System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0035
- **State**: PUBLISHED
- **Published Date**: January 16, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: January 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Foundation, as used in Apple iPhone 1.0 through 1.1.2, iPod touch 1.1 through 1.1.2, and Mac OS X 10.5 through 10.5.1, allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted URL that triggers memory corruption in Safari.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://docs.info.apple.com/article.html?artnum=307430)
2. [28891](http://secunia.com/advisories/28891)
3. [27296](http://www.securityfocus.com/bid/27296)
4. [](http://docs.info.apple.com/article.html?artnum=307302)
5. [ADV-2008-0495](http://www.vupen.com/english/advisories/2008/0495/references)
6. [iphone-ipod-foundation-code-execution(39700)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39700)
7. [28497](http://secunia.com/advisories/28497)
8. [TA08-043B](http://www.us-cert.gov/cas/techalerts/TA08-043B.html)
9. [APPLE-SA-2008-01-15](http://lists.apple.com/archives/security-announce/2008/Jan/msg00000.html)
10. [APPLE-SA-2008-02-11](http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html)
11. [1019220](http://www.securitytracker.com/id?1019220)
12. [ADV-2008-0147](http://www.vupen.com/english/advisories/2008/0147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48214
- **State**: PUBLISHED
- **Published Date**: October 30, 2024 at 00:00 UTC
- **Last Updated**: October 31, 2024 at 15:22 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KERUI HD 3MP 1080P Tuya Camera 1.0.4 has a command injection vulnerability in the module that connects to the local network via a QR code. This vulnerability allows an attacker to create a custom, unauthenticated QR code and abuse one of the parameters, either SSID or PASSWORD, in the JSON data contained within the QR code. By that, the attacker can execute arbitrary code on the camera.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40shenhavmor/exploiting-a-chinese-camera-for-fun-cve-2024-48214-2d56848870c2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5155
- **State**: PUBLISHED
- **Published Date**: February 26, 2019 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: February 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793)
2. [](https://security.netapp.com/advisory/ntap-20190315-0002/)
3. [](https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806)
4. [](https://sourceware.org/bugzilla/show_bug.cgi?id=18986)
5. [](https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672)
6. [](http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272)
7. [](https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238)
8. [](https://sourceware.org/bugzilla/show_bug.cgi?id=11053)
9. [](https://support.f5.com/csp/article/K64119434)
10. [](https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS)
11. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E)
12. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0149
- **State**: REJECTED
- **Last Updated**: May 16, 2023 at 00:00 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4874
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42272
- **State**: PUBLISHED
- **Published Date**: November 18, 2021 at 16:44 UTC
- **Last Updated**: April 23, 2025 at 19:20 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - Animate**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/animate/apsb21-105.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1914
- **State**: PUBLISHED
- **Published Date**: August 07, 2019 at 05:50 UTC
- **Last Updated**: November 20, 2024 at 17:14 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious request to certain parts of the web management interface. To send the malicious request, the attacker needs a valid login session in the web management interface as a privilege level 15 user. Depending on the configuration of the affected switch, the malicious request must be sent via HTTP or HTTPS. A successful exploit could allow the attacker to execute arbitrary shell commands with the privileges of the root user.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco Small Business 220 Series Smart Plus Switches**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190806 Cisco Small Business 220 Series Smart Switches Command Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-inject)
2. [](http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7014
- **State**: PUBLISHED
- **Published Date**: June 03, 2020 at 17:55 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 14, 2020 at 00:00 UTC
- **Assigned By**: elastic
### Vulnerability Description
The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
### Weakness Classification (CWE)
- CWE-266: Security Weakness
### Affected Products
**Elastic - Elasticsearch**
Affected versions:
- 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 (Status: affected)
### References
1. [](https://www.elastic.co/community/security/)
2. [](https://security.netapp.com/advisory/ntap-20200619-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14581
- **State**: PUBLISHED
- **Published Date**: July 31, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 09:29 UTC
- **Reserved Date**: July 24, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Redgate .NET Reflector before 10.0.7.774 and SmartAssembly before 6.12.5 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific embedded resource file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.red-gate.com/sa6/release-notes-and-other-versions/smartassembly-6-12-release-notes)
2. [](https://documentation.red-gate.com/ref10/release-notes-and-other-versions/net-reflector-10-0-release-notes)
3. [](https://www.nccgroup.trust/us/our-research/technical-advisory-code-execution-by-viewing-resource-files-in-.net-reflector/?research=Technical+advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2008
- **State**: PUBLISHED
- **Published Date**: April 29, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:41 UTC
- **Reserved Date**: April 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Display Names message feature in Cerulean Studios Trillian Basic and Pro 3.1.9.0 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long nickname in an MSN protocol message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29952](http://secunia.com/advisories/29952)
2. [3849](http://securityreason.com/securityalert/3849)
3. [28925](http://www.securityfocus.com/bid/28925)
4. [ADV-2008-1368](http://www.vupen.com/english/advisories/2008/1368/references)
5. [20080424 Trillian 3.1 basic nick crash](http://www.securityfocus.com/archive/1/491281/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3136
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: isc
### Vulnerability Description
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
### Affected Products
**ISC - BIND 9**
Affected versions:
- 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8 (Status: affected)
### References
1. [RHSA-2017:1095](https://access.redhat.com/errata/RHSA-2017:1095)
2. [GLSA-201708-01](https://security.gentoo.org/glsa/201708-01)
3. [](https://security.netapp.com/advisory/ntap-20180802-0002/)
4. [](https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us)
5. [DSA-3854](https://www.debian.org/security/2017/dsa-3854)
6. [1038259](http://www.securitytracker.com/id/1038259)
7. [97653](http://www.securityfocus.com/bid/97653)
8. [RHSA-2017:1105](https://access.redhat.com/errata/RHSA-2017:1105)
9. [](https://kb.isc.org/docs/aa-01465)
10. [openSUSE-SU-2020:1699](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html)
11. [openSUSE-SU-2020:1701](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html)
### Credits
- ISC would like to thank Oleg Gorokhov of Yandex for making us aware of this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2174
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:53 UTC
- **Last Updated**: September 26, 2024 at 15:31 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.33 and prior (Status: affected)
- 8.0.23 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
2. [FEDORA-2021-01189f6361](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/)
3. [FEDORA-2021-5b6c69a73a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/)
4. [FEDORA-2021-b8b7829a83](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/)
5. [](https://security.netapp.com/advisory/ntap-20210513-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6056
- **State**: PUBLISHED
- **Published Date**: March 27, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Call Center for Commerce 9.3 and 9.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 2000442.
### Affected Products
**IBM Corporation - Call Center for Commerce**
Affected versions:
- 9.3 (Status: affected)
- 9.4 (Status: affected)
### References
1. [96975](http://www.securityfocus.com/bid/96975)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22000442) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26032
- **State**: PUBLISHED
- **Published Date**: December 28, 2020 at 07:56 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An SSRF issue was discovered in Zammad before 3.4.1. The SMS configuration interface for Massenversand is implemented in a way that renders the result of a test request to the User. An attacker can use this to request any URL via a GET request from the network interface of the server. This may lead to disclosure of information from intranet systems.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zammad.com/news/security-advisory-zaa-2020-15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28815
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 00:56 UTC
- **Reserved Date**: March 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the BluStar component of Mitel InAttend 2.6 SP4 through 2.7 and CMG 8.5 SP4 through 8.6 could allow access to sensitive information, changes to the system configuration, or execution of arbitrary commands within the context of the system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mitel.com/support/security-advisories)
2. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0003)
3. [](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0003-001-v1.pdf)
4. [](https://cwe.mitre.org/data/definitions/1188.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2690
- **State**: PUBLISHED
- **Published Date**: August 10, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2009:1200](https://rhn.redhat.com/errata/RHSA-2009-1200.html)
2. [36162](http://secunia.com/advisories/36162)
3. [ADV-2009-2543](http://www.vupen.com/english/advisories/2009/2543)
4. [GLSA-200911-02](http://security.gentoo.org/glsa/glsa-200911-02.xml)
5. [](http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1)
6. [oval:org.mitre.oval:def:9443](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9443)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=513223)
8. [MDVSA-2009:209](http://www.mandriva.com/security/advisories?name=MDVSA-2009:209)
9. [FEDORA-2009-8329](https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html)
10. [](http://java.sun.com/javase/6/webnotes/6u15.html)
11. [36180](http://secunia.com/advisories/36180)
12. [36176](http://secunia.com/advisories/36176)
13. [FEDORA-2009-8337](https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html)
14. [SUSE-SR:2009:016](http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html)
15. [APPLE-SA-2009-09-03-1](http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html)
16. [RHSA-2009:1201](https://rhn.redhat.com/errata/RHSA-2009-1201.html)
17. [37386](http://secunia.com/advisories/37386) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11279
- **State**: PUBLISHED
- **Published Date**: January 18, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 18, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Lack of check of input size can make device memory get corrupted because of buffer overflow in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 810, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 810, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins)
2. [106128](http://www.securityfocus.com/bid/106128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34755
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 00:00 UTC
- **Last Updated**: January 03, 2025 at 15:16 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the userid parameter at admin/index.php?mode=user&action=edit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3954
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 17:17 UTC
- **Last Updated**: August 04, 2024 at 07:52 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
Open Redirect vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation.
### Affected Products
**n/a - VMware vRealize Log Insight**
Affected versions:
- VMware vRealize Log Insight prior to 8.1.0 (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2020-0007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6948
- **State**: PUBLISHED
- **Published Date**: August 12, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in Collabtive 0.4.8 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and using a text/plain MIME type, then accessing it via a direct request to the file in files/, related to (1) the showproject action in managefile.php or (2) the Messages feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7076](https://www.exploit-db.com/exploits/7076)
2. [20081110 Collabtive 0.4.8 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/498186/100/0/threaded)
3. [32229](http://www.securityfocus.com/bid/32229)
4. [collabtive-managefile-file-upload(46498)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46498) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33191
- **State**: PUBLISHED
- **Published Date**: July 22, 2022 at 16:46 UTC
- **Last Updated**: February 20, 2025 at 20:15 UTC
- **Reserved Date**: June 30, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (contributor or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Chinmoy Paul's Testimonials plugin <= 3.0.1 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Chinmoy Paul (chinmoy29) - Testimonials (WordPress plugin)**
Affected versions:
- <= 3.0.1 (Status: affected)
### References
1. [](https://wordpress.org/plugins/testimonials/#description)
2. [](https://patchstack.com/database/vulnerability/testimonials/wordpress-testimonials-plugin-3-0-1-authenticated-stored-cross-site-scripting-xss-vulnerability)
### Credits
- Vulnerability discovered by Ngo Van Thien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7876
- **State**: PUBLISHED
- **Published Date**: June 15, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 14, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
This command injection vulnerability in QTS allows attackers to run arbitrary commands in the compromised application. QNAP have already fixed the issue in QTS 4.2.6 build 20170517, QTS 4.3.3.0174 build 20170503 and later versions.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.qnap.com/en/release-notes/qts/4.3.3.0174/20170503)
2. [](https://www.qnap.com/en/release-notes/qts/4.2.6/20170517)
3. [](https://www.qnap.com/zh-tw/security-advisory/nas-201707-12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3828
- **State**: PUBLISHED
- **Published Date**: October 30, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:38 UTC
- **Reserved Date**: October 30, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web interface for Everfocus EDR1600 DVR allows remote attackers to bypass authentication and access live cams via certain vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20091022 Everfocus EDR1600 remote authentication bypass](http://www.securityfocus.com/archive/1/507373/100/100/threaded)
2. [everfocus-authentication-sec-bypass(53909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53909)
3. [59139](http://www.osvdb.org/59139)
4. [37108](http://secunia.com/advisories/37108)
5. [20091022 Everfocus EDR1600 remote authentication bypass](http://seclists.org/fulldisclosure/2009/Oct/293) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1407
- **State**: PUBLISHED
- **Published Date**: March 07, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: February 28, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the GO Message Widget (com.gau.go.launcherex.gowidget.smswidget) application 1.9, 2.1, and 2.3 for Android has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1407-vulnerability-in-GOMessageWidget.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0134
- **State**: PUBLISHED
- **Published Date**: February 08, 2018 at 07:00 UTC
- **Last Updated**: December 02, 2024 at 21:09 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to determine whether a subscriber username is valid. The vulnerability occurs because the Cisco Policy Suite RADIUS server component returns different authentication failure messages based on the validity of usernames. An attacker could use these messages to determine whether a valid subscriber username has been identified. The attacker could use this information in subsequent attacks against the system. Cisco Bug IDs: CSCvg47830.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Cisco Policy Suite**
Affected versions:
- Cisco Policy Suite (Status: affected)
### References
1. [102954](http://www.securityfocus.com/bid/102954)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5525
- **State**: PUBLISHED
- **Published Date**: June 03, 2025 at 20:00 UTC
- **Last Updated**: June 03, 2025 at 20:14 UTC
- **Reserved Date**: June 03, 2025 at 12:50 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Jrohy trojan up to 2.15.3. It has been declared as critical. This vulnerability affects the function LogChan of the file trojan/util/linux.go. The manipulation of the argument c leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
- CWE-77: Security Weakness
### Affected Products
**Jrohy - trojan**
Affected versions:
- 2.15.0 (Status: affected)
- 2.15.1 (Status: affected)
- 2.15.2 (Status: affected)
- 2.15.3 (Status: affected)
### References
1. [VDB-310966 | Jrohy trojan linux.go LogChan os command injection](https://vuldb.com/?id.310966)
2. [VDB-310966 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310966)
3. [Submit #586673 | https://github.com/Jrohy https://github.com/Jrohy/trojan v2.15.3 Command Injection](https://vuldb.com/?submit.586673)
4. [](https://github.com/ainrm/Jrohy-trojan-unauth-poc/blob/main/README.en.md)
5. [](https://github.com/Tritium0041/Jrohy-trojan-RCE-POC/blob/main/POC.py)
### Credits
- Tritium (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52429
- **State**: PUBLISHED
- **Published Date**: February 12, 2024 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 15:54 UTC
- **Reserved Date**: February 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.spinics.net/lists/dm-devel/msg56625.html)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4)
3. [FEDORA-2024-88847bc77a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/)
4. [FEDORA-2024-987089eca2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/)
5. [[debian-lts-announce] 20240625 [SECURITY] [DLA 3842-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html)
6. [[debian-lts-announce] 20240627 [SECURITY] [DLA 3840-1] linux security update](https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4567
- **State**: PUBLISHED
- **Published Date**: December 13, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via a \b (backspace) character in CSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [63760](http://www.securityfocus.com/bid/63760)
2. [57472](http://secunia.com/advisories/57472)
3. [DSA-2891](http://www.debian.org/security/2014/dsa-2891)
4. [[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9](http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html)
5. [FEDORA-2013-21856](http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html)
6. [FEDORA-2013-21874](http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html)
7. [](https://bugzilla.wikimedia.org/show_bug.cgi?id=55332) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5054
- **State**: PUBLISHED
- **Published Date**: September 11, 2019 at 21:09 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable denial-of-service vulnerability exists in the session handling functionality of the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) HTTP server. An HTTP request with an empty User-Agent string sent to a page requiring authentication can cause a null pointer dereference, resulting in the HTTP service crashing. An unauthenticated attacker can send a specially crafted HTTP request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Netgear - N300 WNR2000v5**
Affected versions:
- Firmware Version V1.0.0.70 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0831) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29965
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 21:14 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. Access to privileged operations on the maintenance port TELNET interface (23/TCP) on M-series and SIS (CSLS/LSNB/LSNG) nodes is controlled by means of utility passwords. These passwords are generated using a deterministic, insecure algorithm using a single seed value composed of a day/hour/minute timestamp with less than 16 bits of entropy. The seed value is fed through a lookup table and a series of permutation operations resulting in three different four-character passwords corresponding to different privilege levels. An attacker can easily reconstruct these passwords and thus gain access to privileged maintenance operations. NOTE: this is different from CVE-2014-2350.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.forescout.com/blog/)
2. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0445
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 20:03 UTC
- **Last Updated**: August 01, 2024 at 18:04 UTC
- **Reserved Date**: January 11, 2024 at 21:28 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's element attributes in all versions up to, and including, 5.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-34373 is likely a duplicate of this issue.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**posimyththemes - The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a412e682-869a-46ba-a2d0-d84ed542adc9?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_pricing_table.php#L2942)
3. [](https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_flip_box.php#L2323)
4. [](https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_info_box.php#L2928)
5. [](https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_pricing_table.php#L2960)
6. [](https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_flip_box.php#L2388)
7. [](https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_info_box.php#L2997)
### Credits
- Craig Smith |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51465
- **State**: PUBLISHED
- **Published Date**: December 04, 2024 at 14:08 UTC
- **Last Updated**: December 04, 2024 at 14:29 UTC
- **Reserved Date**: October 28, 2024 at 10:50 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM App Connect Enterprise Certified Container 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, and 12.3 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**IBM - App Connect Enterprise Certified Container**
Affected versions:
- 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7177814) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1692
- **State**: PUBLISHED
- **Published Date**: April 11, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 10, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in MWNewsletter 1.0.0b allow remote attackers to execute arbitrary SQL commands via the (1) user_email parameter to (a) unsubscribe.php or (b) subscribe.php; or the (2) user_name parameter to subscribe.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it is likely that this was discovered during post-disclosure analysis.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19568](http://secunia.com/advisories/19568)
2. [ADV-2006-1270](http://www.vupen.com/english/advisories/2006/1270)
3. [24905](http://www.osvdb.org/24905)
4. [24445](http://www.osvdb.org/24445) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18926
- **State**: PUBLISHED
- **Published Date**: November 06, 2020 at 17:48 UTC
- **Last Updated**: August 05, 2024 at 21:45 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2017/06/07/1)
2. [](https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1)
3. [[debian-lts-announce] 20201107 [SECURITY] [DLA 2438-1] raptor2 security update](https://lists.debian.org/debian-lts-announce/2020/11/msg00012.html)
4. [DSA-4785](https://www.debian.org/security/2020/dsa-4785)
5. [[oss-security] 20201113 Buffer Overflow in raptor widely unfixed in Linux distros](http://www.openwall.com/lists/oss-security/2020/11/13/1)
6. [[oss-security] 20201113 Re: Buffer Overflow in raptor widely unfixed in Linux distros](http://www.openwall.com/lists/oss-security/2020/11/13/2)
7. [[oss-security] 20201114 Re: Buffer Overflow in raptor widely unfixed in Linux distros](http://www.openwall.com/lists/oss-security/2020/11/14/2)
8. [[oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros](http://www.openwall.com/lists/oss-security/2020/11/16/3)
9. [[oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros](http://www.openwall.com/lists/oss-security/2020/11/16/2)
10. [FEDORA-2020-b15dd44972](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RD67AVORGQXORPWNYYUHCH6YPPT6CI4O/)
11. [FEDORA-2020-d6675a61f1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVHFYQDMVEBICIL4DBAGRRLPUR4QYWMV/)
12. [FEDORA-2020-3c1e69f1b1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDZRNM45VPTQF2BKRWG4YRCHJGQ2L7NS/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13345
- **State**: PUBLISHED
- **Published Date**: July 05, 2019 at 15:45 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/squid-cache/squid/pull/429)
2. [](https://bugs.squid-cache.org/show_bug.cgi?id=4957)
3. [[debian-lts-announce] 20190707 [SECURITY] [DLA 1847-1] squid3 security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00006.html)
4. [USN-4059-1](https://usn.ubuntu.com/4059-1/)
5. [USN-4059-2](https://usn.ubuntu.com/4059-2/)
6. [109095](http://www.securityfocus.com/bid/109095)
7. [FEDORA-2019-c1e06901bc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X2ERPHSPUGOYVVRPQRASQBFGS2EJISFC/)
8. [FEDORA-2019-cb50bcc189](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPXN2CLAGN5QSQBTOV5IGVLDOQSRFNTZ/)
9. [openSUSE-SU-2019:1963](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00067.html)
10. [DSA-4507](https://www.debian.org/security/2019/dsa-4507)
11. [20190825 [SECURITY] [DSA 4507-1] squid security update](https://seclists.org/bugtraq/2019/Aug/42)
12. [RHSA-2019:3476](https://access.redhat.com/errata/RHSA-2019:3476)
13. [openSUSE-SU-2019:2540](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html)
14. [openSUSE-SU-2019:2541](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html)
15. [[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36669
- **State**: PUBLISHED
- **Published Date**: September 14, 2022 at 03:10 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code-projects.org/hospital-information-system-in-php-with-source-code/)
2. [](https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md)
3. [](https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System)
4. [](https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28914
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 21:00 UTC
- **Last Updated**: March 12, 2025 at 13:49 UTC
- **Reserved Date**: March 11, 2025 at 08:09 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ajay Sharma wordpress login form to anywhere allows Stored XSS. This issue affects wordpress login form to anywhere: from n/a through 0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ajay Sharma - wordpress login form to anywhere**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-show-login-form/vulnerability/wordpress-wordpress-login-form-to-anywhere-plugin-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53458
- **State**: PUBLISHED
- **Published Date**: March 05, 2025 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 20:45 UTC
- **Reserved Date**: November 20, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/182468/Sysax-Multi-Server-6.99-SSH-Denial-Of-Service.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2791
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 22:31 UTC
- **Last Updated**: October 01, 2024 at 16:41 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Audit Plug-in). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.26 and prior (Status: affected)
- 8.0.16 and prior (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html)
2. [USN-4070-1](https://usn.ubuntu.com/4070-1/)
3. [](https://support.f5.com/csp/article/K23125024)
4. [](https://support.f5.com/csp/article/K23125024?utm_source=f5support&%3Butm_medium=RSS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7380
- **State**: PUBLISHED
- **Published Date**: September 05, 2024 at 11:00 UTC
- **Last Updated**: September 05, 2024 at 18:16 UTC
- **Reserved Date**: August 01, 2024 at 12:41 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Geo Controller plugin for WordPress is vulnerable to unauthorized menu creation/deletion due to missing capability checks on the ajax__geolocate_menu and ajax__geolocate_remove_menu functions in all versions up to, and including, 8.6.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create or delete WordPress menus.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**creativform - Geo Controller**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/280e1b4d-08be-4e77-abcb-5f9079111595?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/cf-geoplugin/tags/8.6.9/inc/classes/Menus.php#L519)
3. [](https://plugins.trac.wordpress.org/browser/cf-geoplugin/tags/8.6.9/inc/classes/Menus.php#L606)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11378
- **State**: PUBLISHED
- **Published Date**: April 20, 2019 at 14:51 UTC
- **Last Updated**: August 04, 2024 at 22:48 UTC
- **Reserved Date**: April 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/projectsend/projectsend/issues/700)
2. [108069](http://www.securityfocus.com/bid/108069) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49364
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:11 UTC
- **Last Updated**: May 04, 2025 at 08:36 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to clear dirty inode in f2fs_evict_inode()
As Yanming reported in bugzilla:
https://bugzilla.kernel.org/show_bug.cgi?id=215904
The kernel message is shown below:
kernel BUG at fs/f2fs/inode.c:825!
Call Trace:
evict+0x282/0x4e0
__dentry_kill+0x2b2/0x4d0
shrink_dentry_list+0x17c/0x4f0
shrink_dcache_parent+0x143/0x1e0
do_one_tree+0x9/0x30
shrink_dcache_for_umount+0x51/0x120
generic_shutdown_super+0x5c/0x3a0
kill_block_super+0x90/0xd0
kill_f2fs_super+0x225/0x310
deactivate_locked_super+0x78/0xc0
cleanup_mnt+0x2b7/0x480
task_work_run+0xc8/0x150
exit_to_user_mode_prepare+0x14a/0x150
syscall_exit_to_user_mode+0x1d/0x40
do_syscall_64+0x48/0x90
The root cause is: inode node and dnode node share the same nid,
so during f2fs_evict_inode(), dnode node truncation will invalidate
its NAT entry, so when truncating inode node, it fails due to
invalid NAT entry, result in inode is still marked as dirty, fix
this issue by clearing dirty for inode and setting SBI_NEED_FSCK
flag in filesystem.
output from dump.f2fs:
[print_node_info: 354] Node ID [0xf:15] is inode
i_nid[0] [0x f : 15]
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4.198 (Status: unaffected)
- 5.10.121 (Status: unaffected)
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/54c116615c99e22aa08aa950757ed726e2f60821)
2. [](https://git.kernel.org/stable/c/ccd58045beb997544b94558a9156be4742628491)
3. [](https://git.kernel.org/stable/c/c9196d21359be8c7ee231029d13682273925fd00)
4. [](https://git.kernel.org/stable/c/03c9373b15fa1c245ec99b2b5e7ba209eae4ef42)
5. [](https://git.kernel.org/stable/c/c469953917b319d415fd621b9e5d0ea5203565cd)
6. [](https://git.kernel.org/stable/c/f2db71053dc0409fae785096ad19cce4c8a95af7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34654
- **State**: PUBLISHED
- **Published Date**: November 28, 2022 at 19:30 UTC
- **Last Updated**: February 20, 2025 at 19:49 UTC
- **Reserved Date**: June 30, 2022 at 09:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) in Virgial Berveling's Manage Notification E-mails plugin <= 1.8.2 on WordPress.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Virgial Berveling - Manage Notification E-mails (WordPress plugin)**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/manage-notification-emails/wordpress-manage-notification-e-mails-plugin-1-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4975
- **State**: PUBLISHED
- **Published Date**: November 06, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: November 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
mkmailpost in newsgate 1.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/mmp##### temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30932](http://www.securityfocus.com/bid/30932)
2. [[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire](http://www.openwall.com/lists/oss-security/2008/10/30/2)
3. [](https://bugs.gentoo.org/show_bug.cgi?id=235770)
4. [](http://uvw.ru/report.lenny.txt)
5. [](http://bugs.debian.org/496437)
6. [](http://dev.gentoo.org/~rbu/security/debiantemp/newsgate) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14513, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14513
- **State**: PUBLISHED
- **Published Date**: September 16, 2020 at 19:49 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - CodeMeter**
Affected versions:
- All versions prior to 6.81 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1969
- **State**: REJECTED
- **Published Date**: February 15, 2021 at 21:57 UTC
- **Last Updated**: February 15, 2021 at 21:57 UTC
- **Reserved Date**: December 03, 2019 at 00:00 UTC
- **Assigned By**: openssl
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1815
- **State**: PUBLISHED
- **Published Date**: May 29, 2009 at 16:24 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: May 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Sonic Spot Audioactive Player 1.93b allows remote attackers to execute arbitrary code via a long string in a playlist file, as demonstrated by a long .mp3 URL in a .m3u file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34987](http://www.securityfocus.com/bid/34987)
2. [8701](https://www.exploit-db.com/exploits/8701)
3. [ADV-2009-1339](http://www.vupen.com/english/advisories/2009/1339)
4. [8698](https://www.exploit-db.com/exploits/8698) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2109
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14480
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 15:41 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: August 01, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.adremsoft.com/support/)
2. [](https://compass-security.com/fileadmin/Research/Advisories/2020-14_CSNC-2019-015_AdRem_NetCrunch_Improper_Session_Handling.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3037
- **State**: PUBLISHED
- **Published Date**: August 14, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: June 05, 2007 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA07-226A](http://www.us-cert.gov/cas/techalerts/TA07-226A.html)
2. [26433](http://secunia.com/advisories/26433)
3. [36385](http://www.osvdb.org/36385)
4. [1018565](http://securitytracker.com/id?1018565)
5. [MS07-047](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-047)
6. [ADV-2007-2871](http://www.vupen.com/english/advisories/2007/2871)
7. [](http://www.zerodayinitiative.com/advisories/ZDI-07-046.html)
8. [25307](http://www.securityfocus.com/bid/25307)
9. [oval:org.mitre.oval:def:2207](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2207)
10. [20070814 ZDI-07-046: Microsoft Windows Media Player Skin Parsing Size Mismatch Heap Overflow Vulnerability](http://www.securityfocus.com/archive/1/476533/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7069
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 18:54 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-07.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2478
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 05:31 UTC
- **Last Updated**: August 02, 2024 at 19:25 UTC
- **Reserved Date**: March 15, 2024 at 00:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in BradWenqiang HR 2.0. It has been rated as critical. Affected by this issue is the function selectAll of the file /bishe/register of the component Background Management. The manipulation of the argument userName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256886 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**BradWenqiang - HR**
Affected versions:
- 2.0 (Status: affected)
### References
1. [VDB-256886 | BradWenqiang HR Background Management register selectAll sql injection](https://vuldb.com/?id.256886)
2. [VDB-256886 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256886)
3. [](https://github.com/zuizui35/cve/blob/main/cve.md)
### Credits
- zuizui (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6157
- **State**: PUBLISHED
- **Published Date**: November 28, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: November 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in ContentNow 1.39 and earlier allows remote attackers to execute arbitrary SQL commands via the pageid parameter. NOTE: this issue can be leveraged for path disclosure with an invalid pageid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1925](http://securityreason.com/securityalert/1925)
2. [ADV-2006-4663](http://www.vupen.com/english/advisories/2006/4663)
3. [](http://sourceforge.net/project/shownotes.php?group_id=161604&release_id=465437)
4. [1017265](http://securitytracker.com/id?1017265)
5. [2822](https://www.exploit-db.com/exploits/2822)
6. [21237](http://www.securityfocus.com/bid/21237)
7. [20061121 ContentNow CMS 1.39 Sql Injection + Path Disclosure Vulnerabilities](http://www.securityfocus.com/archive/1/452231/100/100/threaded)
8. [23005](http://secunia.com/advisories/23005)
9. [](http://www.0xcafebabe.it/sploits/contentnow_139_sqlinj.pl)
10. [contentnow-index-sql-injection(30459)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30459) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35946
- **State**: PUBLISHED
- **Published Date**: September 14, 2022 at 17:55 UTC
- **Last Updated**: April 23, 2025 at 17:10 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 0.72, < 10.0.3 (Status: affected)
### References
1. [](https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2)
2. [](https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5183
- **State**: PUBLISHED
- **Published Date**: January 08, 2020 at 17:19 UTC
- **Last Updated**: August 04, 2024 at 08:22 UTC
- **Reserved Date**: January 01, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FTPGetter Professional 5.97.0.223 is vulnerable to a memory corruption bug when a user sends a specially crafted string to the application. This memory corruption bug can possibly be classified as a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/155832/FTPGetter-Professional-5.97.0.223-Denial-Of-Service.html)
2. [47871](https://www.exploit-db.com/exploits/47871) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16416
- **State**: PUBLISHED
- **Published Date**: September 03, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:42 UTC
- **Reserved Date**: September 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in my_profile/edit?inline= in FUEL CMS 1.4 allows remote attackers to change the administrator's password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.iwantacve.cn/index.php/archives/48/)
2. [](https://github.com/daylightstudio/FUEL-CMS/issues/481) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3883
- **State**: PUBLISHED
- **Published Date**: April 17, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 19:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will be waited by the worker for at most 'ioblocktimeout' seconds. However this timeout applies only for un-encrypted requests. Connections using SSL/TLS are not taking this timeout into account during reads, and may hang longer.An unauthenticated attacker could repeatedly create hanging LDAP requests to hang all the workers, resulting in a Denial of Service.
### Weakness Classification (CWE)
- CWE-772: Security Weakness
### Affected Products
**Red Hat - 389-ds-base**
Affected versions:
- affects up to 1.4.1.2 (Status: affected)
### References
1. [[debian-lts-announce] 20190506 [SECURITY] [DLA 1779-1] 389-ds-base security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00008.html)
2. [RHSA-2019:1896](https://access.redhat.com/errata/RHSA-2019:1896)
3. [RHSA-2019:3401](https://access.redhat.com/errata/RHSA-2019:3401)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883)
5. [](https://pagure.io/389-ds-base/issue/50329)
6. [](https://pagure.io/389-ds-base/pull-request/50331)
7. [[debian-lts-announce] 20230424 [SECURITY] [DLA 3399-1] 389-ds-base security update](https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30176
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 00:00 UTC
- **Last Updated**: October 29, 2024 at 19:16 UTC
- **Reserved Date**: March 24, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Logpoint before 7.4.0, an attacker can enumerate a valid list of usernames by using publicly exposed URLs of shared widgets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://logpoint.com)
2. [](https://servicedesk.logpoint.com/hc/en-us/articles/18435146614301-Username-Enumeration-on-Shared-Widgets) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1639
- **State**: PUBLISHED
- **Published Date**: March 06, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 23:02 UTC
- **Reserved Date**: January 12, 2016 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2016:0664](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html)
2. [openSUSE-SU-2016:0684](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html)
3. [84008](http://www.securityfocus.com/bid/84008)
4. [DSA-3507](http://www.debian.org/security/2016/dsa-3507)
5. [1035185](http://www.securitytracker.com/id/1035185)
6. [](https://codereview.chromium.org/1703733002)
7. [openSUSE-SU-2016:0729](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html)
8. [](https://code.google.com/p/chromium/issues/detail?id=572224)
9. [SUSE-SU-2016:0665](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html)
10. [GLSA-201603-09](https://security.gentoo.org/glsa/201603-09)
11. [](http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1234
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 07:37 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the f_count counter in FreeBSD before 4.2 through 5.0 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via multiple calls to (1) fpathconf and (2) lseek, which do not properly decrement f_count through a call to fdrop.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.pine.nl/press/pine-cert-20030101.txt)
2. [20030106 PDS: Integer overflow in FreeBSD kernel](http://www.securityfocus.com/archive/1/305308/30/26420/threaded)
3. [20030106 PDS: Integer overflow in FreeBSD kernel](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0006.html)
4. [FreeBSD-SA-02:44](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:44.filedesc.asc)
5. [20030107 FreeBSD Security Advisory FreeBSD-SA-02:44.filedesc](http://archives.neohapsis.com/archives/bugtraq/2003-01/0057.html)
6. [6524](http://www.securityfocus.com/bid/6524)
7. [1005898](http://www.securitytracker.com/id?1005898)
8. [freebsd-kernel-integer-overflow(10993)](http://www.iss.net/security_center/static/10993.php)
9. [7821](http://secunia.com/advisories/7821) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0707
- **State**: PUBLISHED
- **Published Date**: February 23, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 04:48 UTC
- **Reserved Date**: February 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/index.php in PowerClan 1.14a allows remote attackers to execute arbitrary SQL commands via the loginemail parameter (aka login field). NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51112](http://osvdb.org/51112)
2. [powerclan-index-sql-injection(47702)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47702)
3. [7642](https://www.exploit-db.com/exploits/7642)
4. [33083](http://www.securityfocus.com/bid/33083)
5. [33362](http://secunia.com/advisories/33362) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4759
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5667
- **State**: PUBLISHED
- **Published Date**: December 18, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The scanning engine in VirusBlokAda VBA32 Personal Antivirus 3.12.8.x allows remote attackers to cause a denial of service (memory corruption and application crash) via a malformed RAR archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31560](http://www.securityfocus.com/bid/31560)
2. [vba32-rar-dos(47573)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47573)
3. [6658](https://www.exploit-db.com/exploits/6658) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28677
- **State**: PUBLISHED
- **Published Date**: July 18, 2022 at 18:41 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 05, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16663.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.2.1.53537 (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-768/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47420
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:04 UTC
- **Last Updated**: May 04, 2025 at 07:10 UTC
- **Reserved Date**: May 21, 2024 at 14:58 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: fix a potential ttm->sg memory leak
Memory is allocated for ttm->sg by kmalloc in kfd_mem_dmamap_userptr,
but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!
### Affected Products
**Linux - Linux**
Affected versions:
- 264fb4d332f5e76743818480e482464437837c52 (Status: affected)
- 264fb4d332f5e76743818480e482464437837c52 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.14.12 (Status: unaffected)
- 5.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7e5ce6029b627efb4a004746cfdc1eeff850e6eb)
2. [](https://git.kernel.org/stable/c/b072ef1215aca33186e3a10109e872e528a9e516) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3604
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20877
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 12:44 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 74.0.8 allows self XSS in WHM Style Upload interface (SEC-437).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/74+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26198
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 15:50 UTC
- **Last Updated**: September 17, 2024 at 03:53 UTC
- **Reserved Date**: September 30, 2020 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC iDRAC9 versions prior to 4.32.10.00 and 4.40.00.00 contain a reflected cross-site scripting vulnerability in the iDRAC9 web application. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Dell - Integrated Dell Remote Access Controller (iDRAC)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000181088/dsa-2020-268-dell-emc-idrac9-reflected-xss-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6764
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 15:41 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) 9.5(1) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvd82064.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Cisco Adaptive Security Appliance**
Affected versions:
- Cisco Adaptive Security Appliance (Status: affected)
### References
1. [100107](http://www.securityfocus.com/bid/100107)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa)
3. [](https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd82064)
4. [1039055](http://www.securitytracker.com/id/1039055) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2646
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 16:00 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Command Line Interface). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Enterprise Manager Base Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data as well as unauthorized read access to a subset of Enterprise Manager Base Platform accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Enterprise Manager Base Platform**
Affected versions:
- 12.1.0.5 (Status: affected)
- 13.2.0.0 (Status: affected)
- 13.3.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23660
- **State**: PUBLISHED
- **Published Date**: August 26, 2020 at 17:26 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webTareas v2.1 is affected by Cross Site Scripting (XSS) on "Search."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/webtareas/tickets/41/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0980
- **State**: PUBLISHED
- **Published Date**: March 03, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Jay Eckles CGI Calendar 2.7 allow remote attackers to inject arbitrary web script or HTML via the year parameter in (1) index.cgi and (2) viewday.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060226 CGI Calendar XSS Vulnerability](http://www.securityfocus.com/archive/1/426198/100/0/threaded)
2. [ADV-2006-0764](http://www.vupen.com/english/advisories/2006/0764)
3. [19066](http://secunia.com/advisories/19066)
4. [cgicalendar-index-viewday-xss(24946)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24946) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4194
- **State**: PUBLISHED
- **Published Date**: June 19, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The web-based administrative interface in Cisco WebEx Meeting Center provides different error messages for failed login attempts depending on whether the username exists or corresponds to a privileged account, which allows remote attackers to enumerate account names and obtain sensitive information via a series of requests, aka Bug ID CSCuf28861.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150618 Cisco WebEx Meeting Center Web-Based Administrative Interface User Enumeration Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39420)
2. [75296](http://www.securityfocus.com/bid/75296)
3. [1032660](http://www.securitytracker.com/id/1032660) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20247, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20247
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 15:08 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Media, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229858836
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32520
- **State**: PUBLISHED
- **Published Date**: July 07, 2021 at 14:12 UTC
- **Last Updated**: September 17, 2024 at 03:37 UTC
- **Reserved Date**: May 10, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
Use of hard-coded cryptographic key vulnerability in QSAN Storage Manager allows attackers to obtain users’ credentials and related permissions. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**QSAN - Storage Manager**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-4876-8da07-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1999036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1999036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1999036
- **State**: PUBLISHED
- **Published Date**: August 01, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 18:19 UTC
- **Reserved Date**: August 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An exposure of sensitive information vulnerability exists in Jenkins SSH Agent Plugin 1.15 and earlier in SSHAgentStepExecution.java that exposes the SSH private key password to users with permission to read the build log.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-07-30/#SECURITY-704) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39537
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 21:24 UTC
- **Last Updated**: August 14, 2024 at 19:25 UTC
- **Reserved Date**: August 03, 2023 at 17:11 UTC
- **Assigned By**: AMI
### Vulnerability Description
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**AMI - AptioV**
Affected versions:
- * (Status: affected)
### References
1. [](https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023008.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9491
- **State**: PUBLISHED
- **Published Date**: July 31, 2017 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not set the secure flag for cookies in an https session to an administration application, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6731
- **State**: PUBLISHED
- **Published Date**: September 26, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Alfa-Bank (aka ru.alfabank.mobile.android) application 5.5.1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [VU#367337](http://www.kb.cert.org/vuls/id/367337)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13239
- **State**: PUBLISHED
- **Published Date**: February 12, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:36 UTC
- **Reserved Date**: August 23, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A information disclosure vulnerability in the Android framework (ui framework). Product: Android. Versions: 8.0. ID: A-66244132.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2018-02-01)
2. [103012](http://www.securityfocus.com/bid/103012) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27582
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: May 06, 2025 at 14:16 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
Password recovery vulnerability in SICK SIM4000 (PPC) Partnumber 1078787 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The firmware versions <=1.10.1 allow to optionally disable device configuration over the network interfaces. Please make sure that you apply general security practices when operating the SIM4000. A fix is planned but not yet scheduled.
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**n/a - SICK SIM4000 (PPC)**
Affected versions:
- Partnumber 1078787 (Status: affected)
### References
1. [](https://sick.com/psirt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21236
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:03 UTC
- **Last Updated**: April 02, 2025 at 13:23 UTC
- **Reserved Date**: December 10, 2024 at 23:54 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Telephony Service Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Telephony Service Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40846
- **State**: PUBLISHED
- **Published Date**: November 15, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 14:48 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576), a Stored Cross Site Scripting (XSS) vulnerability exists allowing an attacker to execute JavaScript code via the applications stored hostname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://boschko.ca/tenda_ac1200_router/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38546
- **State**: PUBLISHED
- **Published Date**: June 19, 2024 at 13:35 UTC
- **Last Updated**: May 04, 2025 at 09:13 UTC
- **Reserved Date**: June 18, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm: vc4: Fix possible null pointer dereference
In vc4_hdmi_audio_init() of_get_address() may return
NULL which is later dereferenced. Fix this bug by adding NULL check.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
- bb7d78568814a31a11fa14f1479a9fe51f1582ad (Status: affected)
**Linux - Linux**
Affected versions:
- 4.12 (Status: affected)
- 0 (Status: unaffected)
- 5.10.219 (Status: unaffected)
- 5.15.161 (Status: unaffected)
- 6.1.93 (Status: unaffected)
- 6.6.33 (Status: unaffected)
- 6.8.12 (Status: unaffected)
- 6.9.3 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2d9adecc88ab678785b581ab021f039372c324cb)
2. [](https://git.kernel.org/stable/c/6cf1874aec42058a5ad621a23b5b2f248def0e96)
3. [](https://git.kernel.org/stable/c/80431ea3634efb47a3004305d76486db9dd8ed49)
4. [](https://git.kernel.org/stable/c/42c22b63056cea259d5313bf138a834840af85a5)
5. [](https://git.kernel.org/stable/c/2a345fe928c21de6f3c3c7230ff509d715153a31)
6. [](https://git.kernel.org/stable/c/bd7827d46d403f8cdb43d16744cb1114e4726b21)
7. [](https://git.kernel.org/stable/c/c534b63bede6cb987c2946ed4d0b0013a52c5ba7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45076
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 15:59 UTC
- **Last Updated**: September 04, 2024 at 18:29 UTC
- **Reserved Date**: August 21, 2024 at 19:10 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM webMethods Integration 10.15 could allow an authenticated user to upload and execute arbitrary files which could be executed on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**IBM - webMethods Integration**
Affected versions:
- 10.15 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7167245) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13616
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 20:07 UTC
- **Last Updated**: May 20, 2025 at 19:26 UTC
- **Reserved Date**: January 22, 2025 at 14:37 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.7.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - VikBooking Hotel Booking Engine & PMS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/44b3a2d9-a2e1-43dd-b27a-1ad9d6015c9b/)
### Credits
- Krugov Artyom
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9209
- **State**: PUBLISHED
- **Published Date**: December 14, 2016 at 00:37 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 06, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in TCP processing in Cisco FirePOWER system software could allow an unauthenticated, remote attacker to download files that would normally be blocked. Affected Products: The following Cisco products are vulnerable: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services, Advanced Malware Protection (AMP) for Networks - 7000 Series Appliances, Advanced Malware Protection (AMP) for Networks - 8000 Series Appliances, FirePOWER 7000 Series Appliances, FirePOWER 8000 Series Appliances, FirePOWER Threat Defense for Integrated Services Routers (ISRs), Next Generation Intrusion Prevention System (NGIPS) for Blue Coat X-Series, Sourcefire 3D System Appliances, Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. More Information: CSCvb20102. Known Affected Releases: 2.9.7.10.
### Affected Products
**n/a - Cisco FirePOWER**
Affected versions:
- Cisco FirePOWER (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fpwr)
2. [94817](http://www.securityfocus.com/bid/94817) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19748
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 02:36 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Work Time Calendar app before 4.7.1 for Jira allows XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://marketplace.atlassian.com/apps/1213545/work-time-calendar-for-jira/version-history) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2943
- **State**: PUBLISHED
- **Published Date**: September 06, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 07, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Honda Moto LINC 1.6.1 does not verify SSL certificates.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVNDB-2015-000065](http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000065.html)
2. [JVN#75851252](http://jvn.jp/en/jp/JVN75851252/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7823
- **State**: PUBLISHED
- **Published Date**: November 13, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62058](http://secunia.com/advisories/62058)
2. [60895](http://secunia.com/advisories/60895)
3. [GLSA-201412-04](http://security.gentoo.org/glsa/glsa-201412-04.xml)
4. [62303](http://secunia.com/advisories/62303)
5. [USN-2404-1](http://www.ubuntu.com/usn/USN-2404-1)
6. [openSUSE-SU-2014:1471](http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html)
7. [60010](http://secunia.com/advisories/60010)
8. [](http://security.libvirt.org/2014/0007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4532
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 17:19 UTC
- **Last Updated**: August 07, 2024 at 03:51 UTC
- **Reserved Date**: December 09, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.
### Affected Products
**offlineimap - offlineimap**
Affected versions:
- before 6.3.2 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2010-4532)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4532)
3. [](https://access.redhat.com/security/cve/cve-2010-4532)
4. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603450)
5. [](https://www.openwall.com/lists/oss-security/2010/12/23/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1452
- **State**: PUBLISHED
- **Published Date**: May 03, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 18, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 11.0.696.57 allows user-assisted remote attackers to spoof the URL bar via vectors involving a redirect and a manual reload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14759](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14759)
2. [](http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html)
3. [chrome-manual-reload-spoofing(67159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67159)
4. [](http://code.google.com/p/chromium/issues/detail?id=77786) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25514
- **State**: PUBLISHED
- **Published Date**: April 22, 2023 at 02:36 UTC
- **Last Updated**: February 04, 2025 at 16:34 UTC
- **Reserved Date**: February 07, 2023 at 02:57 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**NVIDIA - NVIDIA CUDA Toolkit**
Affected versions:
- All versions prior to 12.1 Update 1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5456) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12904
- **State**: REJECTED
- **Last Updated**: February 11, 2025 at 01:05 UTC
- **Reserved Date**: December 23, 2024 at 12:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27529
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 00:00 UTC
- **Last Updated**: January 16, 2025 at 15:19 UTC
- **Reserved Date**: May 11, 2023 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Wacom Tablet Driver installer prior to 6.4.2-1 (for macOS) contains an improper link resolution before file access vulnerability. When a user is tricked to execute a small malicious script before executing the affected version of the installer, arbitrary code may be executed with the root privilege.
### Affected Products
**Wacom - Wacom Tablet Driver installer**
Affected versions:
- prior to 6.4.2-1 (for macOS) (Status: affected)
### References
1. [](https://www.wacom.com/en-us/support/product-support/drivers)
2. [](https://jvn.jp/en/jp/JVN90278893/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10939
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 06:00 UTC
- **Last Updated**: December 16, 2024 at 18:59 UTC
- **Reserved Date**: November 06, 2024 at 19:25 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Image Widget WordPress plugin before 4.4.11 does not sanitise and escape some of its Image Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Image Widget**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/fcf50077-b360-4b63-bece-9806b4bc8bea/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8075
- **State**: PUBLISHED
- **Published Date**: August 22, 2024 at 19:31 UTC
- **Last Updated**: August 23, 2024 at 14:51 UTC
- **Reserved Date**: August 22, 2024 at 12:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg. The manipulation leads to os command injection. The attack can be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**TOTOLINK - AC1200 T8**
Affected versions:
- 4.1.5cu.862_B20230228 (Status: affected)
### References
1. [VDB-275557 | TOTOLINK AC1200 T8 setDiagnosisCfg os command injection](https://vuldb.com/?id.275557)
2. [VDB-275557 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275557)
3. [Submit #390929 | TOTOLINK AC1200 T8 V4.1.5cu.862_B20230228 OS Command Injection](https://vuldb.com/?submit.390929)
4. [](https://github.com/hawkteam404/RnD_Public/blob/main/TOTOLink_AC1200_T8_OsCmdI_BOF.md)
5. [](https://www.totolink.net/)
### Credits
- FPT IS Security (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8504
- **State**: PUBLISHED
- **Published Date**: October 10, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Word software when the software fails to properly handle objects in Protected View, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft SharePoint Server, Office 365 ProPlus, Microsoft Office, Microsoft Word.
### Affected Products
**Microsoft - Microsoft SharePoint Server**
Affected versions:
- 2010 Service Pack 2 (Status: affected)
**Microsoft - Microsoft Office**
Affected versions:
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
- 2016 (32-bit edition) (Status: affected)
- 2016 (64-bit edition) (Status: affected)
- 2019 for 32-bit editions (Status: affected)
- 2019 for 64-bit editions (Status: affected)
- Web Apps 2010 Service Pack 2 (Status: affected)
**Microsoft - Office**
Affected versions:
- 365 ProPlus for 32-bit Systems (Status: affected)
- 365 ProPlus for 64-bit Systems (Status: affected)
**Microsoft - Microsoft Word**
Affected versions:
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
- 2016 (32-bit edition) (Status: affected)
- 2016 (64-bit edition) (Status: affected)
### References
1. [105499](http://www.securityfocus.com/bid/105499)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8504)
3. [1041840](http://www.securitytracker.com/id/1041840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46091
- **State**: PUBLISHED
- **Published Date**: March 07, 2024 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 16:00 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in the feedback form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ASR511-OO7/CVE-2022-46091/blob/main/CVE-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43769
- **State**: PUBLISHED
- **Published Date**: April 03, 2023 at 17:47 UTC
- **Last Updated**: March 03, 2025 at 20:14 UTC
- **Reserved Date**: October 26, 2022 at 12:55 UTC
- **Assigned By**: HITVAN
### Vulnerability Description
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**Hitachi Vantara - Pentaho Business Analytics Server**
Affected versions:
- 1.0 (Status: affected)
- 9.4.0.0 (Status: affected)
### References
1. [](https://support.pentaho.com/hc/en-us/articles/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769-)
2. [](http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html)
### Credits
- Harry Withington, Aura Information Security |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.