System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2381
- **State**: PUBLISHED
- **Published Date**: June 26, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:07 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Apache Roller before 5.0.1 allow remote authenticated users to inject arbitrary web script or HTML by leveraging the blogger role.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20120624 CVE-2012-2381: Apache Roller Cross-Site-Scripting (XSS) vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2012-06/0377.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33993
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 00:35 UTC
- **Last Updated**: October 10, 2024 at 19:08 UTC
- **Reserved Date**: May 24, 2023 at 20:41 UTC
- **Assigned By**: sap
### Vulnerability Description
B1i module of SAP Business One - version 10.0, application allows an authenticated user with deep knowledge to send crafted queries over the network to read or modify the SQL data. On successful exploitation, the attacker can cause high impact on confidentiality, integrity and availability of the application.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SAP_SE - SAP Business One (B1i Layer)**
Affected versions:
- 10.0 (Status: affected)
### References
1. [](https://me.sap.com/notes/3337797)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2114
- **State**: PUBLISHED
- **Published Date**: May 01, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: May 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17737](http://www.securityfocus.com/bid/17737)
2. [20060428 [ECHO_ADV_31$2006] Sws Web Server 0.1.7 Strcpy() & Syslog() Format String Vulnerability](http://www.securityfocus.com/archive/1/432362/100/0/threaded)
3. [816](http://securityreason.com/securityalert/816)
4. [sws-webserver-syslog-bo(26159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0936
- **State**: PUBLISHED
- **Published Date**: February 25, 2008 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:26 UTC
- **Reserved Date**: February 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the Prayer List (prayerlist) 1.04 module for XOOPS allows remote attackers to execute arbitrary SQL commands via the cid parameter in a view action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29063](http://secunia.com/advisories/29063)
2. [20080221 XOOPS Module prayerlist SQL Injection(cid)](http://marc.info/?l=bugtraq&m=120362358919492&w=2)
3. [27934](http://www.securityfocus.com/bid/27934) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29167
- **State**: PUBLISHED
- **Published Date**: June 13, 2023 at 00:00 UTC
- **Last Updated**: January 03, 2025 at 20:19 UTC
- **Reserved Date**: May 11, 2023 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Out-of-bound reads vulnerability exists in FRENIC RHC Loader v1.1.0.3. If a user opens a specially crafted FNE file, sensitive information on the system where the affected product is installed may be disclosed or arbitrary code may be executed.
### Affected Products
**FUJI ELECTRIC CO., LTD. - FRENIC RHC Loader**
Affected versions:
- v1.1.0.3 and earlier (Status: affected)
### References
1. [](https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en)
2. [](https://jvn.jp/en/vu/JVNVU97809354/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4968
- **State**: PUBLISHED
- **Published Date**: September 21, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The linkreport/tmp/admin_global page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to discover administrator cookies via a GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92779](http://www.securityfocus.com/bid/92779)
2. [](http://docs.fortinet.com/uploaded/files/3236/fortiwan-v4.2.5-release-notes.pdf)
3. [VU#724487](https://www.kb.cert.org/vuls/id/724487)
4. [](http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5444
- **State**: PUBLISHED
- **Published Date**: January 17, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 17, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco TelePresence Video Communication Server (VCS) X7.0.3 does not properly process certain search rules, which allows remote attackers to create conferences via an unspecified Conductor request, aka Bug ID CSCub67989.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130112 Cisco TelePresence Video Communication Server Vulnerability in Policy Services](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-5444) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5049
- **State**: REJECTED
- **Published Date**: September 24, 2007 at 00:00 UTC
- **Last Updated**: October 02, 2007 at 09:00 UTC
- **Reserved Date**: September 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1566
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 23:06 UTC
- **Last Updated**: May 08, 2025 at 19:15 UTC
- **Reserved Date**: February 21, 2025 at 21:30 UTC
- **Assigned By**: ChromeOS
### Vulnerability Description
DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions.
### Affected Products
**Google - ChromeOS**
Affected versions:
- 16002.23.0 (Status: affected)
### References
1. [](https://issuetracker.google.com/issues/342802975)
2. [](https://issues.chromium.org/issues/b/342802975) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1017
- **State**: PUBLISHED
- **Published Date**: June 12, 2019 at 13:49 UTC
- **Last Updated**: May 20, 2025 at 17:49 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how Win32k handles objects in memory.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1703**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Systems Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [Win32k Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1017) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0129
- **State**: PUBLISHED
- **Published Date**: January 09, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mail Management Agent (MAILMA) (aka Mail Management Server) in Rockliffe MailSite 7.0.3.1 and earlier generates different responses depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames via user requests to TCP port 106.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zur.homelinux.com/Advisories/RockliffeMailsiteUserEnum.txt)
2. [ADV-2006-0055](http://www.vupen.com/english/advisories/2006/0055)
3. [18318](http://secunia.com/advisories/18318)
4. [22230](http://www.osvdb.org/22230)
5. [20060104 Rockliffe Mailsite User Enumeration Flaw](http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/040970.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4406
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 15:02 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 02, 2024 at 00:17 UTC
- **Assigned By**: zdi
### Vulnerability Description
Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the integral-dialog-page.html file. When parsing the integralInfo parameter, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22332.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Xiaomi - Pro 13**
Affected versions:
- 14.0.5.0 (Status: affected)
### References
1. [ZDI-24-419](https://www.zerodayinitiative.com/advisories/ZDI-24-419/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3835
- **State**: PUBLISHED
- **Published Date**: February 22, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 14:39 UTC
- **Reserved Date**: December 21, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the sponsor portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access notices owned by other users, because of SQL Injection. More Information: CSCvb15627. Known Affected Releases: 1.4(0.908).
### Affected Products
**n/a - Cisco Identity Services Engine**
Affected versions:
- Cisco Identity Services Engine (Status: affected)
### References
1. [96249](http://www.securityfocus.com/bid/96249)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-ise)
3. [1037841](http://www.securitytracker.com/id/1037841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6955
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036986](http://www.securitytracker.com/id/1036986)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb16-33.html)
3. [93496](http://www.securityfocus.com/bid/93496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26931
- **State**: PUBLISHED
- **Published Date**: October 09, 2020 at 06:24 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 09, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:N/C:H/I:L/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000062321/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Wireless-Controllers-PSV-2020-0268) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28116
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 21:44 UTC
- **Last Updated**: August 02, 2024 at 00:48 UTC
- **Reserved Date**: March 04, 2024 at 14:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
- CWE-1336: Security Weakness
### Affected Products
**getgrav - grav**
Affected versions:
- < 1.7.45 (Status: affected)
### References
1. [https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh](https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh)
2. [https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e](https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17306
- **State**: PUBLISHED
- **Published Date**: October 07, 2019 at 15:04 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the Configurator module by an Admin user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-033/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7647
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3765
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 07:05 UTC
- **Last Updated**: August 03, 2024 at 17:09 UTC
- **Reserved Date**: September 03, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
validator.js is vulnerable to Inefficient Regular Expression Complexity
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**validatorjs - validatorjs/validator.js**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9)
2. [](https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2727
- **State**: PUBLISHED
- **Published Date**: November 22, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:26 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei P9 smart phones with software versions earlier before EVA-AL00C00B365, versions earlier before EVA-AL10C00B365,Versions earlier before EVA-CL00C92B365, versions earlier before EVA-DL00C17B365, versions earlier before EVA-TL00C01B365 have a privilege escalation vulnerability. An unauthenticated attacker can bypass phone activation to user management page of the phone and create a new user. Successful exploit could allow the attacker operate part function of the phone.
### Affected Products
**Huawei Technologies Co., Ltd. - Huawei P9**
Affected versions:
- Versions earlier before EVA-AL00C00B365,Versions earlier before EVA-AL10C00B365,Versions earlier before EVA-CL00C92B365,Versions earlier before EVA-DL00C17B365,Versions earlier before EVA-TL00C01B365,, (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170209-01-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30974
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:54 UTC
- **Last Updated**: June 06, 2025 at 15:12 UTC
- **Reserved Date**: March 26, 2025 at 09:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Akhtarujjaman Shuvo Post Grid Master allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Post Grid Master: from n/a through 3.4.13.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Akhtarujjaman Shuvo - Post Grid Master**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ajax-filter-posts/vulnerability/wordpress-post-grid-master-3-4-13-broken-access-control-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15390
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:33 UTC
- **Reserved Date**: August 17, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the FTP inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software fails to release spinlocks when a device is running low on system memory, if the software is configured to apply FTP inspection and an access control rule to transit traffic, and the access control rule is associated with an FTP file policy. An attacker could exploit this vulnerability by sending a high rate of transit traffic through an affected device to cause a low-memory condition on the device. A successful exploit could allow the attacker to cause a software panic on the affected device, which could cause the device to reload and result in a temporary DoS condition.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20181003 Cisco Firepower Threat Defense Software FTP Inspection Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ftd-inspect-dos)
2. [105519](http://www.securityfocus.com/bid/105519) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3619
- **State**: PUBLISHED
- **Published Date**: September 16, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:45 UTC
- **Reserved Date**: August 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Time Machine in Apple Mac OS X 10.5 through 10.5.4 uses weak permissions for Time Machine Backup log files, which allows local users to obtain sensitive information by reading these files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31189](http://www.securityfocus.com/bid/31189)
2. [APPLE-SA-2008-09-15](http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html)
3. [macos-timemachine-information-disclosure(45176)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45176)
4. [TA08-260A](http://www.us-cert.gov/cas/techalerts/TA08-260A.html)
5. [ADV-2008-2584](http://www.vupen.com/english/advisories/2008/2584)
6. [31882](http://secunia.com/advisories/31882)
7. [1020884](http://securitytracker.com/id?1020884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6605
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: forcepoint
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36108
- **State**: PUBLISHED
- **Published Date**: May 31, 2024 at 14:37 UTC
- **Last Updated**: September 03, 2024 at 16:00 UTC
- **Reserved Date**: May 20, 2024 at 21:07 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
casgate is an Open Source Identity and Access Management system. In affected versions `casgate` allows remote unauthenticated attacker to obtain sensitive information via GET request to an API endpoint. This issue has been addressed in PR #201 which is pending merge. An attacker could use `id` parameter of GET requests with value `anonymous/ anonymous` to bypass authorization on certain API endpoints. Successful exploitation of the vulnerability could lead to account takeover, privilege escalation or provide attacker with credential to other services. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**casgate - casgate**
Affected versions:
- < 0.1.0 (Status: affected)
### References
1. [https://github.com/casgate/casgate/security/advisories/GHSA-mj5q-rc67-h56c](https://github.com/casgate/casgate/security/advisories/GHSA-mj5q-rc67-h56c)
2. [https://github.com/casgate/casgate/pull/201](https://github.com/casgate/casgate/pull/201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43463
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 15:46 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Unquoted Service Path vulnerability exists in Ext2Fsd v0.68 via a specially crafted file in the Ext2Srv Service executable service path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/M507/Miner)
2. [](https://www.exploit-db.com/exploits/49706)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/198746) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35144
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 12:53 UTC
- **Last Updated**: January 02, 2025 at 19:19 UTC
- **Reserved Date**: June 14, 2023 at 08:58 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Maven Repository Server Plugin 1.10 and earlier does not escape project and build display names on the Build Artifacts As Maven Repository page, resulting in a stored cross-site scripting (XSS) vulnerability.
### Affected Products
**Jenkins Project - Jenkins Maven Repository Server Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-06-14](https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2951)
2. [](http://www.openwall.com/lists/oss-security/2023/06/14/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33938
- **State**: PUBLISHED
- **Published Date**: October 25, 2022 at 16:33 UTC
- **Last Updated**: April 15, 2025 at 18:45 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A format string injection vulnerability exists in the ghome_process_control_packet functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted XCMD can lead to memory corruption, information disclosure and denial of service. An attacker can send a malicious XML payload to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-134: Security Weakness
### Affected Products
**abode systems, inc. - iota All-In-One Security Kit**
Affected versions:
- 6.9X (Status: affected)
- 6.9Z (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48474
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:17 UTC
- **Last Updated**: May 21, 2025 at 14:14 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10468
- **State**: PUBLISHED
- **Published Date**: April 28, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 07:39 UTC
- **Reserved Date**: April 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The transferFrom function of a smart contract implementation for Useless Ethereum Token (UET), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all victims' balances into their account) because certain computations involving _value are incorrect, as exploited in the wild starting in December 2017, aka the "transferFlaw" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://peckshield.com/2018/04/28/transferFlaw/)
2. [](https://medium.com/%40jonghyk.song/uselessethereumtoken-uet-erc20-token-allows-attackers-to-steal-all-victims-balances-543d42ac808e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3081
- **State**: PUBLISHED
- **Published Date**: September 04, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in Uiga Church Portal allows remote attackers to execute arbitrary SQL commands via the month parameter in a calendar action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57464](http://osvdb.org/57464)
2. [36479](http://secunia.com/advisories/36479)
3. [uigaindex-sql-injection(52893)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52893) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27623
- **State**: PUBLISHED
- **Published Date**: November 16, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JetBrains IdeaVim before version 0.58 might have caused an information leak in limited circumstances.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.jetbrains.com)
2. [](https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39696
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 20:20 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Task.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-185810717
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12455
- **State**: PUBLISHED
- **Published Date**: October 10, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 08:38 UTC
- **Reserved Date**: June 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using "admin:" as the name of a cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20181008 Multiple vulnerabilities in NPLUG wireless repeater](http://seclists.org/fulldisclosure/2018/Oct/18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0182
- **State**: PUBLISHED
- **Published Date**: May 11, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Journal in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted Journal (aka .jnt) file, aka "Windows Journal Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [89867](http://www.securityfocus.com/bid/89867)
2. [1035824](http://www.securitytracker.com/id/1035824)
3. [MS16-056](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-056)
4. [20160510 Microsoft Windows Journal OOB Write Memory Corruption Vulnerability](https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1225) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1758
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 17:52 UTC
- **Last Updated**: August 03, 2024 at 16:18 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212147)
2. [](https://support.apple.com/en-us/HT212146)
3. [](https://support.apple.com/en-us/HT212148)
4. [](https://support.apple.com/en-us/HT212149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4744
- **State**: PUBLISHED
- **Published Date**: March 26, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: March 26, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Contact module in Exponent CMS 0.97-GA20090213 allows remote attackers to inject arbitrary web script or HTML via the email parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [58647](http://osvdb.org/58647)
2. [exponentcms-email-xss(53687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53687)
3. [36626](http://www.securityfocus.com/bid/36626)
4. [36703](http://secunia.com/advisories/36703) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49405
- **State**: PUBLISHED
- **Published Date**: November 06, 2024 at 02:17 UTC
- **Last Updated**: November 06, 2024 at 11:15 UTC
- **Reserved Date**: October 15, 2024 at 05:26 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Improper authentication in Private Info in Samsung Pass in prior to version 4.4.04.7 allows physical attackers to access sensitive information in a specific scenario.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Pass**
Affected versions:
- 4.4.04.7 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32949
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 14:57 UTC
- **Last Updated**: April 15, 2025 at 15:18 UTC
- **Reserved Date**: April 14, 2025 at 21:02 UTC
- **Assigned By**: JFROG
### Vulnerability Description
This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb.
If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a Zip Bomb https://en.wikipedia.org/wiki/Zip_bomb . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-409: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1)
2. [](https://research.jfrog.com/vulnerabilities/peertube-archive-resource-exhaustion/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4638
- **State**: PUBLISHED
- **Published Date**: September 03, 2020 at 13:55 UTC
- **Last Updated**: September 16, 2024 at 23:16 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM API Connect's API Manager 2018.4.1.0 through 2018.4.1.12 is vulnerable to privilege escalation. An invitee to an API Provider organization can escalate privileges by manipulating the invitation link. IBM X-Force ID: 185508.
### Affected Products
**IBM - API Connect**
Affected versions:
- 2018.4.1.0 (Status: affected)
- 2018.4.12 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6324751)
2. [ibm-api-cve20204638-priv-escalation (185508)](https://exchange.xforce.ibmcloud.com/vulnerabilities/185508) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0317
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gator ActiveX component (IEGator.dll) 3.0.6.1 allows remote web sites to install arbitrary software by specifying a Trojan Gator installation file (setup.ex_) in the src parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020220 Gator installer Plugin allows any software to be installed](http://marc.info/?l=bugtraq&m=101438671922874&w=2)
2. [gator-activex-install(8266)](http://www.iss.net/security_center/static/8266.php)
3. [](http://www.gator.com/update/)
4. [4161](http://www.securityfocus.com/bid/4161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1624
- **State**: PUBLISHED
- **Published Date**: April 02, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:31 UTC
- **Reserved Date**: April 02, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in v2demo/page.php in Jshop Server 1.x through 2.x allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the xPage parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5325](https://www.exploit-db.com/exploits/5325)
2. [28501](http://www.securityfocus.com/bid/28501)
3. [jshop-page-file-include(41524)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20075
- **State**: PUBLISHED
- **Published Date**: December 29, 2019 at 23:29 UTC
- **Last Updated**: August 05, 2024 at 02:32 UTC
- **Reserved Date**: December 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On Netis DL4323 devices, pingrtt_v6.html has XSS (Ping6 Diagnostic).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drive.google.com/open?id=1SqUHaTn_dVsGv-YtvAqPOXG1Z9APk0eI)
2. [](https://drive.google.com/open?id=1795_joGaL3QXMFeJoJPiNgB_d913XePx)
3. [](https://fatihhcelik.blogspot.com/2019/12/xss-vulnerability-on-ping6.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34135
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 14:56 UTC
- **Last Updated**: August 14, 2024 at 17:23 UTC
- **Reserved Date**: April 30, 2024 at 19:50 UTC
- **Assigned By**: adobe
### Vulnerability Description
Illustrator versions 28.5, 27.9.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Illustrator**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/illustrator/apsb24-45.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32681
- **State**: PUBLISHED
- **Published Date**: May 26, 2023 at 17:02 UTC
- **Last Updated**: February 13, 2025 at 16:54 UTC
- **Reserved Date**: May 11, 2023 at 16:33 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**psf - requests**
Affected versions:
- >= 2.3.0, < 2.31.0 (Status: affected)
### References
1. [https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q](https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q)
2. [https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5](https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5)
3. [https://github.com/psf/requests/releases/tag/v2.31.0](https://github.com/psf/requests/releases/tag/v2.31.0)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/)
6. [](https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html)
7. [](https://security.gentoo.org/glsa/202309-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35045
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 15:57 UTC
- **Reserved Date**: July 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0d63.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drive.google.com/file/d/1eIYb4VDyDnXLCjXKSoFQjkmoXyaCmr-m/view?usp=sharing)
2. [](https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5880
- **State**: PUBLISHED
- **Published Date**: April 30, 2020 at 20:54 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
Om BIG-IP 15.0.0-15.0.1.3 and 14.1.0-14.1.2.3, the restjavad process may expose a way for attackers to upload arbitrary files on the BIG-IP system, bypassing the authorization system. Resulting error messages may also reveal internal paths of the server.
### Affected Products
**n/a - BIG-IP**
Affected versions:
- 15.0.0-15.0.1.3, 14.1.0-14.1.2.3 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K94325657) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33839
- **State**: PUBLISHED
- **Published Date**: October 23, 2023 at 19:45 UTC
- **Last Updated**: September 11, 2024 at 14:51 UTC
- **Reserved Date**: May 23, 2023 at 00:31 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify Governance 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 256036.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**IBM - Security Verify Governance**
Affected versions:
- 10.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7057377)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/256036) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10569
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Stack buffer overflow due to instance id is misplaced inside definition of hardware accelerated effects in makefile in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, APQ8098, MDM9607, MDM9640, MSM8998, QCS605, SC8180X, SDM439, SDM630, SDM636, SDM660, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile**
Affected versions:
- APQ8053, APQ8098, MDM9607, MDM9640, MSM8998, QCS605, SC8180X, SDM439, SDM630, SDM636, SDM660, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6591
- **State**: PUBLISHED
- **Published Date**: July 27, 2024 at 01:51 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: July 09, 2024 at 00:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ultimate WordPress Auction Plugin plugin for WordPress is vulnerable to unauthorized email creation and sending due to a missing capability check on the 'send_auction_email_callback' and 'resend_auction_email_callback' functions in all versions up to, and including, 4.2.6. This makes it possible for unauthenticated attackers to craft emails that include links and send to any email address.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**nitesh_singh - Ultimate WordPress Auction Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/534a5d1d-cc34-4d84-b3a3-bf2282718656?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ultimate-auction.php#L93)
3. [](https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ultimate-auction.php#L119)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27722
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 10:44 UTC
- **Last Updated**: August 03, 2024 at 21:26 UTC
- **Reserved Date**: February 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Nsasoft US LLC SpotAuditor 5.3.5. The program can be crashed by entering 300 bytes char data into the "Key" or "Name" field while registering.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/49590)
2. [](https://www.exploit-db.com/exploits/49638) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3269
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 03:34 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 03, 2024 at 17:49 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Download Monitor plugin for WordPress is vulnerable to unauthorized access to functionality due to a missing capability check on the dlm_uninstall_plugin function in all versions up to, and including, 4.9.13. This makes it possible for authenticated attackers to uninstall the plugin and delete its data.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Affected Products
**wpchill - Download Monitor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c454a958-91c4-4847-91f6-dedebf857964?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3092928/download-monitor/trunk?contextall=1&old=3070504&old_path=%2Fdownload-monitor%2Ftrunk)
### Credits
- Arkadiusz Hydzik |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6678
- **State**: PUBLISHED
- **Published Date**: December 23, 2019 at 16:57 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, the TMM process may restart when the packet filter feature is enabled.
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 15.0.0-15.0.1 (Status: affected)
- 14.1.0-14.1.2.2 (Status: affected)
- 14.0.0-14.0.1 (Status: affected)
- 13.1.0-13.1.3.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K04897373) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30875
- **State**: PUBLISHED
- **Published Date**: October 17, 2024 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 15:44 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in JavaScript Library jquery-ui v.1.13.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted payload to the window.addEventListener component. NOTE: this is disputed by the Supplier because it cannot be reproduced, and because the exploitation example does not indicate whether, or how, the example website is using jQuery UI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Ant1sec-ops/CVE-2024-30875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2626
- **State**: PUBLISHED
- **Published Date**: May 11, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin.php in SchoolBoard allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters. NOTE: CVE disputes this issue, because 'username' does not exist, and the password is not used in any queries
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070503 SchoolBoard (admin.php) Remote Login Bypass SQL Injection Vulnerability](http://www.securityfocus.com/archive/1/467486/100/0/threaded)
2. [23798](http://www.securityfocus.com/bid/23798)
3. [36162](http://osvdb.org/36162)
4. [2695](http://securityreason.com/securityalert/2695)
5. [20070511 probably false: SchoolBoard (admin.php) SQL injection](http://www.attrition.org/pipermail/vim/2007-May/001609.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3718
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 20:36 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
serve node module suffers from Improper Handling of URL Encoding by permitting access to ignored files if a filename is URL encoded.
### Weakness Classification (CWE)
- CWE-177: Security Weakness
### Affected Products
**HackerOne - serve node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://hackerone.com/reports/308721) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15291
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 13:23 UTC
- **Last Updated**: August 05, 2024 at 00:42 UTC
- **Reserved Date**: August 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f)
2. [[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2](http://www.openwall.com/lists/oss-security/2019/08/20/2)
3. [[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2](http://www.openwall.com/lists/oss-security/2019/08/22/1)
4. [](https://security.netapp.com/advisory/ntap-20190905-0002/)
5. [openSUSE-SU-2019:2307](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html)
6. [openSUSE-SU-2019:2308](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html)
7. [20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)](https://seclists.org/bugtraq/2020/Jan/10)
8. [](http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html)
9. [[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html)
10. [USN-4254-1](https://usn.ubuntu.com/4254-1/)
11. [USN-4254-2](https://usn.ubuntu.com/4254-2/)
12. [USN-4258-1](https://usn.ubuntu.com/4258-1/)
13. [USN-4287-1](https://usn.ubuntu.com/4287-1/)
14. [USN-4287-2](https://usn.ubuntu.com/4287-2/)
15. [[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html)
16. [USN-4284-1](https://usn.ubuntu.com/4284-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15302
- **State**: PUBLISHED
- **Published Date**: June 25, 2020 at 19:58 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Argent RecoveryManager before 0xdc350d09f71c48c5D22fBE2741e4d6A03970E192, the executeRecovery function does not require any signatures in the zero-guardian case, which allows attackers to cause a denial of service (locking) or a takeover.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.openzeppelin.com/argent-vulnerability-report/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1254
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 18:31 UTC
- **Last Updated**: August 22, 2024 at 19:10 UTC
- **Reserved Date**: February 06, 2024 at 08:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Byzoro Smart S20 Management Platform up to 20231120. This affects an unknown part of the file /sysmanage/sysmanageajax.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252993 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Byzoro - Smart S20 Management Platform**
Affected versions:
- 20231120 (Status: affected)
### References
1. [VDB-252993 | Byzoro Smart S20 Management Platform sysmanageajax.php sql injection](https://vuldb.com/?id.252993)
2. [VDB-252993 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.252993)
3. [Submit #274042 | Beijing Baizhuo Network Technology Co., Ltd. Smart S20 Smart S20 up to 20231120 SQL injection](https://vuldb.com/?submit.274042)
4. [](https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md)
### Credits
- rocker (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5376
- **State**: PUBLISHED
- **Published Date**: October 17, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 17:06 UTC
- **Reserved Date**: August 22, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM Storwize V7000 Unified 1.3.x and 1.4.x before 1.4.2.0 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, related to a "cross frame scripting" attack against an administrative user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=ssg1S1004452)
2. [storwize-v7000-cve20135376-crossframe(86902)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86902) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4645
- **State**: PUBLISHED
- **Published Date**: November 09, 2019 at 01:41 UTC
- **Last Updated**: September 17, 2024 at 04:29 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 170881.
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.0 (Status: affected)
- 11.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/1074144)
2. [ibm-cognos-cve20194645-xss (170881)](https://exchange.xforce.ibmcloud.com/vulnerabilities/170881) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32848
- **State**: PUBLISHED
- **Published Date**: September 12, 2024 at 01:09 UTC
- **Last Updated**: September 12, 2024 at 21:18 UTC
- **Reserved Date**: April 19, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
### Affected Products
**Ivanti - EPM**
Affected versions:
- 2024 September Security Update (Status: affected)
- 2022 SU6 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0216
- **State**: PUBLISHED
- **Published Date**: April 22, 2012 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 18:16 UTC
- **Reserved Date**: December 14, 2011 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [gnulinux-apache2-xss(75211)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75211)
2. [DSA-2452](http://www.debian.org/security/2012/dsa-2452) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1725
- **State**: PUBLISHED
- **Published Date**: November 05, 2020 at 16:45 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar SIEM 7.3 and 7.4 n a multi tenant configuration could be vulnerable to information disclosure. IBM X-Force ID: 147440.
### Affected Products
**IBM - QRadar SIEM**
Affected versions:
- 7.3.0 (Status: affected)
- 7.4 (Status: affected)
- 7.3.3.Patch.5 (Status: affected)
- 7.4.1.Patch.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6359945)
2. [ibm-qradar-cve20181725-info-disc (147440)](https://exchange.xforce.ibmcloud.com/vulnerabilities/147440) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20174
- **State**: PUBLISHED
- **Published Date**: March 15, 2019 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 11:51 UTC
- **Reserved Date**: December 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [106938](http://www.securityfocus.com/bid/106938)
2. [](https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1)
3. [GLSA-201903-06](https://security.gentoo.org/glsa/201903-06)
4. [](https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/)
5. [DSA-4394](https://www.debian.org/security/2019/dsa-4394)
6. [[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update](https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html)
7. [openSUSE-SU-2019:2135](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37078
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:03 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the lang parameter at /setting/setLanguageCfg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31804
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 19:04 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via the course category parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://chamilo.com)
2. [](https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-96-2023-04-06-Low-impact-Moderate-risk-XSS-in-course-categories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12554
- **State**: PUBLISHED
- **Published Date**: June 05, 2019 at 16:23 UTC
- **Last Updated**: August 04, 2024 at 23:24 UTC
- **Reserved Date**: June 02, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the WSubStr function (provided by the scripting engine) allows an attacker to cause a denial of service by crashing the application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sweetscape.com/010editor/release_notes.html)
2. [](https://github.com/ereisr00/bagofbugz/blob/master/010Editor/WSubStr.bt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0083
- **State**: PUBLISHED
- **Published Date**: January 09, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: January 04, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in the logging code of SMS Server Tools (smstools) 1.14.8 and earlier allows local users to execute arbitrary code via unspecified attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [smstools-logging-format-string(24034)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24034)
2. [18343](http://secunia.com/advisories/18343)
3. [18357](http://secunia.com/advisories/18357)
4. [16188](http://www.securityfocus.com/bid/16188)
5. [22287](http://www.osvdb.org/22287)
6. [DSA-930](http://www.debian.org/security/2005/dsa-930) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50274
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 01:30 UTC
- **Last Updated**: May 04, 2025 at 09:50 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
idpf: avoid vport access in idpf_get_link_ksettings
When the device control plane is removed or the platform
running device control plane is rebooted, a reset is detected
on the driver. On driver reset, it releases the resources and
waits for the reset to complete. If the reset fails, it takes
the error path and releases the vport lock. At this time if the
monitoring tools tries to access link settings, it call traces
for accessing released vport pointer.
To avoid it, move link_speed_mbps to netdev_priv structure
which removes the dependency on vport pointer and the vport lock
in idpf_get_link_ksettings. Also use netif_carrier_ok()
to check the link status and adjust the offsetof to use link_up
instead of link_speed_mbps.
### Affected Products
**Linux - Linux**
Affected versions:
- 02cbfba1add5bd9088c7d14c6b93b77a6ea8f3bb (Status: affected)
- 02cbfba1add5bd9088c7d14c6b93b77a6ea8f3bb (Status: affected)
**Linux - Linux**
Affected versions:
- 6.7 (Status: affected)
- 0 (Status: unaffected)
- 6.11.8 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fa4d906ad0fb63a980a1d586a061c78ea1a345ba)
2. [](https://git.kernel.org/stable/c/81d2fb4c7c18a3b36ba3e00b9d5b753107472d75) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33892
- **State**: PUBLISHED
- **Published Date**: February 16, 2023 at 19:59 UTC
- **Last Updated**: January 27, 2025 at 18:23 UTC
- **Reserved Date**: June 18, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - Intel(R) Quartus Prime Pro and Standard edition software**
Affected versions:
- See references (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7175
- **State**: PUBLISHED
- **Published Date**: July 10, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 15:56 UTC
- **Reserved Date**: March 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NfSen before 1.3.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the customfmt parameter (aka the "Custom output format" field).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/nfsen/news/2017/01/nfsen-138-released---security-fix/)
2. [42314](https://www.exploit-db.com/exploits/42314/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27789
- **State**: REJECTED
- **Published Date**: August 18, 2022 at 19:24 UTC
- **Last Updated**: August 18, 2022 at 19:24 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2015
- **State**: PUBLISHED
- **Published Date**: May 14, 2016 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 23:17 UTC
- **Reserved Date**: January 22, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HPE System Management Homepage before 7.5.5 allows local users to obtain sensitive information or modify data via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017)
2. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380)
3. [1035775](http://www.securitytracker.com/id/1035775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0837
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 01:45 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
### Affected Products
**Microsoft Corporation - Microsoft Edge, ChakraCore**
Affected versions:
- Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016. (Status: affected)
### References
1. [44081](https://www.exploit-db.com/exploits/44081/)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0837)
3. [102876](http://www.securityfocus.com/bid/102876)
4. [1040372](http://www.securitytracker.com/id/1040372) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1909
- **State**: PUBLISHED
- **Published Date**: April 10, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in login.php in Ryan Haudenschilt Battle.net Clan Script for PHP 1.5.1 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) user or (2) pass parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24838](http://secunia.com/advisories/24838)
2. [ADV-2007-1313](http://www.vupen.com/english/advisories/2007/1313)
3. [34747](http://osvdb.org/34747)
4. [3691](https://www.exploit-db.com/exploits/3691)
5. [23383](http://www.securityfocus.com/bid/23383) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46231
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 01:33 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link device DI-7200GV2.E1 v21.04.09E1 was discovered to contain a command injection vulnerability in the function urlrd_opt.asp. This vulnerability allows attackers to execute arbitrary commands via the url_en parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_5/5.md)
3. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5957
- **State**: PUBLISHED
- **Published Date**: May 17, 2019 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in Installer of Electronic reception and examination of application for radio licenses Online 1.0.9.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**Ministry of Internal Affairs and Communications - Installer of Electronic reception and examination of application for radio licenses Online**
Affected versions:
- 1.0.9.0 and earlier (Status: affected)
### References
1. [](https://www.denpa.soumu.go.jp/public/prog/onlineInstaller_download.html)
2. [](http://jvn.jp/en/jp/JVN91361851/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4869
- **State**: PUBLISHED
- **Published Date**: September 19, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in phpunity-postcard.php in phpunity.postcard allows remote attackers to execute arbitrary PHP code via a URL in the gallery_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21897](http://secunia.com/advisories/21897)
2. [19993](http://www.securityfocus.com/bid/19993)
3. [28763](http://www.osvdb.org/28763)
4. [2357](https://www.exploit-db.com/exploits/2357)
5. [ADV-2006-3595](http://www.vupen.com/english/advisories/2006/3595) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18025
- **State**: PUBLISHED
- **Published Date**: January 09, 2018 at 03:00 UTC
- **Last Updated**: September 16, 2024 at 17:53 UTC
- **Reserved Date**: January 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cgi-bin/drknow.cgi in Innotube ITGuard-Manager 0.0.0.1 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the username field, as demonstrated by a username beginning with "admin|" to use the '|' metacharacter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43343](https://www.exploit-db.com/exploits/43343/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30716
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 03:12 UTC
- **Last Updated**: September 26, 2024 at 15:26 UTC
- **Reserved Date**: April 14, 2023 at 01:59 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper access control vulnerability in SVCAgent prior to SMR Sep-2023 Release 1 allows attackers to trigger certain commands.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Sep-2023 Release in Android 11, 12, 13 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2280
- **State**: PUBLISHED
- **Published Date**: October 18, 2007 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 03:59 UTC
- **Reserved Date**: October 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
syslogd on OpenBSD 2.9 through 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20021120 [OpenBSD] [syslogd] false src-IP when logging to remote syslogd](http://archives.neohapsis.com/archives/bugtraq/2002-11/0272.html)
2. [openbsd-syslogd-incorrect-reporting(10702)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10702)
3. [6219](http://www.securityfocus.com/bid/6219) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26830
- **State**: PUBLISHED
- **Published Date**: April 16, 2021 at 17:24 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28017
- **State**: PUBLISHED
- **Published Date**: April 23, 2025 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:54 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A800R V4.1.2cu.5032_B20200408 is vulnerable to Command Injection in downloadFile.cgi via the QUERY_STRING parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://locrian-lightning-dc7.notion.site/TOTOLINK-A800R-RCE-1938e5e2b1a280d696bbd25699fb5e97)
2. [](https://locrian-lightning-dc7.notion.site/CVE-2025-28017-TOTOLINK-A800R-RCE-1938e5e2b1a280d696bbd25699fb5e97) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17207
- **State**: PUBLISHED
- **Published Date**: September 19, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 03:59 UTC
- **Reserved Date**: September 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://snapcreek.com/duplicator/docs/changelog/?lite)
2. [](https://www.synacktiv.com/ressources/advisories/WordPress_Duplicator-1.2.40-RCE.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4792
- **State**: PUBLISHED
- **Published Date**: April 05, 2021 at 16:20 UTC
- **Last Updated**: September 17, 2024 at 03:38 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Edge 4.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 189441.
### Affected Products
**IBM - Edge**
Affected versions:
- 4.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6439819)
2. [ibm-edge-cve20204792-xss (189441)](https://exchange.xforce.ibmcloud.com/vulnerabilities/189441) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4076
- **State**: PUBLISHED
- **Published Date**: September 15, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in (1) Tor World Tor Board 1.3 and earlier, (2) Topics BBS 1.11 and earlier, (3) Simple BBS 1.86 and earlier, and (4) Interactive BBS 1.57 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-0917.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31835](http://secunia.com/advisories/31835)
2. [](http://download.torworld.com/bug/20080905.html)
3. [tor-world-multiple-unspecified-xss(45043)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45043)
4. [31105](http://www.securityfocus.com/bid/31105)
5. [JVN#18616622](http://jvn.jp/en/jp/JVN18616622/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0425
- **State**: PUBLISHED
- **Published Date**: July 25, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 11, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to read arbitrary files via a ... (triple dot) in an HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030723 R7-0015: Multiple Vulnerabilities Apple QuickTime/Darwin Streaming Server](http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0040.html)
2. [](http://www.rapid7.com/advisories/R7-0015.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0028
- **State**: PUBLISHED
- **Published Date**: June 16, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Outlook Web Access (OWA) in Microsoft Exchange Server 2013 SP1, Cumulative Update 11, and Cumulative Update 12 and 2016 Gold and Cumulative Update 1 does not properly restrict loading of IMG elements, which makes it easier for remote attackers to track users via a crafted HTML e-mail message, aka "Microsoft Exchange Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-079](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-079)
2. [1036106](http://www.securitytracker.com/id/1036106) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3934
- **State**: PUBLISHED
- **Published Date**: July 21, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in postscript/postscript.php in BBS E-Market allows remote attackers to execute arbitrary PHP code via a URL in the p_mode parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24957](http://www.securityfocus.com/bid/24957)
2. [ADV-2007-2608](http://www.vupen.com/english/advisories/2007/2608)
3. [4195](https://www.exploit-db.com/exploits/4195)
4. [36279](http://osvdb.org/36279)
5. [](http://darkcode.ath.cx/f0rum/ind3x.php?action=vthread&forum=12&topic=80)
6. [bbs-emarket-postscript-file-include(35476)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35476)
7. [26117](http://secunia.com/advisories/26117) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6854
- **State**: PUBLISHED
- **Published Date**: January 04, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 20:42 UTC
- **Reserved Date**: January 03, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The qcamvc_video_init function in qcamvc.c in De Marchi Daniele QuickCam VC Linux device driver (aka quickcam-vc) 1.0.9 and earlier does not properly check a boundary, triggering memory corruption, which might allow attackers to execute arbitrary code via a crafted QuickCam object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21815](http://www.securityfocus.com/bid/21815)
2. [20061229 QuickCam linux device driver allows arbitrary code execution](http://www.securityfocus.com/archive/1/455487/100/0/threaded)
3. [quickcam-driver-code-execution(31211)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2040
- **State**: PUBLISHED
- **Published Date**: February 20, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:02 UTC
- **Reserved Date**: February 20, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Contact Form DB (aka CFDB and contact-form-7-to-database-extension) plugin 2.8.26 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit_time parameter in the CF7DBPluginSubmissions page to wp-admin/admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/130311/WordPress-Contact-Form-DB-2.8.26-Cross-Site-Scripting.html)
2. [wp-cfdb-submittime-xss(100818)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100818) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26393
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 14:40 UTC
- **Last Updated**: September 16, 2024 at 18:34 UTC
- **Reserved Date**: March 03, 2022 at 00:00 UTC
- **Assigned By**: Baxter
### Vulnerability Description
The Baxter Spectrum WBM is susceptible to format string attacks via application messaging. An attacker could use this to read memory in the WBM to access sensitive information or cause a Denial of Service (DoS) on the WBM.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-134: Security Weakness
### Affected Products
**Baxter - Baxter Spectrum Wireless Battery Module (WBM)**
Affected versions:
- 20D29 (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7120
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Model Laboratory (aka com.magazinecloner.modellaboratory) application @7F080193 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#775657](http://www.kb.cert.org/vuls/id/775657)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12428
- **State**: PUBLISHED
- **Published Date**: August 04, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 18:36 UTC
- **Reserved Date**: August 04, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service in CloneDrawInfo in draw.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/544)
2. [100145](http://www.securityfocus.com/bid/100145)
3. [DSA-4019](https://www.debian.org/security/2017/dsa-4019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8280
- **State**: PUBLISHED
- **Published Date**: September 21, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Qualcomm products with Android releases from CAF using the Linux kernel, during the wlan calibration data store and retrieve operation, there are some potential race conditions which lead to a memory leak and a buffer overflow during the context switch.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-09-01)
2. [100658](http://www.securityfocus.com/bid/100658) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8418
- **State**: PUBLISHED
- **Published Date**: February 08, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 02:20 UTC
- **Reserved Date**: October 05, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in the Qualcomm crypto driver could enable a remote attacker to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of remote code execution in the context of the kernel. Product: Android. Versions: N/A. Android ID: A-32652894. References: QC-CR#1077457.
### Affected Products
**Google Inc. - Android**
Affected versions:
- n/a (Status: affected)
### References
1. [1037798](http://www.securitytracker.com/id/1037798)
2. [96058](http://www.securityfocus.com/bid/96058)
3. [](https://source.android.com/security/bulletin/2017-02-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12007
- **State**: PUBLISHED
- **Published Date**: December 01, 2024 at 23:00 UTC
- **Last Updated**: December 02, 2024 at 22:15 UTC
- **Reserved Date**: December 01, 2024 at 11:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in code-projects Farmacia 1.0. This affects an unknown part of the file /visualizar-produto.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Farmacia**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-286491 | code-projects Farmacia visualizar-produto.php sql injection](https://vuldb.com/?id.286491)
2. [VDB-286491 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.286491)
3. [Submit #454715 | code-projects farmacia-in-php v1.0 SQL Injection](https://vuldb.com/?submit.454715)
4. [](https://github.com/LamentXU123/cve/blob/main/cve-l.md)
5. [](https://code-projects.org/)
### Credits
- LamentXU (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44667
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 00:00 UTC
- **Last Updated**: October 29, 2024 at 16:04 UTC
- **Reserved Date**: August 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Shenzhen Haichangxing Technology Co., Ltd HCX H822 4G LTE Router M7628NNxISPxUIv2_v1.0.1557.15.35_P0 is vulnerable to Incorrect Access Control. Unauthenticated factory mode reset and command injection leads to information exposure and root shell access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://shenzhen.com)
2. [](https://medium.com/%40sengkyaut/unauthenticated-factory-mode-reset-and-at-command-injection-in-jboneos-or-jbonecloud-firmware-1dec156b7ddd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-20008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-20008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-20008
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 23:26 UTC
- **Last Updated**: August 06, 2024 at 03:47 UTC
- **Reserved Date**: December 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The REST/JSON project 7.x-1.x for Drupal allows session enumeration, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2744889) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.