versions:
- 4.0.0.0 (Status: affected)
- 4.1.0 (Status: affected)
**Dell - RSA BSAFE Micro Edition Suite**
Affected versions:
- 4.0.0 (Status: affected)
- 4.1.0 (Status: affected)
**Dell - RSA Crypto-C**
Affected versions:
- 6.0.0 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000194054) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35925
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 10:10 UTC
- **Last Updated**: May 04, 2025 at 09:08 UTC
- **Reserved Date**: May 17, 2024 at 13:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
block: prevent division by zero in blk_rq_stat_sum()
The expression dst->nr_samples + src->nr_samples may
have zero value on overflow. It is necessary to add
a check to avoid division by zero.
Found by Linux Verification Center (linuxtesting.org) with Svace.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.312 (Status: unaffected)
- 5.4.274 (Status: unaffected)
- 5.10.215 (Status: unaffected)
- 5.15.155 (Status: unaffected)
- 6.1.86 (Status: unaffected)
- 6.6.27 (Status: unaffected)
- 6.8.6 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/6a55dab4ac956deb23690eedd74e70b892a378e7)
2. [](https://git.kernel.org/stable/c/edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14)
3. [](https://git.kernel.org/stable/c/b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c)
4. [](https://git.kernel.org/stable/c/21e7d72d0cfcbae6042d498ea2e6f395311767f8)
5. [](https://git.kernel.org/stable/c/512a01da7134bac8f8b373506011e8aaa3283854)
6. [](https://git.kernel.org/stable/c/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe)
7. [](https://git.kernel.org/stable/c/98ddf2604ade2d954bf5ec193600d5274a43fd68)
8. [](https://git.kernel.org/stable/c/93f52fbeaf4b676b21acfe42a5152620e6770d02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3259
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 17:31 UTC
- **Last Updated**: April 04, 2025 at 18:55 UTC
- **Reserved Date**: April 04, 2025 at 07:46 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Tenda RX3 16.03.13.11. This issue affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
- CWE-119: Security Weakness
### Affected Products
**Tenda - RX3**
Affected versions:
- 16.03.13.11 (Status: affected)
### References
1. [VDB-303329 | Tenda RX3 SetOnlineDevName formSetDeviceName stack-based overflow](https://vuldb.com/?id.303329)
2. [VDB-303329 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.303329)
3. [Submit #549199 | Tenda RX3 RX3 Firmware V16.03.13.11_multi Buffer Overflow](https://vuldb.com/?submit.549199)
4. [](https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c?pvs=4)
5. [](https://www.tenda.com.cn/)
### Credits
- syuvi (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29665
- **State**: PUBLISHED
- **Published Date**: April 17, 2023 at 00:00 UTC
- **Last Updated**: February 06, 2025 at 16:43 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR823G_V1.0.2B05 was discovered to contain a stack overflow via the NewPassword parameters in SetPasswdSettings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/boSetPasswdSettings) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10252
- **State**: PUBLISHED
- **Published Date**: February 19, 2021 at 06:12 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 09, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ownCloud before 10.4. Because of an SSRF issue (via the apps/files_sharing/external remote parameter), an authenticated attacker can interact with local services blindly (aka Blind SSRF) or conduct a Denial Of Service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://owncloud.org/changelog/server/)
2. [](https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=44)
3. [](https://owncloud.com/security-advisories/ssrf-in-add-to-your-owncloud-functionality/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32029
- **State**: PUBLISHED
- **Published Date**: June 13, 2023 at 23:25 UTC
- **Last Updated**: February 28, 2025 at 21:10 UTC
- **Reserved Date**: May 01, 2023 at 15:34 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
### References
1. [Microsoft Excel Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32029) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2990
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 01, 2024 at 16:24 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Order Tracker). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - iStore**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.9 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34855
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 13:16 UTC
- **Last Updated**: January 27, 2025 at 18:05 UTC
- **Reserved Date**: July 23, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Path traversal for the Intel(R) NUC Pro Software Suite before version 2.0.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**n/a - Intel(R) NUC Pro Software Suite**
Affected versions:
- before version 2.0.0.3 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00834.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00834.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0327
- **State**: PUBLISHED
- **Published Date**: December 10, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: May 20, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sybase Adaptive Server Enterprise (ASE) 12.5 allows remote attackers to cause a denial of service (hang) via a remote password array with an invalid length, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sybase-passwordarray-bo(13800)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13800)
2. [](http://www.rapid7.com/advisories/R7-0016.html)
3. [20031120 R7-0016: Sybase ASE 12.5 Remote Password Array Denial of Service](http://marc.info/?l=bugtraq&m=106936096103805&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1614
- **State**: PUBLISHED
- **Published Date**: May 11, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Leap CMS 0.1.4 allow remote attackers to inject arbitrary web script or HTML via (1) the msg parameter (aka the message in an article comment) or (2) the searchterm parameter (aka the search post form). NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8577](https://www.exploit-db.com/exploits/8577)
2. [34943](http://secunia.com/advisories/34943) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37819
- **State**: PUBLISHED
- **Published Date**: May 08, 2025 at 06:26 UTC
- **Last Updated**: June 04, 2025 at 12:57 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()
With ACPI in place, gicv2m_get_fwnode() is registered with the pci
subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime
during a PCI host bridge probe. But, the call back is wrongly marked as
__init, causing it to be freed, while being registered with the PCI
subsystem and could trigger:
Unable to handle kernel paging request at virtual address ffff8000816c0400
gicv2m_get_fwnode+0x0/0x58 (P)
pci_set_bus_msi_domain+0x74/0x88
pci_register_host_bridge+0x194/0x548
This is easily reproducible on a Juno board with ACPI boot.
Retain the function for later use.
### Affected Products
**Linux - Linux**
Affected versions:
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
- 0644b3daca28dcb320373ae20069c269c9386304 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.5 (Status: affected)
- 0 (Status: unaffected)
- 5.4.294 (Status: unaffected)
- 5.10.238 (Status: unaffected)
- 5.15.182 (Status: unaffected)
- 6.1.138 (Status: unaffected)
- 6.6.89 (Status: unaffected)
- 6.12.26 (Status: unaffected)
- 6.14.5 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/0c241dedc43a036599757cd08f356253fa3e5014)
2. [](https://git.kernel.org/stable/c/b63de43af8d215b0499eac28b2caa4439183efc1)
3. [](https://git.kernel.org/stable/c/f95659affee301464f0d058d528d96b35b452da8)
4. [](https://git.kernel.org/stable/c/dc0d654eb4179b06d3206e4396d072108b9ba082)
5. [](https://git.kernel.org/stable/c/2f2803e4b5e4df2b08d378deaab78b1681ef9b30)
6. [](https://git.kernel.org/stable/c/3939d6f29d34cdb60e3f68b76e39e00a964a1d51)
7. [](https://git.kernel.org/stable/c/47bee0081b483b077c7560bc5358ad101f89c8ef)
8. [](https://git.kernel.org/stable/c/3318dc299b072a0511d6dfd8367f3304fb6d9827) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1768
- **State**: PUBLISHED
- **Published Date**: February 07, 2020 at 15:42 UTC
- **Last Updated**: September 16, 2024 at 19:09 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: OTRS
### Vulnerability Description
The external frontend system uses numerous background calls to the backend. Each background request is treated as user activity so the SessionMaxIdleTime will not be reached. This issue affects: OTRS 7.0.x version 7.0.14 and prior versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**OTRS AG - OTRS**
Affected versions:
- 7.0.x (Status: affected)
### References
1. [](https://otrs.com/release-notes/otrs-security-advisory-2020-04/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4774
- **State**: PUBLISHED
- **Published Date**: October 28, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in main/main.php in QuestCMS allows remote attackers to inject arbitrary web script or HTML via the cx parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6853](https://www.exploit-db.com/exploits/6853)
2. [4523](http://securityreason.com/securityalert/4523)
3. [31945](http://www.securityfocus.com/bid/31945)
4. [questcms-main-xss(46149)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31065
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in Insurance Mangement System v.1.0.0 and before allows a remote attacker to execute arbitrary code via the City input field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://portswigger.net/web-security/cross-site-scripting/stored)
2. [](https://owasp.org/www-community/attacks/xss/)
3. [](https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2717
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3629
- **State**: PUBLISHED
- **Published Date**: November 02, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 06:38 UTC
- **Reserved Date**: October 09, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the Backend subcomponent in TYPO3 4.0.13 and earlier, 4.1.x before 4.1.13, 4.2.x before 4.2.10, and 4.3.x before 4.3beta2 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [typo3-backend-xss(53918)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53918)
2. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-016/)
3. [37122](http://secunia.com/advisories/37122)
4. [[oss-security] 20091023 Re: CVE id request: typo3](http://marc.info/?l=oss-security&m=125633199111438&w=2)
5. [[oss-security] 20091023 Re: CVE id request: typo3](http://marc.info/?l=oss-security&m=125632856206736&w=2)
6. [ADV-2009-3009](http://www.vupen.com/english/advisories/2009/3009)
7. [36801](http://www.securityfocus.com/bid/36801) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7677
- **State**: PUBLISHED
- **Published Date**: June 14, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 11, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table.
### Affected Products
**Apache Software Foundation - Apache Ranger**
Affected versions:
- 0.5.x (Status: affected)
- 0.6.x (Status: affected)
- 0.7.0 (Status: affected)
### References
1. [98961](http://www.securityfocus.com/bid/98961)
2. [](https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6749
- **State**: PUBLISHED
- **Published Date**: April 24, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: April 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in admin/usercheck.php in FlexPHPDirectory 0.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) checkuser and (2) checkpass parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33353](http://secunia.com/advisories/33353)
2. [flexphpdirectory-index-sql-injection(47640)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47640)
3. [51302](http://osvdb.org/51302)
4. [7614](https://www.exploit-db.com/exploits/7614) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3755
- **State**: PUBLISHED
- **Published Date**: February 13, 2020 at 15:45 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- , 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb20-05.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33058
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 10:15 UTC
- **Last Updated**: April 07, 2025 at 16:06 UTC
- **Reserved Date**: April 23, 2024 at 04:42 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while assigning memory from the source DDR memory(HLOS) to ADSP.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1220: Heap-based Buffer Overflow
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- AR8035 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCC710 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN9274 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- QCS8300 (Status: affected)
- QCS8550 (Status: affected)
- QCS9100 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QMP1000 (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8380XP (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SDX80M (Status: affected)
- SM4635 (Status: affected)
- SM6650 (Status: affected)
- SM7250P (Status: affected)
- SM7635 (Status: affected)
- SM7675 (Status: affected)
- SM7675P (Status: affected)
- SM8635 (Status: affected)
- SM8635P (Status: affected)
- SM8650Q (Status: affected)
- SM8735 (Status: affected)
- SM8750 (Status: affected)
- SM8750P (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR1 Gen 1 Platform (Status: affected)
- Snapdragon AR1 Gen 1 Platform "Luna1" (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2330P (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9378 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN6450 (Status: affected)
- WCN6650 (Status: affected)
- WCN6755 (Status: affected)
- WCN7750 (Status: affected)
- WCN7860 (Status: affected)
- WCN7861 (Status: affected)
- WCN7880 (Status: affected)
- WCN7881 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30014
- **State**: PUBLISHED
- **Published Date**: January 12, 2024 at 00:00 UTC
- **Last Updated**: June 03, 2025 at 14:06 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1893
- **State**: PUBLISHED
- **Published Date**: April 20, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in print.php in ar-blog 5.2 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [763](http://securityreason.com/securityalert/763)
2. [20060413 Xss In ar-blog v 5.2](http://www.securityfocus.com/archive/1/431030/100/0/threaded)
3. [17522](http://www.securityfocus.com/bid/17522)
4. [arblog-print-xss(25834)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18727
- **State**: PUBLISHED
- **Published Date**: April 24, 2020 at 13:02 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000051528/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36868
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 27, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper restriction of broadcasting Intent in MouseNKeyHidDevice prior to SMR Oct-2022 Release 1 leaks MAC address of the connected Bluetooth device.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- R(11), S(12) (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15538
- **State**: PUBLISHED
- **Published Date**: October 15, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 09:54 UTC
- **Reserved Date**: August 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Agentejo Cockpit has multiple Cross-Site Scripting vulnerabilities.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20181011 Cockpit CMS Multiple Vulnerabilities (CVE-2018-15538, CVE-2018-15539, CVE-2018-15540)](http://seclists.org/fulldisclosure/2018/Oct/30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0514
- **State**: PUBLISHED
- **Published Date**: May 03, 2012 at 17:18 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 11, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise CRM component in Oracle PeopleSoft Products 9.1 allows remote authenticated users to affect confidentiality, related to SEC.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53080](http://www.securityfocus.com/bid/53080)
2. [48876](http://secunia.com/advisories/48876)
3. [1026954](http://www.securitytracker.com/id?1026954)
4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html)
5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1027
- **State**: PUBLISHED
- **Published Date**: April 12, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 03:44 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel, Microsoft Office. This CVE ID is unique from CVE-2018-0920, CVE-2018-1011, CVE-2018-1029.
### Affected Products
**Microsoft - Microsoft Excel**
Affected versions:
- 2007 Service Pack 3 (Status: affected)
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
**Microsoft - Microsoft Office**
Affected versions:
- Compatibility Pack Service Pack 3 (Status: affected)
### References
1. [1040652](http://www.securitytracker.com/id/1040652)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027)
3. [103616](http://www.securityfocus.com/bid/103616) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0119
- **State**: PUBLISHED
- **Published Date**: January 09, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: January 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in EditTag 1.2 allow remote attackers to inject arbitrary web script or HTML via the plain parameter to (1) mkpw_mp.cgi, (2) mkpw.pl, or (3) mkpw.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070105 Multiple bugs in EditTag](http://www.securityfocus.com/archive/1/456055/100/0/threaded)
2. [33390](http://osvdb.org/33390)
3. [33392](http://osvdb.org/33392)
4. [7950](http://secunia.com/advisories/7950)
5. [21891](http://www.securityfocus.com/bid/21891)
6. [33391](http://osvdb.org/33391) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-49206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-49206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49206
- **State**: REJECTED
- **Last Updated**: June 04, 2025 at 02:55 UTC
- **Reserved Date**: June 03, 2025 at 07:46 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4436
- **State**: REJECTED
- **Last Updated**: May 20, 2025 at 22:16 UTC
- **Reserved Date**: May 08, 2025 at 15:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5474
- **State**: PUBLISHED
- **Published Date**: September 27, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 20:17 UTC
- **Reserved Date**: August 22, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Race condition in the IPv6 virtual fragmentation reassembly (VFR) implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.3 allows remote attackers to cause a denial of service (device reload or hang) via fragmented IPv6 packets, aka Bug ID CSCud64812.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130925 Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130925-ipv6vfr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4147
- **State**: PUBLISHED
- **Published Date**: September 16, 2019 at 18:55 UTC
- **Last Updated**: September 16, 2024 at 20:43 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
### Affected Products
**IBM - Sterling File Gateway**
Affected versions:
- 2.2.0.0 (Status: affected)
- 6.0.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/security-bulletin-sql-injection-vulnerability-affects-ibm-sterling-file-gateway-cve-2019-4147)
2. [ibm-sterling-cve20194147-sql-injection (158413)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158413) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28876
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 14:45 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: F-SecureUS
### Vulnerability Description
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L`
### Affected Products
**F-Secure - All F-Secure & WithSecure endpoint protection products for Windows and Mac. F-Secure Linux Security (32-bit). F-Secure Linux Security (64-bit). F-Secure Atlant. WithSecure Cloud Protection for Salesforce & WithSecure Collaboration Protection**
Affected versions:
- All Version (Status: affected)
### References
1. [](https://www.f-secure.com/en/business/support-and-downloads/security-advisories)
2. [](https://www.withsecure.com/en/support/security-advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5079
- **State**: PUBLISHED
- **Published Date**: September 29, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: September 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in class.mysql.php in Matt Humphrey paBugs 2.0 Beta 3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path_to_bt_dir parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20222](http://www.securityfocus.com/bid/20222)
2. [ADV-2006-3784](http://www.vupen.com/english/advisories/2006/3784)
3. [2437](https://www.exploit-db.com/exploits/2437)
4. [pabugs-class-file-include(29179)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29179) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1556
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 13:21 UTC
- **Last Updated**: November 12, 2024 at 20:10 UTC
- **Reserved Date**: February 15, 2024 at 18:01 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The incorrect object was checked for NULL in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *Note:* This issue only affects the application when the profiler is running. This vulnerability affects Firefox < 123.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1870414)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-05/)
### Credits
- Ronald Crane |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2847
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 27, 2024 at 19:04 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Depot Repair product of Oracle E-Business Suite (component: Estimate and Actual Charges). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Depot Repair. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Depot Repair, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Depot Repair accessible data as well as unauthorized update, insert or delete access to some of Oracle Depot Repair accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Depot Repair**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32082, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32082
- **State**: PUBLISHED
- **Published Date**: July 01, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 07:32 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jira.mariadb.org/browse/MDEV-26433)
2. [](https://security.netapp.com/advisory/ntap-20220818-0005/)
3. [FEDORA-2022-cf88f807f9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHISY4YVO4S5QJYYIXCIAXBM7INOL4VY/)
4. [FEDORA-2022-e0e9a43546](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCOEGSVMIEXDZHBOSV6WVF7FAVRBR2JE/)
5. [FEDORA-2022-333df1c4aa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTVAONAZXJFGHAJ4RP2OF3EAMQCOTDSQ/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6965
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 08:55 UTC
- **Last Updated**: August 05, 2024 at 15:49 UTC
- **Reserved Date**: March 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201709-02](https://security.gentoo.org/glsa/201709-02)
2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=21137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20676
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: January 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/twbs/bootstrap/issues/27044)
2. [](https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906)
3. [](https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/)
4. [](https://github.com/twbs/bootstrap/pull/27047)
5. [](https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628)
6. [RHSA-2019:1456](https://access.redhat.com/errata/RHSA-2019:1456)
7. [RHBA-2019:1076](https://access.redhat.com/errata/RHBA-2019:1076)
8. [RHBA-2019:1570](https://access.redhat.com/errata/RHBA-2019:1570)
9. [RHSA-2019:3023](https://access.redhat.com/errata/RHSA-2019:3023)
10. [RHSA-2020:0132](https://access.redhat.com/errata/RHSA-2020:0132)
11. [RHSA-2020:0133](https://access.redhat.com/errata/RHSA-2020:0133)
12. [[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list](https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E)
13. [](https://www.tenable.com/security/tns-2021-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3805
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The MediaTek power management driver in Android before 2016-07-05 on Android One devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28333002 and MediaTek internal bug ALPS02694412.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-07-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23861
- **State**: PUBLISHED
- **Published Date**: May 18, 2021 at 15:02 UTC
- **Last Updated**: August 04, 2024 at 15:05 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LibreDWG/libredwg/issues/248) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50576
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 12:55 UTC
- **Last Updated**: October 28, 2024 at 13:34 UTC
- **Reserved Date**: October 24, 2024 at 15:56 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains YouTrack before 2024.3.47707 stored XSS was possible via vendor URL in App manifest
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Affected Products
**JetBrains - YouTrack**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0781
- **State**: PUBLISHED
- **Published Date**: February 19, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in weblog.pl in PerlBlog 1.09b and earlier allows remote attackers to read certain files via the month parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [perlblog-weblog-directory-traversal(24690)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24690)
2. [20060227 [eVuln] PerlBlog Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/426260/100/0/threaded)
3. [](http://evuln.com/vulns/81/summary.html)
4. [508](http://securityreason.com/securityalert/508)
5. [18924](http://secunia.com/advisories/18924)
6. [16707](http://www.securityfocus.com/bid/16707) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12256
- **State**: PUBLISHED
- **Published Date**: August 09, 2019 at 17:57 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets’ IP options.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support2.windriver.com/index.php?page=security-notices)
2. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf)
4. [](https://security.netapp.com/advisory/ntap-20190802-0001/)
5. [](https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/)
6. [](https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12256)
7. [](https://support.f5.com/csp/article/K41190253)
8. [](https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf)
9. [](https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35747
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 18:07 UTC
- **Last Updated**: January 02, 2025 at 19:33 UTC
- **Reserved Date**: July 13, 2022 at 18:19 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27020
- **State**: PUBLISHED
- **Published Date**: August 30, 2021 at 17:56 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 09, 2021 at 00:00 UTC
- **Assigned By**: puppet
### Vulnerability Description
Puppet Enterprise presented a security risk by not sanitizing user input when doing a CSV export.
### Affected Products
**n/a - Puppet Enterprise**
Affected versions:
- Puppet Enterprise prior to 2019.8.6 (Status: affected)
### References
1. [](https://puppet.com/security/cve/CVE-2021-27020) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29807
- **State**: PUBLISHED
- **Published Date**: March 21, 2025 at 00:29 UTC
- **Last Updated**: May 19, 2025 at 21:38 UTC
- **Reserved Date**: March 11, 2025 at 18:19 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
- CWE-94: Code Injection
### Affected Products
**Microsoft - Microsoft Dataverse**
Affected versions:
- N/A (Status: affected)
### References
1. [Microsoft Dataverse Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29807) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3682
- **State**: PUBLISHED
- **Published Date**: January 17, 2020 at 08:30 UTC
- **Last Updated**: September 17, 2024 at 00:21 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: suse
### Vulnerability Description
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**SUSE - SUSE CaaS Platform 3.0**
Affected versions:
- docker-kubic (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1121148) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6293
- **State**: PUBLISHED
- **Published Date**: June 24, 2024 at 21:46 UTC
- **Last Updated**: February 13, 2025 at 17:57 UTC
- **Reserved Date**: June 24, 2024 at 18:28 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 126.0.6478.126 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html)
2. [](https://issues.chromium.org/issues/345993680)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2529
- **State**: PUBLISHED
- **Published Date**: October 09, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: May 09, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Windows Kernel Integer Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS12-068](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-068)
2. [TA12-283A](http://www.us-cert.gov/cas/techalerts/TA12-283A.html)
3. [oval:org.mitre.oval:def:15867](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15867) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15593
- **State**: PUBLISHED
- **Published Date**: November 22, 2019 at 21:57 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 26, 2019 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**n/a - GitLab**
Affected versions:
- 12.2.3 (Status: affected)
### References
1. [](https://hackerone.com/reports/557154) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2124
- **State**: PUBLISHED
- **Published Date**: April 18, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 13:23 UTC
- **Reserved Date**: April 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Portal component in Oracle Application Server 10.1.4.1.0 has unknown impact and remote attack vectors, aka AS05.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA07-108A](http://www.us-cert.gov/cas/techalerts/TA07-108A.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpuapr2007-090632.html)
3. [23532](http://www.securityfocus.com/bid/23532)
4. [1017927](http://www.securitytracker.com/id?1017927)
5. [SSRT061201](http://www.securityfocus.com/archive/1/466329/100/200/threaded)
6. [](http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html)
7. [HPSBMA02133](http://www.securityfocus.com/archive/1/466329/100/200/threaded)
8. [ADV-2007-1426](http://www.vupen.com/english/advisories/2007/1426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51507
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 01:01 UTC
- **Last Updated**: August 02, 2024 at 22:32 UTC
- **Reserved Date**: December 20, 2023 at 15:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.16.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ExpressTech - Quiz And Survey Master**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-16-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Revan Arifio (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7449
- **State**: PUBLISHED
- **Published Date**: April 21, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 18:09 UTC
- **Reserved Date**: April 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d)
2. [USN-2945-1](http://www.ubuntu.com/usn/USN-2945-1)
3. [](https://github.com/hexchat/hexchat/issues/524)
4. [](http://hexchat.readthedocs.org/en/latest/changelog.html)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1081839) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-7044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-7044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7044
- **State**: PUBLISHED
- **Published Date**: February 24, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 20:50 UTC
- **Reserved Date**: February 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in comment.core.inc.php in Clan Manager Pro (CMPRO) 1.11 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26223](http://www.osvdb.org/26223)
2. [cmpro-comment-file-include(27059)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27059)
3. [](http://sx02.coresec.de/advisories/150.txt)
4. [ADV-2006-2195](http://www.vupen.com/english/advisories/2006/2195) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5866
- **State**: PUBLISHED
- **Published Date**: January 07, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 07, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Proxim Wireless Tsunami MP.11 2411 with firmware 3.0.3 has public as its default SNMP read/write community, which makes it easier for remote attackers to obtain sensitive information or modify SNMP variables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-24)
2. [20081009 PR08-24: Proxim Tsunami MP.11 2411 vulnerable to SNMP Injection](http://www.securityfocus.com/archive/1/497182/100/0/threaded)
3. [4884](http://securityreason.com/securityalert/4884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15400
- **State**: PUBLISHED
- **Published Date**: June 30, 2020 at 11:42 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: June 30, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CakePHP before 4.0.6 mishandles CSRF token generation. This might be remotely exploitable in conjunction with XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bakery.cakephp.org/2020/04/18/cakephp_406_released.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4958
- **State**: REJECTED
- **Published Date**: January 03, 2018 at 15:00 UTC
- **Last Updated**: January 03, 2018 at 14:57 UTC
- **Reserved Date**: December 29, 2016 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0906
- **State**: PUBLISHED
- **Published Date**: August 13, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Service Component Architecture (SCA) feature pack for IBM WebSphere Application Server (WAS) SCA 1.0 before 1.0.0.3 allows remote authenticated users to bypass intended authentication.transport access restrictions and obtain unspecified access via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [was-sca-scaallauthorizedusers-sec-bypass(52074)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52074)
2. [PK86047](http://www-1.ibm.com/support/docview.wss?uid=swg1PK86047)
3. [36306](http://secunia.com/advisories/36306)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg27015429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1838
- **State**: PUBLISHED
- **Published Date**: May 20, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10170)
3. [RHSA-2016:1292](https://access.redhat.com/errata/RHSA-2016:1292)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
5. [](https://support.apple.com/HT206567)
6. [90691](http://www.securityfocus.com/bid/90691)
7. [DSA-3593](https://www.debian.org/security/2016/dsa-3593)
8. [](https://bugzilla.gnome.org/show_bug.cgi?id=758588)
9. [](http://xmlsoft.org/news.html)
10. [](https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9)
11. [APPLE-SA-2016-05-16-4](http://lists.apple.com/archives/security-announce/2016/May/msg00004.html)
12. [USN-2994-1](http://www.ubuntu.com/usn/USN-2994-1)
13. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=639)
14. [](https://support.apple.com/HT206566)
15. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html)
16. [](https://www.tenable.com/security/tns-2016-18)
17. [APPLE-SA-2016-05-16-3](http://lists.apple.com/archives/security-announce/2016/May/msg00003.html)
18. [](https://support.apple.com/HT206564)
19. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html)
20. [GLSA-201701-37](https://security.gentoo.org/glsa/201701-37)
21. [1035890](http://www.securitytracker.com/id/1035890)
22. [APPLE-SA-2016-05-16-2](http://lists.apple.com/archives/security-announce/2016/May/msg00002.html)
23. [](https://support.apple.com/HT206568)
24. [APPLE-SA-2016-05-16-1](http://lists.apple.com/archives/security-announce/2016/May/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0541
- **State**: PUBLISHED
- **Published Date**: September 02, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 20, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://fuse.git.sourceforge.net/git/gitweb.cgi?p=fuse/fuse%3Ba=commit%3Bh=bf5ffb5fd8558bd799791834def431c0cee5a11f)
2. [[oss-security] 20110201 CVE request: fuse](http://www.openwall.com/lists/oss-security/2011/02/02/2)
3. [SUSE-SR:2011:005](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html)
4. [[oss-security] 20110203 Re: CVE request: fuse](http://www.openwall.com/lists/oss-security/2011/02/03/5)
5. [[oss-security] 20110208 Re: CVE request: fuse](http://www.openwall.com/lists/oss-security/2011/02/08/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40647
- **State**: PUBLISHED
- **Published Date**: September 15, 2022 at 15:26 UTC
- **Last Updated**: August 03, 2024 at 12:21 UTC
- **Reserved Date**: September 13, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17558.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Ansys - SpaceClaim**
Affected versions:
- 2022 R1 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1203/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2812
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 10:52 UTC
- **Last Updated**: December 09, 2024 at 21:13 UTC
- **Reserved Date**: May 19, 2023 at 13:39 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Ultimate Dashboard WordPress plugin before 3.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Ultimate Dashboard**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7de4c313-359e-4450-85f5-d29f3c2f046a)
### Credits
- Ilyase Dehy and Aymane Mazguiti
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6930
- **State**: PUBLISHED
- **Published Date**: October 04, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Abram Radio Groove! (aka com.nobexinc.wls_79226887.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#951217](http://www.kb.cert.org/vuls/id/951217) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24407
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:31 UTC
- **Last Updated**: December 09, 2024 at 18:42 UTC
- **Reserved Date**: January 23, 2023 at 18:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WpDevArt Booking calendar, Appointment Booking System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through 3.2.3.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WpDevArt - Booking calendar, Appointment Booking System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/booking-calendar/vulnerability/wordpress-booking-calendar-appointment-booking-system-plugin-3-2-3-broken-access-control?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13817
- **State**: REJECTED
- **Last Updated**: January 31, 2025 at 02:46 UTC
- **Reserved Date**: January 31, 2025 at 01:21 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9166
- **State**: PUBLISHED
- **Published Date**: September 26, 2024 at 16:55 UTC
- **Last Updated**: September 26, 2024 at 18:23 UTC
- **Reserved Date**: September 24, 2024 at 19:19 UTC
- **Assigned By**: icscert
### Vulnerability Description
The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Atelmo - Atemio AM 520 HD Full HD Satellite Receiver**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-03)
### Credits
- CISA discovered a public Proof of Concept (PoC) as authored by Gjoko Krstic and reported it to Atelmo. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.