System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15617
- **State**: PUBLISHED
- **Published Date**: July 28, 2020 at 17:01 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_list_accounts.php. When parsing the status parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9708.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**CentOS Web Panel - CentOS Web Panel**
Affected versions:
- cwp-e17.0.9.8.923 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-764/)
### Credits
- @PaulosYibelo & CasperTea |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0756
- **State**: PUBLISHED
- **Published Date**: May 05, 2011 at 01:00 UTC
- **Last Updated**: September 17, 2024 at 01:11 UTC
- **Reserved Date**: February 02, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The application server in Trustwave WebDefend Enterprise before 5.0 uses hardcoded console credentials, which makes it easier for remote attackers to read security-event data by using the remote console GUI to connect to the management port.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/spiderlabs/advisories/TWSL2011-001.txt)
2. [1025447](http://securitytracker.com/id?1025447) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9887
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:24 UTC
- **Reserved Date**: June 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FPX+0x000000000000688d."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9887)
2. [](http://www.irfanview.com/plugins.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36177
- **State**: PUBLISHED
- **Published Date**: January 06, 2021 at 15:54 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RsaPad_PSS in wolfcrypt/src/rsa.c in wolfSSL before 4.6.0 has an out-of-bounds write for certain relationships between key size and digest size.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wolfSSL/wolfssl/commit/63bf5dc56ccbfc12a73b06327361687091a4c6f7)
2. [](https://github.com/wolfSSL/wolfssl/pull/3426)
3. [](https://github.com/wolfSSL/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f)
4. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26567)
5. [](https://github.com/wolfSSL/wolfssl/releases/tag/v4.6.0-stable) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38950
- **State**: PUBLISHED
- **Published Date**: June 26, 2024 at 00:00 UTC
- **Last Updated**: August 12, 2024 at 17:53 UTC
- **Reserved Date**: June 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to __interceptor_memcpy function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/strukturag/libde265/issues/460)
2. [](https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38950) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38698
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 14:34 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In messaging service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1575654905820020738) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24610
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 14:15 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health charting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/shihjay2/docker-nosh)
2. [](https://noshemr.wordpress.com)
3. [](https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533)
4. [](https://gist.github.com/abbisQQ/d8392acf7e02003e73af973cc9f5f54a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47395
- **State**: PUBLISHED
- **Published Date**: January 18, 2023 at 00:45 UTC
- **Last Updated**: January 16, 2025 at 21:59 UTC
- **Reserved Date**: December 21, 2022 at 18:52 UTC
- **Assigned By**: icscert
### Vulnerability Description
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site request forgery in its monitor services. An attacker could take advantage of this vulnerability to execute arbitrary maintenance operations and cause a denial-of-service condition.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Sewio - RTLS Studio**
Affected versions:
- 2.0.0 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01)
### Credits
- Andrea Palanca of Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9371, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9371
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 04:24 UTC
- **Last Updated**: November 21, 2024 at 11:30 UTC
- **Reserved Date**: September 30, 2024 at 20:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Branda – White Label & Branding, Custom Login Page Customizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.4.19. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**wpmudev - Branda – Branda – White Label & Branding, Custom Login Page Customizer**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/eb60e5c8-cbda-4488-816c-a7fdf2b39fd6?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/branda-white-labeling/tags/3.4.19/inc/class-branda-admin.php#L1871)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3191895%40branda-white-labeling&new=3191895%40branda-white-labeling&sfp_email=&sfph_mail=)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32936
- **State**: PUBLISHED
- **Published Date**: June 17, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 23:33 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An out-of-bounds write issue exists in the DXF file-recovering procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context of the current process.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - Drawings SDK**
Affected versions:
- All versions prior to 2022.4 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-159-02)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-982/)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf)
5. [](https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2366
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in GlobalSCAPE Secure FTP Server 2.0 B03.11.2004.2 allows remote attackers to cause a denial of service (crash) via a SITE command with a long argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securiteam.com/windowsntfocus/5KP0C20CAC.html)
2. [](http://www.cuteftp.com/gsftps/history.asp)
3. [9904](http://www.securityfocus.com/bid/9904)
4. [11159](http://secunia.com/advisories/11159/)
5. [secureftp-site-command-bo(15511)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15511) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25661
- **State**: PUBLISHED
- **Published Date**: October 01, 2024 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 15:10 UTC
- **Reserved Date**: February 09, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Infinera TNMS (Transcend Network Management System) 19.10.3, cleartext storage of sensitive information in memory of the desktop application TNMS Client allows guest OS administrators to obtain various users' passwords by reading memory dumps of the desktop application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25661) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9098
- **State**: PUBLISHED
- **Published Date**: March 11, 2020 at 14:27 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An Integer overflow in the built-in web server allows remote attackers to initiate DoS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-20-056-01)
2. [](https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39921
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 15:47 UTC
- **Last Updated**: August 02, 2024 at 18:18 UTC
- **Reserved Date**: August 07, 2023 at 12:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Molongui Author Box, Guest Author and Co-Authors for Your Posts – Molongui allows Stored XSS.This issue affects Author Box, Guest Author and Co-Authors for Your Posts – Molongui: from n/a through 4.6.19.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Molongui - Author Box, Guest Author and Co-Authors for Your Posts – Molongui**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/molongui-authorship/wordpress-author-box-for-authors-co-authors-multiple-authors-and-guest-authors-molongui-plugin-4-6-19-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Abdullah Mudzakir (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33624
- **State**: PUBLISHED
- **Published Date**: June 23, 2021 at 15:37 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner)
2. [](http://www.openwall.com/lists/oss-security/2021/06/21/1)
3. [](https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db)
4. [[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21143
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 17:50 UTC
- **Last Updated**: April 16, 2025 at 16:45 UTC
- **Reserved Date**: January 21, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input on several locations, which may allow an attacker to inject arbitrary commands.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Airspan Networks - MMP**
Affected versions:
- unspecified (Status: affected)
**Airspan Networks - PTP C-series**
Affected versions:
- unspecified (Status: affected)
**Airspan Networks - PTMP C-series and A5x**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-034-02)
### Credits
- Noam Moshe of Claroty reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8912
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 02:27 UTC
- **Reserved Date**: March 22, 2018 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in SYNO.NoteStation.Note in Synology Note Station before 2.5.1-0844 allows remote authenticated users to inject arbitrary web script or HTML via the commit_msg parameter.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Synology - Note Station**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.synology.com/zh-tw/support/security/Synology_SA_18_03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5290
- **State**: PUBLISHED
- **Published Date**: December 26, 2019 at 20:33 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A Denial of Service vulnerability exists in ircd-ratbox 3.0.9 in the MONITOR Command Handler.
### Affected Products
**ircd-ratbox - ircd-ratbox**
Affected versions:
- 3.0.9 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1271113)
2. [](http://www.openwall.com/lists/oss-security/2015/10/11/1)
3. [](http://www.openwall.com/lists/oss-security/2015/10/12/1)
4. [](https://github.com/skyhighwings/CVE-2015-5290) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0165
- **State**: PUBLISHED
- **Published Date**: April 25, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: February 23, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [delegate-proxy-bo(4105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4195)
2. [FreeBSD-SA-00:04](http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=Pine.BSF.4.21.0002192249290.10784-100000%40freefall.freebsd.org)
3. [K-023](http://www.ciac.org/ciac/bulletins/k-023.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38633
- **State**: PUBLISHED
- **Published Date**: July 22, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 17:46 UTC
- **Reserved Date**: July 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.gnome.org/GNOME/librsvg/-/issues/996)
2. [](https://bugzilla.suse.com/show_bug.cgi?id=1213502)
3. [](https://gitlab.gnome.org/GNOME/librsvg/-/releases/2.56.3)
4. [20230724 APPLE-SA-2023-07-24-1 Safari 16.6](http://seclists.org/fulldisclosure/2023/Jul/43)
5. [[oss-security] 20230727 CVE-2023-38633 in librsvg: Arbitrary file read when xinclude href has special characters](http://www.openwall.com/lists/oss-security/2023/07/27/1)
6. [FEDORA-2023-fc79ee273d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5BCXT5GW6RCL45ZUHUZR4CJG2BAFDVC/)
7. [FEDORA-2023-0873c38acd](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/422NTIHIEBRASIG2DWXYBH4ADYMHY626/)
8. [DSA-5484](https://www.debian.org/security/2023/dsa-5484)
9. [](https://security.netapp.com/advisory/ntap-20230831-0011/)
10. [[oss-security] 20230906 Re: CVE-2023-38633 in librsvg: Arbitrary file read when xinclude href has special characters](http://www.openwall.com/lists/oss-security/2023/09/06/10)
11. [](https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/)
12. [](https://news.ycombinator.com/item?id=37415799) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0568
- **State**: PUBLISHED
- **Published Date**: August 07, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in the msm_set_crop function in drivers/media/video/msm/msm_camera.c in the MSM-Camera driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (memory corruption) via an application that makes a crafted ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.codeaurora.org/projects/security-advisories/multiple-issues-camera-drivers-cve-2014-9410-cve-2015-0568)
2. [92379](http://www.securityfocus.com/bid/92379) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5408
- **State**: PUBLISHED
- **Published Date**: November 05, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 22, 2014 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the login script in the Wind Farm Portal on Nordex Control 2 (NC2) SCADA devices 15 and earlier allows remote attackers to inject arbitrary web script or HTML via the username parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-14-303-01)
2. [70851](http://www.securityfocus.com/bid/70851) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10100
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 19:04 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub component of Oracle PeopleSoft Products (subcomponent: HTML Area). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise PRTL Interaction Hub**
Affected versions:
- 9.1.0 (Status: affected)
### References
1. [1038932](http://www.securitytracker.com/id/1038932)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
3. [99759](http://www.securityfocus.com/bid/99759) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45303
- **State**: PUBLISHED
- **Published Date**: October 06, 2023 at 00:00 UTC
- **Last Updated**: September 19, 2024 at 18:41 UTC
- **Reserved Date**: October 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ThingsBoard before 3.5 allows Server-Side Template Injection if users are allowed to modify an email template, because Apache FreeMarker supports freemarker.template.utility.Execute (for content sent to the /api/admin/settings endpoint).
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:H/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://herolab.usd.de/security-advisories/usd-2023-0010/)
2. [](https://freemarker.apache.org/docs/api/freemarker/template/utility/Execute.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3879
- **State**: PUBLISHED
- **Published Date**: October 25, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 01, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 15.0.874.102 does not prevent redirects to chrome: URLs, which has unspecified impact and remote attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:13246](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13246)
2. [](http://code.google.com/p/chromium/issues/detail?id=95374)
3. [google-chrome-scheme-spoofing(70957)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70957)
4. [](http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24973
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 13:45 UTC
- **Last Updated**: August 14, 2024 at 15:28 UTC
- **Reserved Date**: March 11, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access.
### CVSS Metrics
- **CVSS Base Score**: 2.2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Intel(R) Distribution for GDB software**
Affected versions:
- before version 2024.0.1 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2555
- **State**: PUBLISHED
- **Published Date**: October 14, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Excel Services on SharePoint Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted calculatedColumnFormula object in an Office document, aka "Microsoft Office Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-110](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-110)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-517)
3. [1033803](http://www.securitytracker.com/id/1033803) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3517
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 22:28 UTC
- **Last Updated**: August 02, 2024 at 06:55 UTC
- **Reserved Date**: July 05, 2023 at 16:19 UTC
- **Assigned By**: HITVAN
### Vulnerability Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 9.5.0.1 and 9.3.0.5, including
8.3.x does not restrict JNDI identifiers during the creation of XActions, allowing control of system level data sources.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-99: Security Weakness
### Affected Products
**Hitachi Vantara - Pentaho Data Integration & Analytics**
Affected versions:
- 1.0 (Status: affected)
- 9.4.0.0 (Status: affected)
### References
1. [](https://support.pentaho.com/hc/en-us/articles/19668665099533)
### Credits
- Markus Wulftange |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7435
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The AJD Bail Bonds (aka com.onesolutionapps.ajdbailbondsandroid) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#152177](http://www.kb.cert.org/vuls/id/152177)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4924
- **State**: PUBLISHED
- **Published Date**: October 09, 2011 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:46 UTC
- **Reserved Date**: October 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in logic/controller.class.php in clearBudget 0.9.8 allows remote attackers to execute arbitrary PHP code via a URL in the actionPath parameter. NOTE: this issue has been disputed by a reliable third party
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14614](http://www.exploit-db.com/exploits/14614)
2. [[vim] 20100811 clearBudget v0.9.8 Remote File Include Vulnerability](http://attrition.org/pipermail/vim/2010-August/002388.html)
3. [42351](http://www.securityfocus.com/bid/42351) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8795
- **State**: PUBLISHED
- **Published Date**: May 05, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in home/seos/courier/smtpg_add.html with the param parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28169
- **State**: PUBLISHED
- **Published Date**: December 24, 2020 at 14:36 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The td-agent-builder plugin before 2020-12-18 for Fluentd allows attackers to gain privileges because the bin directory is writable by a user account, but a file in bin is executed as NT AUTHORITY\SYSTEM.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.fluentd.org/installation/install-by-msi)
2. [](https://td-agent-package-browser.herokuapp.com/4/windows)
3. [](https://www.fluentd.org/)
4. [](https://github.com/kenhys/td-agent-builder/commit/eec6e2dedf12f2e0c01c2bbe7b8c15b639b3b938)
5. [](https://github.com/fluent/fluentd/issues/3201)
6. [](https://github.com/fluent-plugins-nursery/td-agent-builder/pull/247/commits/6f9cb6393392d62caa99907c0ebbcbab6b94a3f1)
7. [](http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html)
8. [DSA-4949](https://www.debian.org/security/2021/dsa-4949) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1844
- **State**: PUBLISHED
- **Published Date**: May 03, 2011 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:44 UTC
- **Reserved Date**: May 03, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in Microsoft Silverlight 4 before 4.0.60310.0 allows remote attackers to cause a denial of service (memory consumption) via an application involving a popup control and a custom DependencyProperty property, related to lack of garbage collection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://isc.sans.edu/diary.html?storyid=10747)
2. [2526954](http://support.microsoft.com/kb/2526954) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25902
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:16 UTC
- **Reserved Date**: February 15, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Dimension**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dimension/apsb23-20.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12512
- **State**: PUBLISHED
- **Published Date**: January 25, 2025 at 07:24 UTC
- **Last Updated**: January 27, 2025 at 15:33 UTC
- **Reserved Date**: December 11, 2024 at 13:25 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ask Me Anything (Anonymously) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'askmeanythingpeople' shortcode in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**arunbasillal - Ask Me Anything (Anonymously)**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0f204d39-8a4a-4008-adc6-3ba72531f5a2?source=cve)
2. [](https://wordpress.org/plugins/ask-me-anything-anonymously/)
### Credits
- SOPROBRO |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39642
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 10:47 UTC
- **Last Updated**: August 13, 2024 at 15:53 UTC
- **Reserved Date**: June 26, 2024 at 21:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in ThimPress LearnPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects LearnPress: from n/a through 4.2.6.8.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**ThimPress - LearnPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-2-6-8-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0064
- **State**: PUBLISHED
- **Published Date**: March 30, 2010 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: December 15, 2009 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
DesktopServices in Apple Mac OS X 10.6 before 10.6.3 preserves file ownership during an authenticated Finder copy, which might allow local users to bypass intended disk-quota restrictions and have unspecified other impact by copying files owned by other users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2010-03-29-1](http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html)
2. [](http://support.apple.com/kb/HT4077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38732
- **State**: PUBLISHED
- **Published Date**: September 29, 2022 at 14:36 UTC
- **Last Updated**: May 20, 2025 at 17:54 UTC
- **Reserved Date**: August 24, 2022 at 00:00 UTC
- **Assigned By**: netapp
### Vulnerability Description
SnapCenter versions prior to 4.7 shipped without Content Security Policy (CSP) implemented which could allow certain types of attacks that otherwise would be prevented.
### Affected Products
**n/a - SnapCenter**
Affected versions:
- prior to 4.7 (Status: affected)
### References
1. [](https://security.netapp.com/advisory/NTAP-20220926-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0469
- **State**: PUBLISHED
- **Published Date**: March 28, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-731](http://www.debian.de/security/2005/dsa-731)
2. [20050405-01-P](ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P)
3. [12918](http://www.securityfocus.com/bid/12918)
4. [USN-224-1](http://www.ubuntulinux.org/usn/usn-224-1)
5. [](http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt)
6. [57755](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1)
7. [oval:org.mitre.oval:def:9708](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708)
8. [DSA-703](http://www.debian.org/security/2005/dsa-703)
9. [101665](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1)
10. [DSA-699](http://www.debian.org/security/2005/dsa-699)
11. [MDKSA-2005:061](http://www.mandriva.com/security/advisories?name=MDKSA-2005:061)
12. [14745](http://secunia.com/advisories/14745)
13. [RHSA-2005:327](http://www.redhat.com/support/errata/RHSA-2005-327.html)
14. [20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability](http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities)
15. [FreeBSD-SA-05:01.telnet](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc)
16. [GLSA-200503-36](http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml)
17. [RHSA-2005:330](http://www.redhat.com/support/errata/RHSA-2005-330.html)
18. [DSA-697](http://www.debian.org/security/2005/dsa-697)
19. [57761](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1)
20. [VU#291924](http://www.kb.cert.org/vuls/id/291924)
21. [101671](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1)
22. [17899](http://secunia.com/advisories/17899) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5104
- **State**: PUBLISHED
- **Published Date**: August 23, 2012 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 00:23 UTC
- **Reserved Date**: August 23, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in wpsc-admin/display-sales-logs.php in WP e-Commerce plugin 3.8.7.1 and possibly earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the custom_text parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46957](http://secunia.com/advisories/46957)
2. [](http://plugins.trac.wordpress.org/changeset?reponame=&new=463447%40wp-e-commerce&old=463446%40wp-e-commerce)
3. [wpecommerce-index-xss(71443)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71443)
4. [77249](http://osvdb.org/77249)
5. [50757](http://www.securityfocus.com/bid/50757)
6. [](http://wordpress.org/extend/plugins/wp-e-commerce/changelog/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45202
- **State**: PUBLISHED
- **Published Date**: November 29, 2022 at 00:00 UTC
- **Last Updated**: April 25, 2025 at 14:48 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/2296)
2. [DSA-5411](https://www.debian.org/security/2023/dsa-5411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24872
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 00:37 UTC
- **Last Updated**: February 18, 2025 at 18:06 UTC
- **Reserved Date**: January 27, 2025 at 08:57 UTC
- **Assigned By**: sap
### Vulnerability Description
The ABAP Build Framework in SAP ABAP Platform allows an authenticated attacker to gain unauthorized access to a specific transaction. By executing the add-on build functionality within the ABAP Build Framework, an attacker could call the transaction and view its details. This has a limited impact on the confidentiality of the application with no effect on the integrity and availability of the application.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**SAP_SE - SAP ABAP Platform (ABAP Build Framework)**
Affected versions:
- SAP_BASIS 750 (Status: affected)
- SAP_BASIS 751 (Status: affected)
- SAP_BASIS 752 (Status: affected)
- SAP_BASIS 753 (Status: affected)
- SAP_BASIS 754 (Status: affected)
- SAP_BASIS 755 (Status: affected)
- SAP_BASIS 756 (Status: affected)
- SAP_BASIS 757 (Status: affected)
- SAP_BASIS 758 (Status: affected)
### References
1. [](https://me.sap.com/notes/3553753)
2. [](https://url.sap/sapsecuritypatchday) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21042
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: February 19, 2025 at 21:34 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In (TBD) of (TBD), there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239873326References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-18475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-18475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18475
- **State**: PUBLISHED
- **Published Date**: August 26, 2021 at 17:28 UTC
- **Last Updated**: August 04, 2024 at 14:00 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerabilty exists in Hucart CMS 5.7.4 is via the mes_title field. The first user inserts a malicious script into the header field of the outbox and sends it to other users. When other users open the email, the malicious code will be executed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/joelister/bug/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9132
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 16:52 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 25, 2019 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
Remote code execution vulnerability exists in KaKaoTalk PC messenger when user clicks specially crafted link in the message window. This affects KaKaoTalk windows version 2.7.5.2024 or lower.
### Affected Products
**KaKao - Kakaotalk Windows PC Messenger**
Affected versions:
- 2.7.5.2024 and earlier (Status: affected)
### References
1. [](https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=34981) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25803
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 11:51 UTC
- **Last Updated**: August 03, 2024 at 04:49 UTC
- **Reserved Date**: February 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Best Practical Request Tracker (RT) before 5.0.3 has an Open Redirect via a ticket search.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.bestpractical.com/release-notes/rt/index.html)
2. [](https://docs.bestpractical.com/release-notes/rt/5.0.3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2059
- **State**: PUBLISHED
- **Published Date**: June 08, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 25, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://distrib-coffee.ipsl.jussieu.fr/pub/mirrors/rpm/files/rpm/rpm-4.4/rpm-4.4.3.tar.gz)
2. [RHSA-2010:0679](http://www.redhat.com/support/errata/RHSA-2010-0679.html)
3. [[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm](http://lists.vmware.com/pipermail/security-announce/2011/000126.html)
4. [](http://rpm.org/gitweb?p=rpm.git%3Ba=commit%3Bh=ca2d6b2b484f1501eafdde02e1688409340d2383)
5. [ADV-2011-0606](http://www.vupen.com/english/advisories/2011/0606)
6. [65143](http://www.osvdb.org/65143)
7. [20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.](http://www.securityfocus.com/archive/1/516909/100/0/threaded)
8. [40028](http://secunia.com/advisories/40028)
9. [[oss-security] 20100603 Re: CVE Request -- rpm -- Fails to remove the SUID/SGID bits on package upgrade (RH BZ#598775)](http://marc.info/?l=oss-security&m=127559059928131&w=2)
10. [MDVSA-2010:180](http://www.mandriva.com/security/advisories?name=MDVSA-2010:180)
11. [[oss-security] 20100602 CVE Request -- rpm -- Fails to remove the SUID/SGID bits on package upgrade (RH BZ#598775)](http://www.openwall.com/lists/oss-security/2010/06/02/2)
12. [SUSE-SR:2010:017](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html)
13. [SUSE-SR:2010:014](http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html)
14. [](https://bugzilla.redhat.com/show_bug.cgi?id=598775)
15. [[oss-security] 20100602 Re: CVE Request -- rpm -- Fails to remove the SUID/SGID bits on package upgrade (RH BZ#598775)](http://www.openwall.com/lists/oss-security/2010/06/02/3)
16. [[oss-security] 20100603 Re: CVE Request -- rpm -- Fails to remove the SUID/SGID bits on package upgrade (RH BZ#598775)](http://www.openwall.com/lists/oss-security/2010/06/03/5)
17. [[oss-security] 20100604 Re: CVE Request -- rpm -- Fails to remove the SUID/SGID bits on package upgrade (RH BZ#598775)](http://www.openwall.com/lists/oss-security/2010/06/04/1)
18. [](http://www.vmware.com/security/advisories/VMSA-2011-0004.html)
19. [](https://bugzilla.redhat.com/show_bug.cgi?id=125517) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2454
- **State**: PUBLISHED
- **Published Date**: October 18, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 22:29 UTC
- **Reserved Date**: August 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Lotus Notes 6.5.4 and 6.5.5, and 7.0.0 and 7.0.1, uses insecure default permissions (Everyone/Full Control) for the "Notes" folder and all children, which allows local users to gain privileges and modify, add, or delete files in that folder.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4093](http://www.vupen.com/english/advisories/2006/4093)
2. [](http://secunia.com/secunia_research/2005-29/advisory/)
3. [29761](http://www.osvdb.org/29761)
4. [VU#383092](http://www.kb.cert.org/vuls/id/383092)
5. [19537](http://secunia.com/advisories/19537)
6. [20061018 Secunia Research: IBM Lotus Notes Insecure Default FolderPermissions](http://www.securityfocus.com/archive/1/449126/100/0/threaded)
7. [27342](http://secunia.com/advisories/27342)
8. [20612](http://www.securityfocus.com/bid/20612)
9. [](http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21246773)
10. [lotusnotes-directory-insecure-permission(29660)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29660)
11. [1017086](http://securitytracker.com/id?1017086) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20033
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 02:43 UTC
- **Last Updated**: November 01, 2024 at 15:24 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945.
### Affected Products
**MediaTek, Inc. - MT2713, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6785, MT6789, MT6835, MT6855, MT6879, MT6883, MT6885, MT6886, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8792, MT8796, MT8797, MT8798**
Affected versions:
- Android 12.0, 13.0, 14.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/March-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14840
- **State**: PUBLISHED
- **Published Date**: September 27, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 19:42 UTC
- **Reserved Date**: September 27, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TeamWork TicketPlus allows Arbitrary File Upload in updateProfile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42796](https://www.exploit-db.com/exploits/42796/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36076
- **State**: PUBLISHED
- **Published Date**: September 01, 2021 at 14:35 UTC
- **Last Updated**: April 23, 2025 at 19:30 UTC
- **Reserved Date**: June 30, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Bridge**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb21-69.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24711
- **State**: PUBLISHED
- **Published Date**: February 28, 2022 at 15:45 UTC
- **Last Updated**: April 23, 2025 at 19:00 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.4/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**codeigniter4 - CodeIgniter4**
Affected versions:
- < 4.1.9 (Status: affected)
### References
1. [](https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7)
2. [](https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1480
- **State**: PUBLISHED
- **Published Date**: March 18, 2023 at 09:00 UTC
- **Last Updated**: August 02, 2024 at 05:49 UTC
- **Reserved Date**: March 18, 2023 at 08:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in SourceCodester Monitoring of Students Cyber Accounts System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component POST Parameter Handler. The manipulation of the argument un leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223363.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Monitoring of Students Cyber Accounts System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.223363)
2. [](https://vuldb.com/?ctiid.223363)
3. [](https://github.com/xyaly163/bug_report/blob/main/SQLi-1.md)
### Credits
- Xue Yue (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15752
- **State**: PUBLISHED
- **Published Date**: October 22, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:04 UTC
- **Reserved Date**: October 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000004d6b0."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15752) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0657
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 15, 2001 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4378
- **State**: PUBLISHED
- **Published Date**: September 01, 2023 at 10:30 UTC
- **Last Updated**: May 23, 2025 at 04:04 UTC
- **Reserved Date**: August 16, 2023 at 00:01 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A malicious Maintainer can, under specific circumstances, leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This was as a result of an incomplete fix for CVE-2022-4365.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-201: Improper Input Validation
### Affected Products
**GitLab - GitLab**
Affected versions:
- 11.8 (Status: affected)
- 16.2 (Status: affected)
- 16.3 (Status: affected)
### References
1. [GitLab Issue #422134](https://gitlab.com/gitlab-org/gitlab/-/issues/422134)
2. [HackerOne Bug Bounty Report #2104591](https://hackerone.com/reports/2104591)
### Credits
- Thanks [70rpedo](https://hackerone.com/70rpedo) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1218
- **State**: PUBLISHED
- **Published Date**: May 23, 2022 at 07:15 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: April 04, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Domain Replace WordPress plugin through 1.3.8 does not sanitise and escape a parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Domain Replace**
Affected versions:
- 1.3.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65)
### Credits
- p7e4 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27895
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 05:08 UTC
- **Last Updated**: February 27, 2025 at 17:59 UTC
- **Reserved Date**: March 07, 2023 at 07:53 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Authenticator for Android - version 1.3.0, allows the screen to be captured, if an authorized attacker installs a malicious app on the mobile device. The attacker could extract the currently views of the OTP and the secret OTP alphanumeric token during the token setup. On successful exploitation, an attacker can read some sensitive information but cannot modify and delete the data.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-267: Security Weakness
### Affected Products
**SAP - Authenticator for Android**
Affected versions:
- 1.3.0 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/3302710)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40551
- **State**: PUBLISHED
- **Published Date**: January 29, 2024 at 16:46 UTC
- **Last Updated**: November 24, 2024 at 14:19 UTC
- **Reserved Date**: August 15, 2023 at 20:04 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.
### CVSS Metrics
- **CVSS Base Score**: 5.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Red Hat - Red Hat Enterprise Linux 7**
Affected versions:
- 0:15.8-3.el7 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 7**
Affected versions:
- 0:15.8-1.el7 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:15.8-4.el8_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Advanced Update Support**
Affected versions:
- 0:15.8-2.el8_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Telecommunications Update Service**
Affected versions:
- 0:15.8-2.el8_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions**
Affected versions:
- 0:15.8-2.el8_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support**
Affected versions:
- 0:15.8-2.el8_4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Telecommunications Update Service**
Affected versions:
- 0:15.8-2.el8_4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions**
Affected versions:
- 0:15.8-2.el8_4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Extended Update Support**
Affected versions:
- 0:15.8-2.el8_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support**
Affected versions:
- 0:15.8-2.el8 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support**
Affected versions:
- 0:15.8-2.el8 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:15.8-4.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support**
Affected versions:
- 0:15.8-3.el9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support**
Affected versions:
- 0:15.8-2.el9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support**
Affected versions:
- 0:15.8-2.el9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:15.8-3.el9_2 (Status: unaffected)
### References
1. [RHSA-2024:1834](https://access.redhat.com/errata/RHSA-2024:1834)
2. [RHSA-2024:1835](https://access.redhat.com/errata/RHSA-2024:1835)
3. [RHSA-2024:1873](https://access.redhat.com/errata/RHSA-2024:1873)
4. [RHSA-2024:1876](https://access.redhat.com/errata/RHSA-2024:1876)
5. [RHSA-2024:1883](https://access.redhat.com/errata/RHSA-2024:1883)
6. [RHSA-2024:1902](https://access.redhat.com/errata/RHSA-2024:1902)
7. [RHSA-2024:1903](https://access.redhat.com/errata/RHSA-2024:1903)
8. [RHSA-2024:1959](https://access.redhat.com/errata/RHSA-2024:1959)
9. [RHSA-2024:2086](https://access.redhat.com/errata/RHSA-2024:2086)
10. [](https://access.redhat.com/security/cve/CVE-2023-40551)
11. [RHBZ#2259918](https://bugzilla.redhat.com/show_bug.cgi?id=2259918) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6345
- **State**: PUBLISHED
- **Published Date**: November 29, 2023 at 12:02 UTC
- **Last Updated**: February 13, 2025 at 17:26 UTC
- **Reserved Date**: November 28, 2023 at 01:12 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 119.0.6045.199 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html)
2. [](https://crbug.com/1505053)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/)
5. [](https://www.debian.org/security/2023/dsa-5569)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/)
7. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25760
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: March 04, 2025 at 14:36 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Server-Side Request Forgery (SSRF) in the component admin_webgather.php of SUCMS v1.0 allows attackers to access internal data and services via a crafted GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/147536951/Qianyi-learn/blob/main/SUCMS2.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7307
- **State**: PUBLISHED
- **Published Date**: September 21, 2015 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 03:28 UTC
- **Reserved Date**: September 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the CMS Updater module 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the configuration page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2569599)
2. [](https://www.drupal.org/node/2569111) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3225
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 16:20 UTC
- **Last Updated**: August 03, 2024 at 01:00 UTC
- **Reserved Date**: September 15, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Control of Dynamically-Managed Code Resources in GitHub repository budibase/budibase prior to 1.3.20.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-913: Security Weakness
### Affected Products
**budibase - budibase/budibase**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/a13a56b7-04da-4560-b8ec-0d637d12a245)
2. [](https://github.com/budibase/budibase/commit/d35864be0854216693a01307f81ffcabf6d549df) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39820
- **State**: PUBLISHED
- **Published Date**: December 25, 2023 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:07 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Network Element Manager in NOKIA NFM-T R19.9, an Unprotected Storage of Credentials vulnerability occurs under /root/RestUploadManager.xml.DRC and /DEPOT/KECustom_199/OTNE_DRC/RestUploadManager.xml. A remote user, authenticated to the operating system, with access privileges to the directory /root or /DEPOT, is able to read cleartext credentials to access the web portal NFM-T and control all the PPS Network elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gruppotim.it/it/footer/red-team.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12097
- **State**: PUBLISHED
- **Published Date**: January 19, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 23:40 UTC
- **Reserved Date**: July 31, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
### Affected Products
**Talos - delayed_job_web rails gem**
Affected versions:
- delayed\_job\_web 1.4 (Status: affected)
### References
1. [102484](http://www.securityfocus.com/bid/102484)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3986
- **State**: PUBLISHED
- **Published Date**: October 10, 2012 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 20:21 UTC
- **Reserved Date**: July 11, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=775868)
2. [50904](http://secunia.com/advisories/50904)
3. [50984](http://secunia.com/advisories/50984)
4. [50935](http://secunia.com/advisories/50935)
5. [](http://www.mozilla.org/security/announce/2012/mfsa2012-77.html)
6. [50856](http://secunia.com/advisories/50856)
7. [DSA-2565](http://www.debian.org/security/2012/dsa-2565)
8. [50892](http://secunia.com/advisories/50892)
9. [oval:org.mitre.oval:def:16834](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16834)
10. [DSA-2572](http://www.debian.org/security/2012/dsa-2572)
11. [RHSA-2012:1351](http://rhn.redhat.com/errata/RHSA-2012-1351.html)
12. [50936](http://secunia.com/advisories/50936)
13. [51181](http://secunia.com/advisories/51181)
14. [55318](http://secunia.com/advisories/55318)
15. [SUSE-SU-2012:1351](http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html)
16. [MDVSA-2012:163](http://www.mandriva.com/security/advisories?name=MDVSA-2012:163)
17. [55922](http://www.securityfocus.com/bid/55922)
18. [USN-1611-1](http://www.ubuntu.com/usn/USN-1611-1)
19. [DSA-2569](http://www.debian.org/security/2012/dsa-2569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39383
- **State**: PUBLISHED
- **Published Date**: March 20, 2022 at 21:12 UTC
- **Last Updated**: August 04, 2024 at 02:06 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DWSurvey v3.2.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /sysuser/SysPropertyAction.java.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wkeyuan/DWSurvey/issues/81) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12140
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: June 11, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0497
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:22 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.2.2, 6.1.3.0, and 6.2.0.0 allows remote attackers to affect integrity via unknown vectors related to Web Client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034727](http://www.securitytracker.com/id/1034727) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4251
- **State**: PUBLISHED
- **Published Date**: December 10, 2009 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: December 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Jasc Paint Shop Pro 8.10 (aka Corel Paint Shop Pro) allows user-assisted remote attackers to execute arbitrary code via a crafted PNG file. NOTE: this might be the same issue as CVE-2007-2366.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37204](http://www.securityfocus.com/bid/37204)
2. [60592](http://osvdb.org/60592)
3. [paintshoppro-png-bo(54551)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54551)
4. [37591](http://secunia.com/advisories/37591)
5. [ADV-2009-3418](http://www.vupen.com/english/advisories/2009/3418)
6. [](http://aluigi.freeforums.org/post8780.html)
7. [](http://www.packetstormsecurity.org/0912-exploits/jasc-overflow.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49110
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 17:49 UTC
- **Last Updated**: May 13, 2025 at 15:25 UTC
- **Reserved Date**: October 11, 2024 at 20:57 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows Mobile Broadband Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49110) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0602
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: June 11, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Snapgear Lite+ firewall 1.5.4 and 1.5.3 allows remote attackers to cause a denial of service (crash) via a large number of connections to (1) the HTTP web management port, or (2) the PPTP port.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.snapgear.com/releases.html)
2. [4657](http://www.securityfocus.com/bid/4657)
3. [20020502 [VulnWatch] KPMG-2002017: Snapgear Lite+ Firewall Denial of Service](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0050.html)
4. [snapgear-vpn-pptp-dos(8986)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8986)
5. [snapgear-vpn-http-dos(8985)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8985)
6. [20020502 KPMG-2002017: Snapgear Lite+ Firewall Denial of Service](http://marc.info/?l=bugtraq&m=102035583114759&w=2)
7. [4658](http://www.securityfocus.com/bid/4658) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1331
- **State**: PUBLISHED
- **Published Date**: April 02, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cgi-data/FastJSData.cgi in OmniPCX Office with Internet Access services OXO210 before 210/091.001, OXO600 before 610/014.001, and other versions, allows remote attackers to execute arbitrary commands and "obtain OXO resources" via shell metacharacters in the id2 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5662](https://www.exploit-db.com/exploits/5662)
2. [](http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm)
3. [29798](http://secunia.com/advisories/29798)
4. [ADV-2008-1057](http://www.vupen.com/english/advisories/2008/1057)
5. [omnipcx-cgiscript-info-disclosure(41560)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41560)
6. [28758](http://www.securityfocus.com/bid/28758)
7. [20080521 [DSECRG-08-020] Alcatel OmniPCX Office Remote Comand Execution](http://www.securityfocus.com/archive/1/492383/100/0/threaded)
8. [1020082](http://www.securitytracker.com/id?1020082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20560
- **State**: PUBLISHED
- **Published Date**: March 24, 2020 at 18:27 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: March 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) (with TEEGRIS) software. The BIOSUB Trustlet has an out of bounds write. The Samsung ID is SVE-2019-15261 (October 2019).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32394
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 00:00 UTC
- **Last Updated**: December 05, 2024 at 16:05 UTC
- **Reserved Date**: May 08, 2023 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved checks. This issue is fixed in iOS 16.5 and iPadOS 16.5, watchOS 9.5, tvOS 16.5, macOS Ventura 13.4. A person with physical access to a device may be able to view contact information from the lock screen.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213758)
2. [](https://support.apple.com/en-us/HT213764)
3. [](https://support.apple.com/en-us/HT213757)
4. [](https://support.apple.com/en-us/HT213761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34420
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 11:29 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 03, 2024 at 07:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in talspotim Comments Evolved for WordPress allows Stored XSS.This issue affects Comments Evolved for WordPress: from n/a through 1.6.3.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**talspotim - Comments Evolved for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/gplus-comments/wordpress-comments-evolved-for-wordpress-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Sharanabasappa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7352
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2232
- **State**: PUBLISHED
- **Published Date**: July 07, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 13:48 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in Installer of Shinseiyo Sogo Soft (4.8A) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**The Ministry of Justice - Installer of Shinseiyo Sogo Soft**
Affected versions:
- (4.8A) and earlier (Status: affected)
### References
1. [JVN#23389212](http://jvn.jp/en/jp/JVN23389212/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6310
- **State**: PUBLISHED
- **Published Date**: August 12, 2020 at 13:52 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.
### Affected Products
**SAP SE - SAP NetWeaver (ABAP Server) and ABAP Platform**
Affected versions:
- < 702 (Status: affected)
- < 730 (Status: affected)
- < 731 (Status: affected)
- < 740 (Status: affected)
- < 750 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345)
2. [](https://launchpad.support.sap.com/#/notes/2944988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15685
- **State**: PUBLISHED
- **Published Date**: August 23, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45272](https://www.exploit-db.com/exploits/45272/)
2. [](https://electronjs.org/blog/web-preferences-fix) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43176
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 17:26 UTC
- **Last Updated**: August 04, 2024 at 03:47 UTC
- **Reserved Date**: November 01, 2021 at 00:00 UTC
- **Assigned By**: SNPS
### Vulnerability Description
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**GOautodial - GOautodial API**
Affected versions:
- < 3c3a979 (Status: affected)
### References
1. [](https://www.synopsys.com/blogs/software-security/cyrc-advisory-goautodial-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5899
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 22:00 UTC
- **Last Updated**: June 10, 2025 at 15:29 UTC
- **Reserved Date**: June 09, 2025 at 07:15 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected by this vulnerability is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to free of memory not on the heap. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-590: Security Weakness
### Affected Products
**GNU - PSPP**
Affected versions:
- 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb (Status: affected)
### References
1. [VDB-311671 | GNU PSPP pspp-convert.c parse_variables_option free of memory not on the heap](https://vuldb.com/?id.311671)
2. [VDB-311671 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.311671)
3. [Submit #586106 | GNU libpspp pspp-convert master in Git Repository[commit:82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb] Denial of Service](https://vuldb.com/?submit.586106)
4. [](https://savannah.gnu.org/bugs/index.php?67072)
5. [](https://drive.google.com/file/d/1YPJLiBzOwVTcc2FzdawYxBJWGujwqy7o/view?usp=sharing)
6. [](https://www.gnu.org/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16901
- **State**: PUBLISHED
- **Published Date**: September 26, 2019 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52995
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 16:43 UTC
- **Last Updated**: May 04, 2025 at 07:47 UTC
- **Reserved Date**: March 27, 2025 at 16:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
riscv/kprobe: Fix instruction simulation of JALR
Set kprobe at 'jalr 1140(ra)' of vfs_write results in the following
crash:
[ 32.092235] Unable to handle kernel access to user memory without uaccess routines at virtual address 00aaaaaad77b1170
[ 32.093115] Oops [#1]
[ 32.093251] Modules linked in:
[ 32.093626] CPU: 0 PID: 135 Comm: ftracetest Not tainted 6.2.0-rc2-00013-gb0aa5e5df0cb-dirty #16
[ 32.093985] Hardware name: riscv-virtio,qemu (DT)
[ 32.094280] epc : ksys_read+0x88/0xd6
[ 32.094855] ra : ksys_read+0xc0/0xd6
[ 32.095016] epc : ffffffff801cda80 ra : ffffffff801cdab8 sp : ff20000000d7bdc0
[ 32.095227] gp : ffffffff80f14000 tp : ff60000080f9cb40 t0 : ffffffff80f13e80
[ 32.095500] t1 : ffffffff8000c29c t2 : ffffffff800dbc54 s0 : ff20000000d7be60
[ 32.095716] s1 : 0000000000000000 a0 : ffffffff805a64ae a1 : ffffffff80a83708
[ 32.095921] a2 : ffffffff80f160a0 a3 : 0000000000000000 a4 : f229b0afdb165300
[ 32.096171] a5 : f229b0afdb165300 a6 : ffffffff80eeebd0 a7 : 00000000000003ff
[ 32.096411] s2 : ff6000007ff76800 s3 : fffffffffffffff7 s4 : 00aaaaaad77b1170
[ 32.096638] s5 : ffffffff80f160a0 s6 : ff6000007ff76800 s7 : 0000000000000030
[ 32.096865] s8 : 00ffffffc3d97be0 s9 : 0000000000000007 s10: 00aaaaaad77c9410
[ 32.097092] s11: 0000000000000000 t3 : ffffffff80f13e48 t4 : ffffffff8000c29c
[ 32.097317] t5 : ffffffff8000c29c t6 : ffffffff800dbc54
[ 32.097505] status: 0000000200000120 badaddr: 00aaaaaad77b1170 cause: 000000000000000d
[ 32.098011] [<ffffffff801cdb72>] ksys_write+0x6c/0xd6
[ 32.098222] [<ffffffff801cdc06>] sys_write+0x2a/0x38
[ 32.098405] [<ffffffff80003c76>] ret_from_syscall+0x0/0x2
Since the rs1 and rd might be the same one, such as 'jalr 1140(ra)',
hence it requires obtaining the target address from rs1 followed by
updating rd.
[Palmer: Pick Guo's cleanup]
### Affected Products
**Linux - Linux**
Affected versions:
- c22b0bcb1dd024cb9caad9230e3a387d8b061df5 (Status: affected)
- c22b0bcb1dd024cb9caad9230e3a387d8b061df5 (Status: affected)
- c22b0bcb1dd024cb9caad9230e3a387d8b061df5 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.15.91 (Status: unaffected)
- 6.1.9 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/614471b7f7cd28a2c96ab9c90b37471c82258ffb)
2. [](https://git.kernel.org/stable/c/f4c8fc775fcbc9e9047b22671c55ca18f9a127d4)
3. [](https://git.kernel.org/stable/c/ca0254998be4d74cf6add70ccfab0d2dbd362a10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48161
- **State**: PUBLISHED
- **Published Date**: November 22, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 13, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/giflib/bugs/167/)
2. [](https://github.com/tacetool/TACE#cve-2023-48161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16892
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 22:17 UTC
- **Last Updated**: August 04, 2024 at 13:45 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
<p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p>
<p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p>
<p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p>
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16892) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27336
- **State**: PUBLISHED
- **Published Date**: December 22, 2020 at 21:04 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://treck.com/vulnerability-response-information/)
2. [](https://security.netapp.com/advisory/ntap-20210201-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3594
- **State**: PUBLISHED
- **Published Date**: October 08, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: October 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in bpost.php in BLOB Blog System before 1.2 allows remote attackers to inject arbitrary web script or HTML via the postid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35938](http://secunia.com/advisories/35938)
2. [56261](http://www.osvdb.org/56261)
3. [blob-bpost-xss(51959)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51959)
4. [](http://blob.yewipeya.net/bpost.php?postid=0008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5151
- **State**: PUBLISHED
- **Published Date**: January 15, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: September 24, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Integer overflow in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code in a PDF document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html)
2. [](https://code.google.com/p/chromium/issues/detail?id=165538)
3. [oval:org.mitre.oval:def:16453](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16453) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4462
- **State**: PUBLISHED
- **Published Date**: April 03, 2019 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.2.
### Affected Products
**n/a - macOS**
Affected versions:
- Versions prior to: macOS Mojave 10.14.2 (Status: affected)
### References
1. [](https://support.apple.com/kb/HT209341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1073
- **State**: PUBLISHED
- **Published Date**: April 10, 2025 at 11:16 UTC
- **Last Updated**: April 15, 2025 at 03:39 UTC
- **Reserved Date**: February 06, 2025 at 06:36 UTC
- **Assigned By**: Panasonic_Holdings_Corporation
### Vulnerability Description
Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-1299: Security Weakness
### Affected Products
**Panasonic - IR Control Hub (IR Blaster)**
Affected versions:
- 1.17 and earlier (Status: affected)
### References
1. [](https://lsin.panasonic.com/release-notes)
### Credits
- Shravan Singh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0031
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 27, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1502
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4113
- **State**: PUBLISHED
- **Published Date**: April 24, 2024 at 15:00 UTC
- **Last Updated**: August 01, 2024 at 20:33 UTC
- **Reserved Date**: April 24, 2024 at 08:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Tenda TX9 22.03.02.10. This vulnerability affects the function sub_42D4DC of the file /goform/SetSysTimeCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - TX9**
Affected versions:
- 22.03.02.10 (Status: affected)
### References
1. [VDB-261856 | Tenda TX9 SetSysTimeCfg sub_42D4DC stack-based overflow](https://vuldb.com/?id.261856)
2. [VDB-261856 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.261856)
3. [Submit #317217 | Tenda TX9 Pro V22.03.02.10 buffer overflow](https://vuldb.com/?submit.317217)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md)
### Credits
- wxhwxhwxh_tutu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14997
- **State**: PUBLISHED
- **Published Date**: April 25, 2019 at 19:35 UTC
- **Last Updated**: August 05, 2024 at 09:46 UTC
- **Reserved Date**: August 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Leagoo P1 Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains the android framework (i.e., system_server) with a package name of android that has been modified by Leagoo or another entity in the supply chain. The system_server process in the core Android package has an exported broadcast receiver that allows any app co-located on the device to programmatically initiate the taking of a screenshot and have the resulting screenshot be written to external storage. The taking of a screenshot is not transparent to the user; the device has a screen animation as the screenshot is taken and there is a notification indicating that a screenshot occurred. If the attacking app also requests the EXPAND_STATUS_BAR permission, it can wake the device up using certain techniques and expand the status bar to take a screenshot of the user's notifications even if the device has an active screen lock. The notifications may contain sensitive data such as text messages used in two-factor authentication. The system_server process that provides this capability cannot be disabled, as it is part of the Android framework. The notification can be removed by a local Denial of Service (DoS) attack to reboot the device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf)
2. [](https://www.kryptowire.com/portal/android-firmware-defcon-2018/)
3. [](https://www.kryptowire.com) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12078
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 13:26 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/mhaskar/dca62d0f0facc13f6364b8ed88d5a7fd)
2. [](https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/)
3. [](https://github.com/Opmantek/open-audit/commit/6ffc7f9032c55eaa1c37cf5e070809b7211c7e9a)
4. [](http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31373
- **State**: REJECTED
- **Last Updated**: March 29, 2025 at 03:55 UTC
- **Reserved Date**: March 28, 2025 at 10:49 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28403
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 19:29 UTC
- **Reserved Date**: March 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK X2000R before V1.0.0-B20231213.1013 is vulnerable to Cross Site Scripting (XSS) via the VPN Page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html)
2. [](https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9978
- **State**: PUBLISHED
- **Published Date**: August 18, 2017 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: May 30, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in a QTEE service.
### Affected Products
**Qualcomm, Inc. - All Qualcomm products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-07-01)
2. [99467](http://www.securityfocus.com/bid/99467) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17613
- **State**: PUBLISHED
- **Published Date**: October 15, 2019 at 22:56 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in the content parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Ers4tz/vuln/blob/master/qibosoft/qibosoft_v7_remote_code_execution.md) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.