System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58078
- **State**: PUBLISHED
- **Published Date**: March 06, 2025 at 16:13 UTC
- **Last Updated**: May 04, 2025 at 10:09 UTC
- **Reserved Date**: March 06, 2025 at 15:52 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors
misc_minor_alloc was allocating id using ida for minor only in case of
MISC_DYNAMIC_MINOR but misc_minor_free was always freeing ids
using ida_free causing a mismatch and following warn:
> > WARNING: CPU: 0 PID: 159 at lib/idr.c:525 ida_free+0x3e0/0x41f
> > ida_free called for id=127 which is not allocated.
> > <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
...
> > [<60941eb4>] ida_free+0x3e0/0x41f
> > [<605ac993>] misc_minor_free+0x3e/0xbc
> > [<605acb82>] misc_deregister+0x171/0x1b3
misc_minor_alloc is changed to allocate id from ida for all minors
falling in the range of dynamic/ misc dynamic minors
### Affected Products
**Linux - Linux**
Affected versions:
- ab760791c0cfbb1d7a668f46a135264f56c8f018 (Status: affected)
- ab760791c0cfbb1d7a668f46a135264f56c8f018 (Status: affected)
- ab760791c0cfbb1d7a668f46a135264f56c8f018 (Status: affected)
- ab760791c0cfbb1d7a668f46a135264f56c8f018 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 6.6.78 (Status: unaffected)
- 6.12.14 (Status: unaffected)
- 6.13.3 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3df72111c39f7e4c5029c9ff720b56ec2e05b764)
2. [](https://git.kernel.org/stable/c/8b4120b3e060e137eaa8dc76a1c40401088336e5)
3. [](https://git.kernel.org/stable/c/6635332d246d7db89b90e145f2bf937406cecaf0)
4. [](https://git.kernel.org/stable/c/6d04d2b554b14ae6c428a9c60b6c85f1e5c89f68) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4833
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:27 UTC
- **Reserved Date**: July 09, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security QRadar SIEM QRM 7.1 MR1 and QRM/QVM 7.2 MR2 allows remote authenticated users to gain privileges via invalid input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-qvm-cve20144833-priv-esc(95583)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95583)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686478) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42744
- **State**: PUBLISHED
- **Published Date**: November 03, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 13:04 UTC
- **Reserved Date**: October 10, 2022 at 00:00 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
CandidATS version 3.0.0 allows an external attacker to perform CRUD operations on the application databases. This is possible because the application does not correctly validate the entriesPerPage parameter against SQLi attacks.
### Affected Products
**n/a - CandidATS**
Affected versions:
- 3.0.0 (Status: affected)
### References
1. [](https://candidats.net/)
2. [](https://fluidattacks.com/advisories/mohawke/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1953
- **State**: PUBLISHED
- **Published Date**: June 30, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:02 UTC
- **Reserved Date**: February 19, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2015-1924, CVE-2015-1925, CVE-2015-1929, CVE-2015-1930, CVE-2015-1948, CVE-2015-1954, CVE-2015-1962, CVE-2015-1963, CVE-2015-1964, and CVE-2015-1965.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032773](http://www.securitytracker.com/id/1032773)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-273)
3. [75456](http://www.securityfocus.com/bid/75456)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21959398) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10606
- **State**: PUBLISHED
- **Published Date**: November 23, 2024 at 04:32 UTC
- **Last Updated**: November 23, 2024 at 13:28 UTC
- **Reserved Date**: October 31, 2024 at 15:36 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpte_onboard_save_function_callback() function in all versions up to, and including, 6.2.1. This makes it possible for authenticated attackers, with contributor-level access and above, to modify several settings that could have an impact such as lost revenue and page updates.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**wptravelengine - WP Travel Engine – Tour Booking Plugin – Tour Operator Software**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c91d1ec0-0430-4ddd-b6b1-25af0b5cea9d?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3193913/wp-travel-engine/tags/6.2.2/includes/class-wp-travel-engine-onboard.php)
### Credits
- Noah Stead |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0641
- **State**: PUBLISHED
- **Published Date**: March 26, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco IOS XE 2.x and 3.x before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via crafted IPv6 packets, aka Bug ID CSCub68073.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1031981](http://www.securitytracker.com/id/1031981)
2. [20150325 Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4763
- **State**: PUBLISHED
- **Published Date**: January 30, 2023 at 20:31 UTC
- **Last Updated**: March 27, 2025 at 15:29 UTC
- **Reserved Date**: December 27, 2022 at 10:20 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Icon Widget WordPress plugin before 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Icon Widget**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5721
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:55 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Touchnote Postcards (aka com.touchnote.android) application 4.2.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#290513](http://www.kb.cert.org/vuls/id/290513)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10229
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 17:06 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Cruise Materials Management component of Oracle Hospitality Applications (subcomponent: Event Viewer). The supported version that is affected is 7.30.562. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Materials Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Materials Management accessible data as well as unauthorized read access to a subset of Oracle Hospitality Cruise Materials Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality Cruise Materials Management**
Affected versions:
- 7.30.562 (Status: affected)
### References
1. [99691](http://www.securityfocus.com/bid/99691)
2. [1038941](http://www.securitytracker.com/id/1038941)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1603
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 17:13 UTC
- **Last Updated**: February 25, 2025 at 17:14 UTC
- **Reserved Date**: March 23, 2023 at 15:48 UTC
- **Assigned By**: DEVOLUTIONS
### Vulnerability Description
Permission bypass when importing or synchronizing entries in User vault
in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.
### Affected Products
**Devolutions - Server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://devolutions.net/security/advisories/DEVO-2023-0008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22226
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 11:56 UTC
- **Last Updated**: March 05, 2025 at 04:55 UTC
- **Reserved Date**: January 02, 2025 at 04:29 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Affected Products
**n/a - ESXi**
Affected versions:
- 8.0 (Status: affected)
- 8.0 (Status: affected)
- 7.0 (Status: affected)
**n/a - VMware Workstation**
Affected versions:
- 17.x (Status: affected)
**n/a - VMware Fusion**
Affected versions:
- 13.x (Status: affected)
**n/a - VMware Cloud Foundation**
Affected versions:
- 5.x, 4.5.x (Status: affected)
**n/a - VMware Telco Cloud Platform**
Affected versions:
- 5.x, 4.x, 3.x, 2.x (Status: affected)
**n/a - VMware Telco Cloud Infrastructure**
Affected versions:
- 3.x, 2.x (Status: affected)
### References
1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19877
- **State**: PUBLISHED
- **Published Date**: November 27, 2020 at 16:23 UTC
- **Last Updated**: August 05, 2024 at 02:32 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get access to sensitive information outside the working directory via Directory Traversal attacks against AprolSqlServer, a different vulnerability than CVE-2019-16357.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.br-automation.com/downloads_br_productcatalogue/BRP44400000000000000585952/APROL_R42_A1_ReleaseNotes_001.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12214
- **State**: PUBLISHED
- **Published Date**: September 21, 2017 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 18:28 UTC
- **Reserved Date**: August 03, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Operations, Administration, Maintenance, and Provisioning (OAMP) credential reset functionality for Cisco Unified Customer Voice Portal (CVP) could allow an authenticated, remote attacker to gain elevated privileges. The vulnerability is due to a lack of proper input validation. An attacker could exploit this vulnerability by authenticating to the OAMP and sending a crafted HTTP request. A successful exploit could allow the attacker to gain administrator privileges. The attacker must successfully authenticate to the system to exploit this vulnerability. This vulnerability affects Cisco Unified Customer Voice Portal (CVP) running software release 10.5, 11.0, or 11.5. Cisco Bug IDs: CSCve92752.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**n/a - Cisco Unified Customer Voice Portal**
Affected versions:
- Cisco Unified Customer Voice Portal (Status: affected)
### References
1. [1039411](http://www.securitytracker.com/id/1039411)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-cvp)
3. [100931](http://www.securityfocus.com/bid/100931) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8224
- **State**: PUBLISHED
- **Published Date**: November 29, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 16, 2016 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A vulnerability has been identified in some Lenovo Notebook and ThinkServer systems where an attacker with administrative privileges on a system could install a program that circumvents Intel Management Engine (ME) protections. This could result in a denial of service or privilege escalation attack on the system.
### Affected Products
**Lenovo Group Ltd. - Lenovo Notebook models 110-14IBR/110-15IBR, B70-80, E31-80, E40-80, E41-80, E51-80, G40-80, G50-80, G50-80 Touch, Ideapad 300-14IBR/300-15IBR, Ideapad 300-14ISK/300-15ISK/300-17ISK, Ideapad 510S-12ISK, K21-80, K41-80, MIIX 710-12IKB , XiaoXin Air 12, YOGA 510-14ISK/510-15ISK, YOGA 710-11IKB, Yoga 710-11ISK, Yoga 900-13ISK, YOGA 900S-12ISK; ThinkServer models ThinkServer TS150, ThinkServer TS450**
Affected versions:
- various (Status: affected)
### References
1. [94595](http://www.securityfocus.com/bid/94595)
2. [](https://support.lenovo.com/us/en/solutions/LEN_9903) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31530
- **State**: PUBLISHED
- **Published Date**: June 29, 2021 at 13:11 UTC
- **Last Updated**: May 30, 2025 at 16:01 UTC
- **Reserved Date**: April 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine ServiceDesk Plus MSP before 10522 is vulnerable to Information Disclosure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/service-desk-msp/readme.html#10522)
2. [](https://excellium-services.com/cve-2021-31530/)
3. [](https://cds.thalesgroup.com/en/tcs-cert/CVE-2021-31530) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9266
- **State**: PUBLISHED
- **Published Date**: February 18, 2020 at 17:22 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SOPlanning 1.45 is vulnerable to a CSRF attack that allows for arbitrary changing of the admin password via process/xajax_server.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/J3rryBl4nks/SOPlanning/blob/master/AdminPasswordChangeCSRF.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23257
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 19:02 UTC
- **Last Updated**: January 02, 2025 at 18:51 UTC
- **Reserved Date**: January 15, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Hyper-V Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
### References
1. [Windows Hyper-V Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23257) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7184
- **State**: PUBLISHED
- **Published Date**: October 18, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2768-1](http://www.ubuntu.com/usn/USN-2768-1)
2. [](http://www.mozilla.org/security/announce/2015/mfsa2015-115.html)
3. [openSUSE-SU-2015:1817](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00021.html)
4. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1208339)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1212669)
7. [1033820](http://www.securitytracker.com/id/1033820)
8. [77100](http://www.securityfocus.com/bid/77100) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3990
- **State**: PUBLISHED
- **Published Date**: August 05, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: August 04, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Paul M. Jones Savant2, possibly when used with the com_mtree component for Mambo and Joomla!, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) Savant2_Plugin_stylesheet.php, (2) Savant2_Compiler_basic.php, (3) Savant2_Error_pear.php, (4) Savant2_Error_stack.php, (5) Savant2_Filter_colorizeCode.php, (6) Savant2_Filter_trimwhitespace.php, (7) Savant2_Plugin_ahref.php, (8) Savant2_Plugin_ahrefcontact.php, (9) Savant2_Plugin_ahreflisting.php, (10) Savant2_Plugin_ahreflistingimage.php, (11) Savant2_Plugin_ahrefmap.php, (12) Savant2_Plugin_ahrefownerlisting.php, (13) Savant2_Plugin_ahrefprint.php, (14) Savant2_Plugin_ahrefrating.php, (15) Savant2_Plugin_ahrefrecommend.php, (16) Savant2_Plugin_ahrefreport.php, (17) Savant2_Plugin_ahrefreview.php, (18) Savant2_Plugin_ahrefvisit.php, (19) Savant2_Plugin_checkbox.php, (20) Savant2_Plugin_cycle.php, (21) Savant2_Plugin_dateformat.php, (22) Savant2_Plugin_editor.php, (23) Savant2_Plugin_form.php, (24) Savant2_Plugin_image.php, (25) Savant2_Plugin_input.php, (26) Savant2_Plugin_javascript.php, (27) Savant2_Plugin_listalpha.php, (28) Savant2_Plugin_listingname.php, (29) Savant2_Plugin_modify.php, (30) Savant2_Plugin_mtpath.php, (31) Savant2_Plugin_options.php, (32) Savant2_Plugin_radios.php, (33) Savant2_Plugin_rating.php, or (34) Savant2_Plugin_textarea.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28692](http://www.osvdb.org/28692)
2. [28682](http://www.osvdb.org/28682)
3. [28691](http://www.osvdb.org/28691)
4. [1016560](http://securitytracker.com/id?1016560)
5. [28706](http://www.osvdb.org/28706)
6. [28700](http://www.osvdb.org/28700)
7. [28690](http://www.osvdb.org/28690)
8. [28693](http://www.osvdb.org/28693)
9. [28704](http://www.osvdb.org/28704)
10. [1324](http://securityreason.com/securityalert/1324)
11. [28679](http://www.osvdb.org/28679)
12. [28699](http://www.osvdb.org/28699)
13. [28686](http://www.osvdb.org/28686)
14. [28709](http://www.osvdb.org/28709)
15. [28698](http://www.osvdb.org/28698)
16. [28696](http://www.osvdb.org/28696)
17. [28697](http://www.osvdb.org/28697)
18. [28703](http://www.osvdb.org/28703)
19. [28702](http://www.osvdb.org/28702)
20. [20060721 [Kurdish Security # 13] Savant2 Remote File Include Vulnerability [For Mambo, Joomla]](http://www.securityfocus.com/archive/1/440835/100/200/threaded)
21. [28710](http://www.osvdb.org/28710)
22. [28681](http://www.osvdb.org/28681)
23. [28689](http://www.osvdb.org/28689)
24. [28712](http://www.osvdb.org/28712)
25. [19151](http://www.securityfocus.com/bid/19151)
26. [28708](http://www.osvdb.org/28708)
27. [28683](http://www.osvdb.org/28683)
28. [28684](http://www.osvdb.org/28684)
29. [28688](http://www.osvdb.org/28688)
30. [28685](http://www.osvdb.org/28685)
31. [28711](http://www.osvdb.org/28711)
32. [28687](http://www.osvdb.org/28687)
33. [28707](http://www.osvdb.org/28707)
34. [savant-multiple-plugin-file-include(27906)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27906)
35. [28701](http://www.osvdb.org/28701)
36. [28695](http://www.osvdb.org/28695)
37. [28680](http://www.osvdb.org/28680)
38. [28705](http://www.osvdb.org/28705)
39. [28694](http://www.osvdb.org/28694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32117
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:30 UTC
- **Last Updated**: December 09, 2024 at 16:47 UTC
- **Reserved Date**: May 03, 2023 at 15:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in SoftLab Integrate Google Drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through 1.1.99.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**SoftLab - Integrate Google Drive**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/integrate-google-drive/vulnerability/wordpress-integrate-google-drive-plugin-1-1-99-unauthenticated-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20670
- **State**: PUBLISHED
- **Published Date**: September 13, 2021 at 21:13 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in /admin/media/upload of ZKEACMS V3.2.0 allows attackers to execute arbitrary code via a crafted HTML file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yilezhu/Czar.Cms/issues/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49393
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 01:55 UTC
- **Last Updated**: November 15, 2024 at 21:17 UTC
- **Reserved Date**: October 14, 2024 at 17:56 UTC
- **Assigned By**: redhat
### Vulnerability Description
In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**Unknown - Unknown**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [](https://access.redhat.com/security/cve/CVE-2024-49393)
2. [RHBZ#2325317](https://bugzilla.redhat.com/show_bug.cgi?id=2325317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0481
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An interaction between Windows Media Player (WMP) and Outlook 2002 allows remote attackers to bypass Outlook security settings and execute Javascript via an IFRAME in an HTML email message that references .WMS (Windows Media Skin) or other WMP media files, whose onload handlers execute the player.LaunchURL() Javascript function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020321 How Outlook 2002 can still execute JavaScript in an HTML email message](http://online.securityfocus.com/archive/1/263429)
2. [4340](http://www.securityfocus.com/bid/4340)
3. [outlook-iframe-javascript(8604)](http://www.iss.net/security_center/static/8604.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37927
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 15:21 UTC
- **Last Updated**: June 04, 2025 at 12:57 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid
There is a string parsing logic error which can lead to an overflow of hid
or uid buffers. Comparing ACPIID_LEN against a total string length doesn't
take into account the lengths of individual hid and uid buffers so the
check is insufficient in some cases. For example if the length of hid
string is 4 and the length of the uid string is 260, the length of str
will be equal to ACPIID_LEN + 1 but uid string will overflow uid buffer
which size is 256.
The same applies to the hid string with length 13 and uid string with
length 250.
Check the length of hid and uid strings separately to prevent
buffer overflow.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
- ca3bf5d47cec8b7614bcb2e9132c40081d6d81db (Status: affected)
**Linux - Linux**
Affected versions:
- 4.7 (Status: affected)
- 0 (Status: unaffected)
- 5.4.294 (Status: unaffected)
- 5.10.238 (Status: unaffected)
- 5.15.182 (Status: unaffected)
- 6.1.138 (Status: unaffected)
- 6.6.90 (Status: unaffected)
- 6.12.28 (Status: unaffected)
- 6.14.6 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1)
2. [](https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e)
3. [](https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5)
4. [](https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f)
5. [](https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29)
6. [](https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718)
7. [](https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f)
8. [](https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5774
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:02 UTC
- **Last Updated**: June 11, 2021 at 21:02 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1656
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 20:31 UTC
- **Last Updated**: September 17, 2024 at 04:14 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to potentially perform a Remote Code Execution (RCE) attack on the target device. Continuous receipt of the specific DHCPv6 client message will result in an extended Denial of Service (DoS) condition. If adjacent devices are also configured to relay DHCP packets, and are not affected by this issue and simply transparently forward unprocessed client DHCPv6 messages, then the attack vector can be a Network-based attack, instead of an Adjacent-device attack. No other DHCP services are affected. Receipt of the packet without configuration of the DHCPv6 Relay-Agent service, will not result in exploitability of this issue. This issue affects Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D95; 14.1X53 versions prior to 14.1X53-D53; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S7; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2; 17.2 versions prior to 17.2R3-S3; 17.2X75 versions prior to 17.2X75-D44; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R2-S6, 18.2R3-S2; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D435, 18.2X75-D60; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2; 19.2 versions prior to 19.2R1-S3, 19.2R2; 19.3 versions prior to 19.3R2.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
- CWE-20: Improper Input Validation
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 12.3 (Status: affected)
- 12.3X48 (Status: affected)
- 14.1X53 (Status: affected)
- 15.1 (Status: affected)
- 15.1X49 (Status: affected)
- 15.1X53 (Status: affected)
- 16.1 (Status: affected)
- 16.2 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.2X75 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.2X75 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
- 19.1 (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11049)
2. [](https://www.juniper.net/documentation/en_US/junos/topics/topic-map/dhcpv6-relay-agent-overview.html)
3. [](https://www.juniper.net/documentation/en_US/junos/topics/topic-map/dhcp-relay-agent-security-devices.html)
4. [](https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-dhcpv6-relay-statistics.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0614
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:22 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle BI Publisher component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034711](http://www.securitytracker.com/id/1034711) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0219
- **State**: PUBLISHED
- **Published Date**: April 29, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: April 28, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute administrator commands by sniffing packets from a valid session and replaying them against the remote administration server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7179](http://www.securityfocus.com/bid/7179)
2. [20030428 CORE-2003-0305-02: Vulnerabilities in Kerio Personal Firewall](http://marc.info/?l=bugtraq&m=105155734411836&w=2)
3. [](http://www.coresecurity.com/common/showdoc.php?idx=314&idxseccion=10)
4. [VU#641012](http://www.kb.cert.org/vuls/id/641012) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25188
- **State**: PUBLISHED
- **Published Date**: October 14, 2020 at 12:47 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: September 04, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An attacker who convinces a valid user to open a specially crafted project file to exploit could execute code under the privileges of the application due to an out-of-bounds read vulnerability on the LAquis SCADA (Versions prior to 4.3.1.870).
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - LAquis SCADA**
Affected versions:
- Versions prior to 4.3.1.870 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-287-02)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1244/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44430, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44430
- **State**: PUBLISHED
- **Published Date**: December 14, 2021 at 12:06 UTC
- **Last Updated**: August 04, 2024 at 04:25 UTC
- **Reserved Date**: November 30, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14829)
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Siemens - JT Utilities**
Affected versions:
- All versions < V13.1.1.0 (Status: affected)
**Siemens - JTTK**
Affected versions:
- All versions < V11.1.1.0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7749
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 12, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1355039)
2. [99057](http://www.securityfocus.com/bid/99057)
3. [](https://www.mozilla.org/security/advisories/mfsa2017-15/)
4. [DSA-3918](https://www.debian.org/security/2017/dsa-3918)
5. [1038689](http://www.securitytracker.com/id/1038689)
6. [DSA-3881](https://www.debian.org/security/2017/dsa-3881)
7. [RHSA-2017:1440](https://access.redhat.com/errata/RHSA-2017:1440)
8. [RHSA-2017:1561](https://access.redhat.com/errata/RHSA-2017:1561)
9. [](https://www.mozilla.org/security/advisories/mfsa2017-17/)
10. [](https://www.mozilla.org/security/advisories/mfsa2017-16/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6677
- **State**: PUBLISHED
- **Published Date**: April 08, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:41 UTC
- **Reserved Date**: April 07, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in fckeditor251/editor/filemanager/connectors/asp/upload.asp in QuickerSite 1.8.5 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.bugreport.ir/39/exploit.htm)
2. [](http://www.bugreport.ir/index_39.htm)
3. [30501](http://secunia.com/advisories/30501)
4. [29524](http://www.securityfocus.com/bid/29524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2629
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29992
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 17:01 UTC
- **Last Updated**: May 03, 2025 at 00:40 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Identity Library for .NET Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**Microsoft - Azure Identity Library for .NET**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Azure Identity Library for .NET Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29992) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3717
- **State**: PUBLISHED
- **Published Date**: October 16, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 06:38 UTC
- **Reserved Date**: October 16, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in LucVil PatPlayer 3.9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URI in a playlist (.m3u) file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-1860](http://www.vupen.com/english/advisories/2009/1860)
2. [35756](http://secunia.com/advisories/35756)
3. [9102](http://www.exploit-db.com/exploits/9102)
4. [55746](http://osvdb.org/55746)
5. [patplayer-m3u-bo(51624)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51624) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0893
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 18:17 UTC
- **Last Updated**: August 04, 2024 at 17:58 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0889, CVE-2019-0890, CVE-2019-0891, CVE-2019-0894, CVE-2019-0895, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900, CVE-2019-0901, CVE-2019-0902.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0893) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8271
- **State**: PUBLISHED
- **Published Date**: April 13, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 08:13 UTC
- **Reserved Date**: November 19, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The AMF3CD_AddProp function in amf.c in RTMPDump 2.4 allows remote RTMP Media servers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.talosintelligence.com/reports/TALOS-2016-0067/)
2. [95125](http://www.securityfocus.com/bid/95125)
3. [DSA-3850](http://www.debian.org/security/2017/dsa-3850) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36956
- **State**: PUBLISHED
- **Published Date**: July 27, 2022 at 20:57 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: July 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Veritas NetBackup, the NetBackup Client allows arbitrary command execution from any remote host that has access to a valid host-id NetBackup certificate/private key from the same domain. The affects 9.0.x through 9.0.0.1 and 9.1.x through 9.1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.veritas.com/content/support/en_US/security/VTS22-008#Issue1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6193
- **State**: PUBLISHED
- **Published Date**: February 12, 2020 at 19:45 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP NetWeaver (Knowledge Management ICE Service), versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to execute malicious scripts leading to Reflected Cross-Site Scripting (XSS) vulnerability.
### Affected Products
**SAP SE - SAP NetWeaver (Knowledge Management ICE Service)**
Affected versions:
- = 7.30 (Status: affected)
- = 7.31 (Status: affected)
- = 7.40 (Status: affected)
- = 7.50 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812)
2. [](https://launchpad.support.sap.com/#/notes/2873012) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15406
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:31 UTC
- **Reserved Date**: August 17, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Unified Computing System Director**
Affected versions:
- n/a (Status: affected)
### References
1. [20181003 Cisco UCS Director Stored Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ucsd-xss)
2. [1041783](http://www.securitytracker.com/id/1041783) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28948
- **State**: PUBLISHED
- **Published Date**: May 19, 2022 at 19:59 UTC
- **Last Updated**: August 03, 2024 at 06:10 UTC
- **Reserved Date**: April 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/go-yaml/yaml/issues/666)
2. [](https://security.netapp.com/advisory/ntap-20220923-0006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1468
- **State**: PUBLISHED
- **Published Date**: February 29, 2024 at 03:30 UTC
- **Last Updated**: August 08, 2024 at 18:59 UTC
- **Reserved Date**: February 13, 2024 at 15:17 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - Avada | Website Builder For WordPress & WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve)
2. [](https://avada.com/documentation/avada-changelog/)
### Credits
- Muhammad Zeeshan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5147
- **State**: PUBLISHED
- **Published Date**: October 02, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: October 02, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in wamp_dir/setup/yesno.phtml in VAMP Webmail 2.0beta1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the no_url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20289](http://www.securityfocus.com/bid/20289)
2. [2461](https://www.exploit-db.com/exploits/2461)
3. [vampwebmail-yesno-file-include(29288)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29288) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1119
- **State**: REJECTED
- **Published Date**: May 09, 2018 at 07:00 UTC
- **Last Updated**: May 09, 2018 at 06:57 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17490
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 20:17 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
app\modules\polygon\controllers\ProblemController in Jiangnan Online Judge (aka jnoj) 0.8.0 allows arbitrary file upload, as demonstrated by PHP code (with a .php filename but the image/png content type) to the web/polygon/problem/tests URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/shi-yang/jnoj/issues/51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4508
- **State**: PUBLISHED
- **Published Date**: May 10, 2025 at 17:00 UTC
- **Last Updated**: May 12, 2025 at 14:54 UTC
- **Reserved Date**: May 09, 2025 at 13:03 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in PHPGurukul e-Diary Management System 1.0. This vulnerability affects unknown code of the file /my-profile.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - e-Diary Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-308224 | PHPGurukul e-Diary Management System my-profile.php sql injection](https://vuldb.com/?id.308224)
2. [VDB-308224 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308224)
3. [Submit #567263 | PHPGurukul e-Diary Management System V1.0 SQL Injection](https://vuldb.com/?submit.567263)
4. [](https://github.com/y77-88/myCVE/issues/4)
5. [](https://phpgurukul.com/)
### Credits
- yl525 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0027
- **State**: PUBLISHED
- **Published Date**: January 09, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: January 03, 2007 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via malformed IMDATA records that trigger memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31255](http://www.osvdb.org/31255)
2. [TA07-009A](http://www.us-cert.gov/cas/techalerts/TA07-009A.html)
3. [1017487](http://securitytracker.com/id?1017487)
4. [21856](http://www.securityfocus.com/bid/21856)
5. [HPSBST02184](http://www.securityfocus.com/archive/1/457274/100/0/threaded)
6. [ADV-2007-0103](http://www.vupen.com/english/advisories/2007/0103)
7. [MS07-002](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002)
8. [SSRT071296](http://www.securityfocus.com/archive/1/457274/100/0/threaded)
9. [VU#749964](http://www.kb.cert.org/vuls/id/749964)
10. [oval:org.mitre.oval:def:119](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A119) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2805
- **State**: PUBLISHED
- **Published Date**: September 14, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in CoreGraphics in Apple Mac OS X 10.4.11 and 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JBIG2 stream in a PDF file, leading to a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57950](http://osvdb.org/57950)
2. [APPLE-SA-2009-09-10-2](http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html)
3. [36358](http://www.securityfocus.com/bid/36358)
4. [](http://support.apple.com/kb/HT3865)
5. [36701](http://secunia.com/advisories/36701)
6. [macosx-jbig2-bo(53167)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53167) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20748
- **State**: PUBLISHED
- **Published Date**: January 30, 2019 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: January 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html)
2. [](https://github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae)
3. [](https://github.com/LibVNC/libvncserver/commit/e34bcbb759ca5bef85809967a268fdf214c1ad2c)
4. [](https://github.com/LibVNC/libvncserver/issues/273)
5. [](https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a)
6. [](https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7)
7. [USN-3877-1](https://usn.ubuntu.com/3877-1/)
8. [](https://www.openwall.com/lists/oss-security/2018/12/10/8)
9. [[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html)
10. [USN-4547-1](https://usn.ubuntu.com/4547-1/)
11. [USN-4587-1](https://usn.ubuntu.com/4587-1/)
12. [](https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28680
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 00:00 UTC
- **Last Updated**: August 15, 2024 at 20:04 UTC
- **Reserved Date**: March 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /dede/diy_add.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/777erp/cms/blob/main/11.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17503
- **State**: PUBLISHED
- **Published Date**: January 08, 2021 at 17:17 UTC
- **Last Updated**: August 04, 2024 at 14:00 UTC
- **Reserved Date**: August 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The NDN-210 has a web administration panel which is made available over https. There is a command injection issue that will allow authenticated users to the administration panel to perform authenticated remote code execution. An issue exists in split_card_cmd.php in which the http parameter "locking" is not properly handled. The NDN-210 is part of Barco TransForm N solution and this vulnerability is patched from TransForm N version 3.8 onwards.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.barco.com/en/support/transform-n-management-server)
2. [](https://www.barco.com/en/support/cms)
3. [](https://www.barco.com/en/support/knowledge-base/kb11589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12368
- **State**: PUBLISHED
- **Published Date**: March 18, 2020 at 17:31 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 27, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Edison Mail application through 1.7.1 for Android allows XSS via an event attribute and arbitrary file loading via a src attribute, if the application has the READ_EXTERNAL_STORAGE permission.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gubello.me)
2. [](https://mail.edison.tech/)
3. [](https://www.gubello.me/blog/javascript-injection-in-six-android-mail-clients/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25123
- **State**: PUBLISHED
- **Published Date**: January 29, 2021 at 12:30 UTC
- **Last Updated**: August 03, 2024 at 19:56 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice addlicense_func function.
### Affected Products
**n/a - HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server**
Affected versions:
- Version. 1.09.0.0 (Status: affected)
- Version 1.07.0.0 (Status: affected)
- Version 1.10.0.0 (Status: affected)
- Version 1.10.0.0 (Status: affected)
- Version 1.08.0.0 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04073en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50448
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 17:56 UTC
- **Last Updated**: October 28, 2024 at 20:05 UTC
- **Reserved Date**: October 24, 2024 at 07:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.14.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**YITH - YITH WooCommerce Product Add-Ons**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-plugin-4-14-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1781
- **State**: PUBLISHED
- **Published Date**: May 15, 2019 at 19:45 UTC
- **Last Updated**: November 20, 2024 at 17:20 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need administrator credentials to exploit this vulnerability.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Cisco - Cisco NX-OS Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190515 Cisco FXOS and NX-OS Software Command Injection Vulnerabilities (CVE-2019-1781, CVE-2019-1782)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-fxos-nxos-cmdinj-1781-1782)
2. [108407](http://www.securityfocus.com/bid/108407) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4390
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 03:37 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 01, 2024 at 15:26 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Slider and Carousel slider by Depicter plugin for WordPress is vulnerable to Arbitrary Nonce Generation in all versions up to, and including, 3.0.2. This makes it possible for authenticated attackers with contributor access and above, to generate a valid nonce for any WordPress action/function. This could be used to invoke functionality that is protected only by nonce checks.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**averta - Slider & Popup Builder by Depicter – Add Image Slider, Carousel Slider, Exit Intent Popup, Popup Modal, Coupon Popup, Post Slider Carousel**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/dd7c3a5d-b8aa-45cb-983c-55ba7e3d72f3?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/SecurityAjaxController.php#L14)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3103357%40depicter%2Ftrunk&old=3090538%40depicter%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Arkadiusz Hydzik |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10355
- **State**: PUBLISHED
- **Published Date**: July 31, 2019 at 12:45 UTC
- **Last Updated**: August 04, 2024 at 22:17 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.
### Affected Products
**Jenkins project - Jenkins Script Security Plugin**
Affected versions:
- 1.61 and earlier (Status: affected)
### References
1. [[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/07/31/1)
2. [RHSA-2019:2651](https://access.redhat.com/errata/RHSA-2019:2651)
3. [RHSA-2019:2594](https://access.redhat.com/errata/RHSA-2019:2594)
4. [RHSA-2019:2662](https://access.redhat.com/errata/RHSA-2019:2662)
5. [](https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%281%29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48349
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 00:00 UTC
- **Last Updated**: February 24, 2025 at 19:08 UTC
- **Reserved Date**: February 25, 2023 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.1 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505)
2. [](https://consumer.huawei.com/en/support/bulletin/2023/3/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52475
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 10:34 UTC
- **Last Updated**: November 29, 2024 at 18:55 UTC
- **Reserved Date**: November 11, 2024 at 06:40 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Automation Web Platform Wawp allows Authentication Bypass.This issue affects Wawp: from n/a before 3.0.18.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**Automation Web Platform - Wawp**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/automation-web-platform/vulnerability/wordpress-wawp-plugin-3-0-18-account-takeover-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2682
- **State**: PUBLISHED
- **Published Date**: May 31, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in BE_config.php in Back-End CMS 0.7.2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the _PSL[classdir] parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1825](https://www.exploit-db.com/exploits/1825)
2. [20292](http://secunia.com/advisories/20292)
3. [ADV-2006-1979](http://www.vupen.com/english/advisories/2006/1979)
4. [backendcms-beconfig-file-inclusion(26699)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26699) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51439
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 10:00 UTC
- **Last Updated**: April 17, 2025 at 17:54 UTC
- **Reserved Date**: December 19, 2023 at 11:47 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V14.3.0.6 (Status: affected)
**Siemens - Teamcenter Visualization V13.3**
Affected versions:
- All versions < V13.3.0.13 (Status: affected)
**Siemens - Teamcenter Visualization V14.1**
Affected versions:
- All versions < V14.1.0.12 (Status: affected)
**Siemens - Teamcenter Visualization V14.2**
Affected versions:
- All versions < V14.2.0.9 (Status: affected)
**Siemens - Teamcenter Visualization V14.3**
Affected versions:
- All versions < V14.3.0.6 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3455
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 15:31 UTC
- **Last Updated**: August 12, 2024 at 13:30 UTC
- **Reserved Date**: April 08, 2024 at 10:11 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add_postlogin.php. The manipulation of the argument SingleLoginId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259711.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Netentsec - NS-ASG Application Security Gateway**
Affected versions:
- 6.3 (Status: affected)
### References
1. [VDB-259711 | Netentsec NS-ASG Application Security Gateway add_postlogin.php sql injection](https://vuldb.com/?id.259711)
2. [VDB-259711 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259711)
3. [Submit #312182 | Beijing Wangkang Technology Co., Ltd. NS-ASG application security gateway. 6.3 security gateway intelligent management platform](https://vuldb.com/?submit.312182)
4. [](https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-add_postlogin.md)
### Credits
- zerone0x00 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2417
- **State**: PUBLISHED
- **Published Date**: June 17, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: April 24, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2502](http://www.debian.org/security/2012/dsa-2502)
2. [82279](http://www.osvdb.org/82279)
3. [FEDORA-2012-8470](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html)
4. [](https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2)
5. [MDVSA-2012:117](http://www.mandriva.com/security/advisories?name=MDVSA-2012:117)
6. [53687](http://www.securityfocus.com/bid/53687)
7. [](https://bugs.launchpad.net/pycrypto/+bug/985164)
8. [FEDORA-2012-8392](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html)
9. [49263](http://secunia.com/advisories/49263)
10. [FEDORA-2012-8490](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html)
11. [[oss-security] 20120524 CVE-2012-2417 - PyCrypto <= 2.5 insecure ElGamal key generation](http://www.openwall.com/lists/oss-security/2012/05/25/1)
12. [openSUSE-SU-2012:0830](https://hermes.opensuse.org/messages/15083589)
13. [pycrypto-keys-weak-security(75871)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75871)
14. [](https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0838
- **State**: PUBLISHED
- **Published Date**: March 06, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 04:48 UTC
- **Reserved Date**: March 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The crypto pseudo device driver in Sun Solaris 10, and OpenSolaris snv_88 through snv_102, does not properly free memory, which allows local users to cause a denial of service (panic) via unspecified vectors, related to the vmem_hash_delete function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1)
2. [1021810](http://securitytracker.com/id?1021810)
3. [34000](http://www.securityfocus.com/bid/34000)
4. [ADV-2009-0606](http://www.vupen.com/english/advisories/2009/0606)
5. [sun-solaris-cryptodriver-dos(49105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49105)
6. [](http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm)
7. [ADV-2009-0815](http://www.vupen.com/english/advisories/2009/0815)
8. [254088](http://sunsolve.sun.com/search/document.do?assetkey=1-66-254088-1)
9. [oval:org.mitre.oval:def:5641](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5641)
10. [34149](http://secunia.com/advisories/34149)
11. [34455](http://secunia.com/advisories/34455) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1906
- **State**: PUBLISHED
- **Published Date**: February 03, 2016 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 14, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/openshift/origin/issues/6556)
2. [](https://github.com/openshift/origin/pull/6576)
3. [RHSA-2016:0070](https://access.redhat.com/errata/RHSA-2016:0070)
4. [RHSA-2016:0351](https://access.redhat.com/errata/RHSA-2016:0351) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0944
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0942, CVE-2020-1029.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0944) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5958
- **State**: PUBLISHED
- **Published Date**: January 23, 2009 at 18:38 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Active Test 2.1 allow remote attackers to execute arbitrary SQL commands via the QuizID parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50407](http://osvdb.org/50407)
2. [ADV-2008-3299](http://www.vupen.com/english/advisories/2008/3299)
3. [7295](https://www.exploit-db.com/exploits/7295)
4. [32547](http://www.securityfocus.com/bid/32547)
5. [50405](http://osvdb.org/50405)
6. [32902](http://secunia.com/advisories/32902)
7. [50406](http://osvdb.org/50406)
8. [activetest-quizid-sql-injection(46919)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46919) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30181
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 22:37 UTC
- **Last Updated**: January 02, 2025 at 19:24 UTC
- **Reserved Date**: May 03, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Site Recovery Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Site Recovery VMWare to Azure**
Affected versions:
- 9.0 (Status: affected)
### References
1. [Azure Site Recovery Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30181) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4866
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37125
- **State**: PUBLISHED
- **Published Date**: September 26, 2024 at 17:01 UTC
- **Last Updated**: September 26, 2024 at 17:31 UTC
- **Reserved Date**: June 03, 2024 at 12:08 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell SmartFabric OS10 Software, versions 10.5.6.x, 10.5.5.x, 10.5.4.x,10.5.3.x, contains an Uncontrolled Resource Consumption vulnerability. A remote unauthenticated host could potentially exploit this vulnerability leading to a denial of service.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Dell - SmartFabric OS10 Software**
Affected versions:
- 10.5.6.x (Status: affected)
- 10.5.5.x (Status: affected)
- 10.5.4.x (Status: affected)
- 10.5.3.x (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000228976/dsa-2024-274-security-update-for-dell-networking-os10-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7628
- **State**: PUBLISHED
- **Published Date**: April 02, 2020 at 21:33 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
umount through 1.1.6 is vulnerable to Command Injection. The argument device can be controlled by users without any sanitization.
### Affected Products
**n/a - install-package**
Affected versions:
- All versions including 1.1.6 (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-UMOUNT-564265) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2634
- **State**: PUBLISHED
- **Published Date**: June 10, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.asp in I-Pos Internet Pay Online Store 1.3 Beta and earlier allows remote attackers to execute arbitrary SQL commands via the item parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ipos-item-sql-injection(42786)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42786)
2. [5717](https://www.exploit-db.com/exploits/5717) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3192
- **State**: PUBLISHED
- **Published Date**: November 26, 2019 at 13:56 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cloudera Manager 5.x before 5.7.1 places Sensitive Data in cleartext Readable Files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html#tsb_134) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32915
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: May 06, 2025 at 19:20 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213488)
2. [](https://support.apple.com/kb/HT213604)
3. [20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3](http://seclists.org/fulldisclosure/2023/Jan/20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11445
- **State**: PUBLISHED
- **Published Date**: May 25, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 08:10 UTC
- **Reserved Date**: May 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A CSRF issue was discovered on the User Add/System Settings Page (system-settings-user-new2.php) in EasyService Billing 1.0. A User can be added with the Admin role.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44763](https://www.exploit-db.com/exploits/44763/)
2. [](https://gist.github.com/NinjaXshell/a5fae5e2d1031ca59160fbe29d94279c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9352
- **State**: PUBLISHED
- **Published Date**: December 09, 2014 at 22:52 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 09, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the mail administration login panel in Scalix Web Access 11.4.6.12377 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141031 SEC Consult SA-20141031-0 :: XML External Entity Injection (XXE) and Reflected XSS in Scalix Web Access](http://www.securityfocus.com/archive/1/533861/100/0/threaded)
2. [20141031 SEC Consult SA-20141031-0 :: XML External Entity Injection (XXE) and Reflected XSS in Scalix Web Access](http://seclists.org/fulldisclosure/2014/Oct/133)
3. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141031-0_Scalix_Web_Access_XXE_v10.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34169
- **State**: PUBLISHED
- **Published Date**: November 09, 2023 at 19:27 UTC
- **Last Updated**: September 04, 2024 at 13:30 UTC
- **Reserved Date**: May 29, 2023 at 13:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in SAKURA Internet Inc. TS Webfonts for さくらのレンタルサーバ plugin <= 3.1.2 versions.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**SAKURA Internet Inc. - TS Webfonts for さくらのレンタルサーバ**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ts-webfonts-for-sakura/wordpress-ts-webfonts-for-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0091
- **State**: PUBLISHED
- **Published Date**: October 14, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 08, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA09-286A](http://www.us-cert.gov/cas/techalerts/TA09-286A.html)
2. [oval:org.mitre.oval:def:6451](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6451)
3. [MS09-061](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24633
- **State**: PUBLISHED
- **Published Date**: December 11, 2020 at 01:26 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 25, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
### Affected Products
**n/a - Aruba 9000 Gateway**
Affected versions:
- 2.1.0.1 (Status: affected)
- 2.2.0.0 and below (Status: affected)
**n/a - Aruba 7000 Series Mobility Controllers**
Affected versions:
- 6.4.4.23 (Status: affected)
- 6.5.4.17 (Status: affected)
- 8.2.2.9 (Status: affected)
- 8.3.0.13 (Status: affected)
- 8.5.0.10 (Status: affected)
- 8.6.0.5 (Status: affected)
- 8.7.0.0 and below (Status: affected)
**n/a - Aruba 7200 Series Mobility Controllers**
Affected versions:
- 6.4.4.23 (Status: affected)
- 6.5.4.17 (Status: affected)
- 8.2.2.9 (Status: affected)
- 8.3.0.13 (Status: affected)
- 8.5.0.10 (Status: affected)
- 8.6.0.5 (Status: affected)
- 8.7.0.0 and below (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04072en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13478
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for DMPToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/DMPToken)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35118
- **State**: PUBLISHED
- **Published Date**: August 29, 2024 at 15:20 UTC
- **Last Updated**: August 29, 2024 at 15:38 UTC
- **Reserved Date**: May 09, 2024 at 16:27 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MaaS360 for Android 6.31 through 8.60 is using hard coded credentials that can be obtained by a user with physical access to the device.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**IBM - MaaS360**
Affected versions:
- 6.31 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7166750)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/290341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40473
- **State**: PUBLISHED
- **Published Date**: October 13, 2021 at 00:27 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40473) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48428
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 18:29 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Olive VLE allows an attacker to obtain sensitive information via the reset password function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/h7w/full-account-takeover-via-password-reset-link-manipulation-840fb9402967)
2. [](https://medium.com/%40powerful-/account-takeover-ato-via-the-reset-password-cve-2024-48428-84892d6211d6)
3. [](https://www.linkedin.com/posts/said-al-ghammari-301972285_0day-bugbountytips-bugbountytip-activity-7227418100034412544-2ocu/)
4. [](https://www.olivevle.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16380
- **State**: PUBLISHED
- **Published Date**: September 03, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Ogma CMS 0.4 Beta. There is a CSRF vulnerability in users.php?action=createnew that can add an admin account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/n00dles/ogma-CMS/issues/39) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0609
- **State**: PUBLISHED
- **Published Date**: February 06, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in DivideConcept VHD Web Pack 2.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3613](http://securityreason.com/securityalert/3613)
2. [27621](http://www.securityfocus.com/bid/27621)
3. [28712](http://secunia.com/advisories/28712)
4. [5060](https://www.exploit-db.com/exploits/5060)
5. [20080204 [DSECRG-08-010] VHD Web Pack 2.0 Local File Include](http://www.securityfocus.com/archive/1/487485/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5615
- **State**: PUBLISHED
- **Published Date**: August 04, 2020 at 01:05 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
### Affected Products
**PHP Factory - [Calendar01] and [Calendar02]**
Affected versions:
- [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 (Status: affected)
### References
1. [](https://www.php-factory.net/calendar/01.php)
2. [](https://www.php-factory.net/calendar/02.php)
3. [](https://jvn.jp/en/jp/JVN73169744/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4657
- **State**: PUBLISHED
- **Published Date**: August 25, 2016 at 21:00 UTC
- **Last Updated**: January 29, 2025 at 17:45 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit in Apple iOS before 9.3.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.lookout.com/blog/2016/08/25/trident-pegasus/)
2. [](https://www.youtube.com/watch?v=xkdPjbaLngE)
3. [44836](https://www.exploit-db.com/exploits/44836/)
4. [92653](http://www.securityfocus.com/bid/92653)
5. [](https://support.apple.com/HT207107)
6. [APPLE-SA-2016-08-25-1](http://lists.apple.com/archives/security-announce/2016/Aug/msg00000.html)
7. [1036694](http://www.securitytracker.com/id/1036694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50382
- **State**: PUBLISHED
- **Published Date**: July 08, 2024 at 15:22 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 07, 2023 at 15:53 UTC
- **Assigned By**: talos
### Vulnerability Description
Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `peerPin` request's parameter.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**LevelOne - WBR-6013**
Affected versions:
- RER4_A_v3411b_2T2R_LEV_09_170623 (Status: affected)
**Realtek - rtl819x Jungle SDK**
Affected versions:
- v3.4.11 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56436
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 01:46 UTC
- **Last Updated**: January 08, 2025 at 17:11 UTC
- **Reserved Date**: December 26, 2024 at 08:45 UTC
- **Assigned By**: huawei
### Vulnerability Description
Cross-process screen stack vulnerability in the UIExtension module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2025/1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1867
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:49 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.5 and iPadOS 14.5, macOS Big Sur 11.3. A malicious application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212317)
2. [](https://support.apple.com/en-us/HT212325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5945
- **State**: PUBLISHED
- **Published Date**: September 26, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to upload non-executable files via a crafted HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93082](http://www.securityfocus.com/bid/93082)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21988625)
3. [IT16944](http://www-01.ibm.com/support/docview.wss?uid=swg1IT16944) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4907
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 20:35 UTC
- **Last Updated**: September 17, 2024 at 02:37 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
### Affected Products
**IBM - Financial Transaction Manager**
Affected versions:
- 3.2.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6371260)
2. [ibm-ftm-cve20204907-info-disc (191112)](https://exchange.xforce.ibmcloud.com/vulnerabilities/191112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32676
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 16:09 UTC
- **Last Updated**: April 09, 2025 at 18:08 UTC
- **Reserved Date**: April 09, 2025 at 11:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Picture-Planet GmbH Verowa Connect allows Blind SQL Injection. This issue affects Verowa Connect: from n/a through 3.0.5.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Picture-Planet GmbH - Verowa Connect**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/verowa-connect/vulnerability/wordpress-verowa-connect-plugin-3-0-5-sql-injection-vulnerability?_s_id=cve)
### Credits
- Phan Trong Quan - VNPT Cyber Immunity (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0825
- **State**: PUBLISHED
- **Published Date**: October 03, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 16:47 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An information disclosure vulnerability in the Broadcom wifi driver. Product: Android. Versions: Android kernel. Android ID: A-37305633. References: B-V2017063002.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3534
- **State**: PUBLISHED
- **Published Date**: May 13, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 13, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the aiContactSafe component before 2.0.21 for Joomla! allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53050](http://secunia.com/advisories/53050)
2. [59266](http://www.securityfocus.com/bid/59266)
3. [](http://www.algisinfo.com/en/home-bottom/41-xss-in-aicontactsafe.html)
4. [joomla-aicontactsafe-unspecified-xss(83631)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83631) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2007
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 19:54 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getReadIndex and getWriteIndex of FifoControllerBase.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege in the audio server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-120789744
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3139
- **State**: PUBLISHED
- **Published Date**: June 22, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in war.php in Virtual War (VWar) 1.5.0 R14 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) s, (2) showgame, (3) sortorder, and (4) sortby parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060814 Virtual War v1.5.0 SQL injection and XSS](http://www.securityfocus.com/archive/1/443171/100/0/threaded)
2. [20080213 Re: Vwar New Bug](http://www.securityfocus.com/archive/1/488118/100/200/threaded)
3. [virtualwar-war-sql-injection(27153)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27153)
4. [](http://pridels0.blogspot.com/2006/06/virtual-war-multiple-sql-inj-vuln.html)
5. [20696](http://secunia.com/advisories/20696)
6. [ADV-2006-2383](http://www.vupen.com/english/advisories/2006/2383)
7. [20080213 Vwar New Bug](http://archives.neohapsis.com/archives/bugtraq/2008-02/0186.html)
8. [26533](http://www.osvdb.org/26533)
9. [27772](http://www.securityfocus.com/bid/27772)
10. [virtualwar-warphp-sql-injection(40481)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40481) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7416
- **State**: PUBLISHED
- **Published Date**: August 09, 2024 at 09:30 UTC
- **Last Updated**: August 10, 2024 at 14:38 UTC
- **Reserved Date**: August 02, 2024 at 12:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Reveal Template plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.7. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**coffee2code - Reveal Template**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/34a36da0-a101-4c5a-bacb-9f131bded819?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/reveal-template/trunk/tests/phpunit/bootstrap.php)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7167
- **State**: PUBLISHED
- **Published Date**: June 13, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 02:00 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: nodejs
### Vulnerability Description
Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.
### Affected Products
**The Node.js Project - Node.js**
Affected versions:
- 6.x+ (Status: affected)
- 8.x+ (Status: affected)
- 9.x+ (Status: affected)
- 10.x+ (Status: affected)
### References
1. [106363](http://www.securityfocus.com/bid/106363)
2. [](https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/)
3. [GLSA-202003-48](https://security.gentoo.org/glsa/202003-48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6059
- **State**: PUBLISHED
- **Published Date**: November 20, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Javamail does not properly handle a series of invalid login attempts in which the same e-mail address is entered as username and password, and the domain portion of this address yields a Java UnknownHostException error, which allows remote attackers to cause a denial of service (connection pool exhaustion) via a large number of requests, resulting in a SQLNestedException. NOTE: Sun disputes this issue, stating "The report makes references to source code and files that do not exist in the mentioned products.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45299](http://osvdb.org/45299)
2. [20071116 Javamail login username and password same email problem](http://archives.neohapsis.com/archives/bugtraq/2007-11/0239.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.