System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13129 - **State**: PUBLISHED - **Published Date**: July 01, 2019 at 14:48 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: July 01, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On the Motorola router CX2L MWR04L 1.01, there is a stack consumption (infinite recursion) issue in scopd via TCP port 8010 and UDP port 8080. It is caused by snprintf and inappropriate length handling. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TeamSeri0us/pocs/blob/master/iot/morouter/morouter_stackoverflow.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3468 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:56 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.3.0 and 6.2.0.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Install. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 2. [1036402](http://www.securitytracker.com/id/1036402) 3. [91787](http://www.securityfocus.com/bid/91787) 4. [91922](http://www.securityfocus.com/bid/91922)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2556 - **State**: PUBLISHED - **Published Date**: July 21, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 21, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 2.0.172.37 allows attackers to leverage renderer access to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors that trigger excessive memory allocation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [googlechrome-buffers-code-execution(51802)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51802) 2. [](http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html) 3. [35844](http://secunia.com/advisories/35844) 4. [ADV-2009-1924](http://www.vupen.com/english/advisories/2009/1924) 5. [35723](http://www.securityfocus.com/bid/35723)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6508 - **State**: PUBLISHED - **Published Date**: March 07, 2017 at 08:39 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 07, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html) 2. [GLSA-201706-16](https://security.gentoo.org/glsa/201706-16) 3. [96877](http://www.securityfocus.com/bid/96877) 4. [](http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5819, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5819 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5819 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 17:31 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5818 and CVE-2013-5831. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414) 2. [RHSA-2013:1440](http://rhn.redhat.com/errata/RHSA-2013-1440.html) 3. [63141](http://www.securityfocus.com/bid/63141) 4. [RHSA-2013:1508](http://rhn.redhat.com/errata/RHSA-2013-1508.html) 5. [SUSE-SU-2013:1677](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html) 6. [HPSBUX02944](http://marc.info/?l=bugtraq&m=138674073720143&w=2) 7. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655201) 8. [HPSBUX02943](http://marc.info/?l=bugtraq&m=138674031212883&w=2) 9. [RHSA-2013:1793](http://rhn.redhat.com/errata/RHSA-2013-1793.html) 10. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) 11. [APPLE-SA-2013-10-15-1](http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html) 12. [RHSA-2013:1507](http://rhn.redhat.com/errata/RHSA-2013-1507.html) 13. [](http://support.apple.com/kb/HT5982) 14. [56338](http://secunia.com/advisories/56338) 15. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html) 16. [oval:org.mitre.oval:def:19082](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19082)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32327 - **State**: PUBLISHED - **Published Date**: April 18, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:06 UTC - **Reserved Date**: April 12, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Port Forwarding under the Firewall Page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.totolink.net/home/menu/newstpl/menu_newstpl/products/id/154.html) 2. [](https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_5_Port_Forwarding/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0979 - **State**: PUBLISHED - **Published Date**: February 02, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 18:45 UTC - **Reserved Date**: February 02, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in TWiki allows remote attackers to inject arbitrary web script or HTML via the organization field in a profile, involving (1) registration or (2) editing of the user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [47784](http://secunia.com/advisories/47784) 2. [](http://st2tea.blogspot.com/2012/01/cross-site-scripting-twiki.html) 3. [1026604](http://www.securitytracker.com/id?1026604) 4. [51731](http://www.securityfocus.com/bid/51731) 5. [twiki-organization-xss(72821)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72821) 6. [78664](http://osvdb.org/78664) 7. [](http://packetstormsecurity.org/files/109246/twiki-xss.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000032 - **State**: PUBLISHED - **Published Date**: July 13, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: July 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-Site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the parent_id parameter to tree.php and drp_action parameter to data_sources.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-007/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9030 - **State**: PUBLISHED - **Published Date**: June 13, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 08:36 UTC - **Reserved Date**: April 18, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Android releases from CAF using the Linux kernel, the Hypervisor API could be misused to bypass authentication. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-06-01) 2. [98874](http://www.securityfocus.com/bid/98874) 3. [1038623](http://www.securitytracker.com/id/1038623)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14647 - **State**: PUBLISHED - **Published Date**: September 25, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15. ### Weakness Classification (CWE) - CWE-665: Security Weakness - CWE-335: Security Weakness ### Affected Products **The Python Project - Python** Affected versions: - 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 (Status: affected) ### References 1. [DSA-4306](https://www.debian.org/security/2018/dsa-4306) 2. [USN-3817-2](https://usn.ubuntu.com/3817-2/) 3. [1041740](http://www.securitytracker.com/id/1041740) 4. [105396](http://www.securityfocus.com/bid/105396) 5. [DSA-4307](https://www.debian.org/security/2018/dsa-4307) 6. [](https://bugs.python.org/issue34623) 7. [USN-3817-1](https://usn.ubuntu.com/3817-1/) 8. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647) 9. [FEDORA-2019-0c91ce7b3c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/) 10. [RHSA-2019:1260](https://access.redhat.com/errata/RHSA-2019:1260) 11. [[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html) 12. [[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html) 13. [RHSA-2019:2030](https://access.redhat.com/errata/RHSA-2019:2030) 14. [RHSA-2019:3725](https://access.redhat.com/errata/RHSA-2019:3725) 15. [openSUSE-SU-2020:0086](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html) 16. [[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image](https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6390 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40189 - **State**: PUBLISHED - **Published Date**: October 11, 2021 at 18:27 UTC - **Last Updated**: August 04, 2024 at 02:27 UTC - **Reserved Date**: August 30, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to "webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PHPFusion/PHPFusion/issues/2374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33356, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33356 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33356 - **State**: PUBLISHED - **Published Date**: May 25, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 15:47 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IceCMS v1.0.0 is vulnerable to Cross Site Scripting (XSS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Thecosy/IceCMS/issues/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52926 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 00:00 UTC - **Last Updated**: January 06, 2025 at 17:55 UTC - **Reserved Date**: November 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Delinea Privilege Manager before 12.0.2 mishandles the security of the Windows agent. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Delinea - Privilege Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.2-combined.htm) 2. [](https://trust.delinea.com/?tcuUid=3be1a12c-97c9-431e-a51a-0c25da19ec86) ### Credits - Osanda Jayathissa of Visa
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21431 - **State**: PUBLISHED - **Published Date**: October 04, 2021 at 20:20 UTC - **Last Updated**: August 04, 2024 at 14:30 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HongCMS v3.0 contains an arbitrary file read and write vulnerability in the component /admin/index.php/template/edit. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Neeke/HongCMS/issues/14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1455 - **State**: PUBLISHED - **Published Date**: October 05, 2016 at 20:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 04, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco NX-OS before 7.0(3)I2(2e) and 7.0(3)I4 before 7.0(3)I4(1) has an incorrect iptables local-interface configuration, which allows remote attackers to obtain sensitive information via TCP or UDP traffic, aka Bug ID CSCuz05365. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93415](http://www.securityfocus.com/bid/93415) 2. [1036957](http://www.securitytracker.com/id/1036957) 3. [20161005 Cisco Nexus 9000 Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-n9kinfo)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1058 - **State**: PUBLISHED - **Published Date**: February 08, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: February 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Xsun server for Sun Solaris 2.6 through 9, when running in Direct Graphics Access (DGA) mode, allows local users to cause a denial of service (Xsun crash) or to create or overwrite arbitrary files on the system, probably via a symlink attack on temporary server files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9147](http://www.securityfocus.com/bid/9147) 2. [10346](http://secunia.com/advisories/10346) 3. [57419](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57419-1) 4. [solaris-xsun-gain-privileges(13890)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13890) 5. [O-033](http://www.ciac.org/ciac/bulletins/o-033.shtml) 6. [2892](http://www.osvdb.org/2892)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38341, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38341 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38341 - **State**: PUBLISHED - **Published Date**: September 10, 2021 at 13:33 UTC - **Last Updated**: May 02, 2025 at 19:50 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/includes/plugin_settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.10. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WooCommerce Payment Gateway Per Category - WooCommerce Payment Gateway Per Category** Affected versions: - 2.0.10 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38341) 2. [](https://plugins.trac.wordpress.org/browser/wc-payment-gateway-per-category/tags/2.0.10/includes/plugin_settings.php#L31) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4535, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4535 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4535 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0417 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 13:43 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-154319182 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-8.1 Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-07-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13182, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13182 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13182 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: July 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for loncoin (LON), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/loncoin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3906 - **State**: PUBLISHED - **Published Date**: April 17, 2024 at 10:31 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 17, 2024 at 05:42 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-261142 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - AC500** Affected versions: - 2.0.1.9(1307) (Status: affected) ### References 1. [VDB-261142 | Tenda AC500 QuickIndex formQuickIndex stack-based overflow](https://vuldb.com/?id.261142) 2. [VDB-261142 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.261142) 3. [Submit #313801 | Tenda AC500 V2.0.1.9(1307) buffer overflow](https://vuldb.com/?submit.313801) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md) ### Credits - yhryhryhr_tu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45671, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45671 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45671 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:25 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX80 before 1.0.1.62, EX7500 before 1.0.0.72, R7900 before 1.0.4.38, R8000 before 1.0.4.68, RAX200 before 1.0.4.120, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.4.120, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.4.120, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:L/C:L/I:H/PR:H/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064482/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0261)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2944 - **State**: PUBLISHED - **Published Date**: June 01, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:50 UTC - **Reserved Date**: May 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [networkupstools-addchar-bo(75980)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75980) 2. [DSA-2484](http://www.debian.org/security/2012/dsa-2484) 3. [](http://alioth.debian.org/tracker/?func=detail&aid=313636) 4. [MDVSA-2012:087](http://www.mandriva.com/security/advisories?name=MDVSA-2012:087) 5. [50389](http://secunia.com/advisories/50389) 6. [](http://trac.networkupstools.org/projects/nut/changeset/3633) 7. [openSUSE-SU-2012:1069](https://hermes.opensuse.org/messages/15514634) 8. [49348](http://secunia.com/advisories/49348) 9. [](http://networkupstools.org/docs/user-manual.chunked/apis01.html) 10. [53743](http://www.securityfocus.com/bid/53743) 11. [82409](http://www.osvdb.org/82409)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14746 - **State**: PUBLISHED - **Published Date**: August 07, 2019 at 15:04 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 07, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A issue was discovered in KuaiFanCMS 5.0. It allows eval injection by placing PHP code in the install.php db_name parameter and then making a config.php request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/poropro/kuaifan/issues/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6291 - **State**: PUBLISHED - **Published Date**: December 05, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 05, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack overflow in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.83 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.40 and 2.0 through 2.33, allows remote authenticated users to cause a denial of service (crash) via a long argument containing * (asterisk) and ? (question mark) characters to the DELETE command, as addressed by the ME-10020 hotfix. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1017276](http://securitytracker.com/id?1017276) 2. [ADV-2006-4778](http://www.vupen.com/english/advisories/2006/4778) 3. [23080](http://secunia.com/advisories/23080) 4. [21362](http://www.securityfocus.com/bid/21362) 5. [1017319](http://securitytracker.com/id?1017319) 6. [](http://www.mailenable.com/hotfix/) 7. [20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities](http://www.securityfocus.com/archive/1/453118/100/100/threaded) 8. [mailenable-meimaps-bo(30614)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30614) 9. [](http://secunia.com/secunia_research/2006-71/advisory/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56066 - **State**: PUBLISHED - **Published Date**: December 31, 2024 at 13:20 UTC - **Last Updated**: December 31, 2024 at 15:19 UTC - **Reserved Date**: December 14, 2024 at 19:43 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Inspry Agency Toolkit allows Privilege Escalation.This issue affects Agency Toolkit: from n/a through 1.0.23. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Inspry - Agency Toolkit** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/agency-toolkit/vulnerability/wordpress-agency-toolkit-plugin-1-0-23-privilege-escalation-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3569, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3569 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3569 - **State**: PUBLISHED - **Published Date**: July 13, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 12, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in NetApp Data ONTAP 7.0x through 7.0.4P8D9, 7.1x, 7.1.0.1x, and 7.2RC1, RC2, and RC3, as used in IBM N series Filers and other products, allows unauthorized users to gain access to privileged commands via unknown vectors, probably related to incorrect capabilities with the audit role. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27134](http://www.osvdb.org/27134) 2. [](http://www-1.ibm.com/support/docview.wss?rs=0&uid=ssg1S1002910) 3. [ADV-2006-2761](http://www.vupen.com/english/advisories/2006/2761) 4. [18951](http://www.securityfocus.com/bid/18951) 5. [20984](http://secunia.com/advisories/20984) 6. [](http://now.netapp.com/NOW/products/vulnerability_0601/) 7. [data-ontap-unauthorized-command-execution(27651)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27651)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7046, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7046 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7046 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:09 UTC - **Last Updated**: March 20, 2025 at 18:36 UTC - **Reserved Date**: July 23, 2024 at 18:55 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description An improper access control vulnerability in open-webui/open-webui v0.3.8 allows an attacker to view admin details. The application does not verify whether the attacker is an administrator, allowing the attacker to directly call the /api/v1/auths/admin/details interface to retrieve the first admin (owner) details. ### Weakness Classification (CWE) - CWE-475: Security Weakness ### Affected Products **open-webui - open-webui/open-webui** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/684185e4-6766-4638-b08a-0de9c2820aee)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3164 - **State**: PUBLISHED - **Published Date**: July 10, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 17, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:17376](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17376) 2. [MS13-055](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055) 3. [TA13-190A](http://www.us-cert.gov/ncas/alerts/TA13-190A)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2457 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:12 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.3 (Status: affected) - 8.5.4 (Status: affected) ### References 1. [106579](http://www.securityfocus.com/bid/106579) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6409 - **State**: PUBLISHED - **Published Date**: December 17, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 16:02 UTC - **Reserved Date**: December 17, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The gg protocol handler in Gadu-Gadu, when this product is installed but not running, does not properly handle the skin attribute, which allows remote attackers to cause a denial of service (resource consumption) via unspecified network traffic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20071205 [ELEYTT] Public Advisory 05-12-2007](http://www.securityfocus.com/archive/1/484607/100/0/threaded) 2. [3458](http://securityreason.com/securityalert/3458)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2126 - **State**: PUBLISHED - **Published Date**: March 09, 2025 at 17:00 UTC - **Last Updated**: March 10, 2025 at 18:31 UTC - **Reserved Date**: March 08, 2025 at 14:57 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla and classified as critical. This issue affects some unknown processing of the file /extensions/realestate/index.php/properties/list/list-with-sidebar/realties of the component GET Parameter Handler. The manipulation of the argument title leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **JoomlaUX - JUX Real Estate** Affected versions: - 3.4.0 (Status: affected) ### References 1. [VDB-299039 | JoomlaUX JUX Real Estate GET Parameter realties sql injection](https://vuldb.com/?id.299039) 2. [VDB-299039 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299039) 3. [Submit #509884 | JoomlaUX JUX Real Estate 3.4.0 SQL Injection](https://vuldb.com/?submit.509884) ### Credits - skalvin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7537 - **State**: PUBLISHED - **Published Date**: March 09, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 06:31 UTC - **Reserved Date**: February 26, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3591-1](https://usn.ubuntu.com/3591-1/) 2. [[debian-lts-announce] 20180308 [SECURITY] [DLA 1303-1] python-django security update](https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html) 3. [](https://www.djangoproject.com/weblog/2018/mar/06/security-releases/) 4. [RHSA-2018:2927](https://access.redhat.com/errata/RHSA-2018:2927) 5. [103357](http://www.securityfocus.com/bid/103357) 6. [RHSA-2019:0265](https://access.redhat.com/errata/RHSA-2019:0265) 7. [DSA-4161](https://www.debian.org/security/2018/dsa-4161)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34592 - **State**: PUBLISHED - **Published Date**: July 07, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 09:15 UTC - **Reserved Date**: June 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wavlink WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability via the function obtw. This vulnerability allows attackers to execute arbitrary commands via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/winmt/CVE/blob/main/WAVLINK%20WL-WN575A3/README.md) 2. [](https://github.com/winmt/my-vuls/tree/main/WAVLINK%20WL-WN575A3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32226 - **State**: PUBLISHED - **Published Date**: April 04, 2025 at 15:59 UTC - **Last Updated**: April 04, 2025 at 20:11 UTC - **Reserved Date**: April 04, 2025 at 10:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Anzar Ahmed Display product variations dropdown on shop page allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Display product variations dropdown on shop page: from n/a through 1.1.3. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Anzar Ahmed - Display product variations dropdown on shop page** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/display-product-variations-dropdown-on-shop-page/vulnerability/wordpress-display-product-variations-dropdown-on-shop-page-plugin-1-1-3-broken-access-control-vulnerability?_s_id=cve) ### Credits - Nabil Irawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0878, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0878 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0878 - **State**: PUBLISHED - **Published Date**: August 31, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:03 UTC - **Reserved Date**: August 16, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the login form for LogiSense software including (1) Hawk-i Billing, (2) Hawk-i ASP and (3) DNS Manager allows remote attackers to bypass authentication via SQL code in the password field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020604 sql injection in Logisense software](http://archives.neohapsis.com/archives/bugtraq/2002-06/0010.html) 2. [logisense-sql-injection(9268)](http://www.iss.net/security_center/static/9268.php) 3. [4931](http://www.securityfocus.com/bid/4931)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1554, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1554 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1554 - **State**: PUBLISHED - **Published Date**: March 31, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: March 31, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in VSNS Lemon 3.2.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter while adding a comment. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1015836](http://securitytracker.com/id?1015836) 2. [20060406 [eVuln] VSNS Lemon Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/430345/100/0/threaded) 3. [24212](http://www.osvdb.org/24212) 4. [](http://evuln.com/vulns/106/description.html) 5. [17395](http://www.securityfocus.com/bid/17395) 6. [19420](http://secunia.com/advisories/19420) 7. [vsns-lemon-name-xss(25457)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25457)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1159, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1159 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1159 - **State**: PUBLISHED - **Published Date**: May 01, 2013 at 10:00 UTC - **Last Updated**: September 16, 2024 at 23:35 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Netcool Impact (NCI) web menus in Cisco Prime Central for Hosted Collaboration Solution allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCud56706. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130430 Cisco Prime Central for Hosted Collaboration Solution NCI Web Menus Cross-Site Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1159)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4434 - **State**: PUBLISHED - **Published Date**: August 20, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 14:53 UTC - **Reserved Date**: August 20, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in textfilesearch.asp in the Text File Search ASP (Classic) edition allows remote attackers to inject arbitrary web script or HTML via the query parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.packetstormsecurity.org/0708-exploits/tfsc-xss.txt) 2. [25350](http://www.securityfocus.com/bid/25350) 3. [3046](http://securityreason.com/securityalert/3046) 4. [37733](http://osvdb.org/37733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13083 - **State**: PUBLISHED - **Published Date**: June 30, 2019 at 15:44 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: June 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XnView Classic 2.48 has a User Mode Write AV starting at xnview+0x0000000000384e2a. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/apriorit/pentesting/blob/master/bugs/xnview/0x384e2a.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13110 - **State**: PUBLISHED - **Published Date**: May 16, 2020 at 11:56 UTC - **Last Updated**: August 04, 2024 at 12:11 UTC - **Reserved Date**: May 16, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The kerberos package before 1.0.0 for Node.js allows arbitrary code execution and privilege escalation via injection of malicious DLLs through use of the kerberos_sspi LoadLibrary() method, because of a DLL path search. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.npmjs.com/advisories/1514) 2. [](https://medium.com/%40kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd) 3. [](https://www.op-c.net/2020/05/15/dll-injection-attack-in-kerberos-npm-package/) 4. [](https://www.linkedin.com/posts/op-innovate_dll-injection-attack-in-kerberos-npm-package-activity-6667043749547253760-kVlW)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33257 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 04:43 UTC - **Last Updated**: August 03, 2024 at 08:01 UTC - **Reserved Date**: June 14, 2022 at 10:44 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-367: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AQT1000 (Status: affected) - AR8031 (Status: affected) - AR8035 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - MDM9205 (Status: affected) - QAM8295P (Status: affected) - QCA4004 (Status: affected) - QCA6174A (Status: affected) - QCA6310 (Status: affected) - QCA6335 (Status: affected) - QCA6390 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6564A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCA9377 (Status: affected) - QCA9984 (Status: affected) - QCC5100 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM4325 (Status: affected) - QCM6490 (Status: affected) - QCN6024 (Status: affected) - QCN7606 (Status: affected) - QCN9011 (Status: affected) - QCN9012 (Status: affected) - QCN9024 (Status: affected) - QCS2290 (Status: affected) - QCS405 (Status: affected) - QCS4290 (Status: affected) - QCS603 (Status: affected) - QCS605 (Status: affected) - QCS6490 (Status: affected) - QRB5165 (Status: affected) - QRB5165M (Status: affected) - QRB5165N (Status: affected) - QSM8250 (Status: affected) - QSM8350 (Status: affected) - SA6145P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8295P (Status: affected) - SA8540P (Status: affected) - SA9000P (Status: affected) - SD 675 (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD 8CX (Status: affected) - SD 8cx Gen2 (Status: affected) - SD 8cx Gen3 (Status: affected) - SD460 (Status: affected) - SD480 (Status: affected) - SD662 (Status: affected) - SD665 (Status: affected) - SD670 (Status: affected) - SD675 (Status: affected) - SD678 (Status: affected) - SD680 (Status: affected) - SD690 5G (Status: affected) - SD695 (Status: affected) - SD750G (Status: affected) - SD765 (Status: affected) - SD765G (Status: affected) - SD768G (Status: affected) - SD778G (Status: affected) - SD780G (Status: affected) - SD845 (Status: affected) - SD850 (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SD870 (Status: affected) - SD888 (Status: affected) - SD888 5G (Status: affected) - SDX24 (Status: affected) - SDX50M (Status: affected) - SDX55 (Status: affected) - SDX55M (Status: affected) - SDX57M (Status: affected) - SDX65 (Status: affected) - SDX70M (Status: affected) - SDXR2 5G (Status: affected) - SG4150P (Status: affected) - SM4125 (Status: affected) - SM7250P (Status: affected) - SM7315 (Status: affected) - SM7325P (Status: affected) - Snapdragon 4 Gen 1 (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR1230P (Status: affected) - SXR2150P (Status: affected) - WCD9306 (Status: affected) - WCD9326 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN3991 (Status: affected) - WCN3998 (Status: affected) - WCN3999 (Status: affected) - WCN6740 (Status: affected) - WCN6750 (Status: affected) - WCN6850 (Status: affected) - WCN6851 (Status: affected) - WCN6855 (Status: affected) - WCN6856 (Status: affected) - WCN7850 (Status: affected) - WCN7851 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0783 - **State**: PUBLISHED - **Published Date**: January 22, 2024 at 17:31 UTC - **Last Updated**: May 30, 2025 at 14:22 UTC - **Reserved Date**: January 22, 2024 at 11:15 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Project Worlds Online Admission System 1.0 and classified as critical. This issue affects some unknown processing of the file documents.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251699. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Project Worlds - Online Admission System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.251699) 2. [](https://vuldb.com/?ctiid.251699) 3. [](https://github.com/keru6k/Online-Admission-System-RCE-PoC) 4. [](https://github.com/keru6k/Online-Admission-System-RCE-PoC/blob/main/poc.py) ### Credits - keroomi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8810, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8810 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8810 - **State**: PUBLISHED - **Published Date**: December 24, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 13:26 UTC - **Reserved Date**: November 13, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in ajax/mail_functions.php in the WP Symposium plugin before 14.11 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the tray parameter in a getMailMessage action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://security.szurek.pl/wp-symposium-1410-multiple-xss-and-sql-injection.html) 2. [35505](http://www.exploit-db.com/exploits/35505) 3. [62643](http://secunia.com/advisories/62643) 4. [](http://www.wpsymposium.com/2014/11/release-information-for-v14-11/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21530, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21530 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21530 - **State**: PUBLISHED - **Published Date**: April 30, 2021 at 21:10 UTC - **Last Updated**: September 16, 2024 at 20:42 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell OpenManage Enterprise-Modular (OME-M) versions prior to 1.30.00 contain a security bypass vulnerability. An authenticated malicious user with low privileges may potentially exploit the vulnerability to escape from the restricted environment and gain access to sensitive information in the system, resulting in information disclosure and elevation of privilege. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Dell - OpenManage Enterprise** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000185205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5392, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5392 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5392 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 14:08 UTC - **Last Updated**: August 04, 2024 at 19:54 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A disclosure of information vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us) 2. [](http://packetstormsecurity.com/files/154580/HPE-Intelligent-Management-Center-Information-Disclosure.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7278 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 09:25 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Exploiting incorrectly configured access control security levels vulnerability in ENS Firewall in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 and 10.6.1 April 2020 updates allows remote attackers and local users to allow or block unauthorized traffic via pre-existing rules not being handled correctly when updating to the February 2020 updates. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **McAfee LLC - McAfee Endpoint Security (ENS)** Affected versions: - 10.7.x (Status: affected) - 10.6.x (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10309) ### Credits - McAfee credits EZ for reporting this flaw
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2264 - **State**: PUBLISHED - **Published Date**: May 16, 2008 at 06:54 UTC - **Last Updated**: August 07, 2024 at 08:58 UTC - **Reserved Date**: May 16, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in CyrixMED 1.4 allows remote attackers to inject arbitrary web script or HTML via the msg_erreur parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29153](http://www.securityfocus.com/bid/29153) 2. [cyrixmed-index-xss(42353)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42353)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2318 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:54 UTC - **Last Updated**: September 26, 2024 at 14:08 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Cloud Infrastructure Storage Gateway product of Oracle Storage Gateway (component: Management Console). The supported version that is affected is Prior to 1.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Cloud Infrastructure Storage Gateway. While the vulnerability is in Oracle Cloud Infrastructure Storage Gateway, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Cloud Infrastructure Storage Gateway. Note: Updating the Oracle Cloud Infrastructure Storage Gateway to version 1.4 or later will address these vulnerabilities. Download the latest version of Oracle Cloud Infrastructure Storage Gateway from <a href=" https://www.oracle.com/downloads/cloud/oci-storage-gateway-downloads.html">here. Refer to Document <a href="https://support.oracle.com/rs?type=doc&id=2768897.1">2768897.1 for more details. CVSS 3.1 Base Score 9.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - Cloud Infrastructure** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37575 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 00:00 UTC - **Last Updated**: December 11, 2024 at 15:58 UTC - **Reserved Date**: June 09, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Mister org.mistergroup.shouldianswer application 1.4.264 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the org.mistergroup.shouldianswer.ui.default_dialer.DefaultDialerActivity component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://play.google.com/store/apps/details?id=org.mistergroup.shouldianswer) 2. [](https://github.com/actuator/org.mistergroup.shouldianswer) 3. [](https://github.com/actuator/org.mistergroup.shouldianswer/blob/main/CVE-2024-37575)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000198 - **State**: PUBLISHED - **Published Date**: November 17, 2017 at 02:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: November 16, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tcmu-runner daemon version 0.9.0 to 1.2.0 is vulnerable to invalid memory references in the handler_glfs.so handler resulting in denial of service ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2017:3277](https://access.redhat.com/errata/RHSA-2017:3277) 2. [](https://github.com/open-iscsi/tcmu-runner/commit/61bd03e600d2abf309173e9186f4d465bb1b7157)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9702, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9702 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9702 - **State**: PUBLISHED - **Published Date**: June 01, 2020 at 16:56 UTC - **Last Updated**: August 06, 2024 at 13:55 UTC - **Reserved Date**: March 14, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description system/classes/DbPDO.php in Cmfive through 2015-03-15, when database connectivity malfunctions, allows remote attackers to obtain sensitive information (username and password) via any request, such as a password reset request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.justanotherhacker.com/2016/09/jahx161_-_cmfive_database_credential_disclosure.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1891, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1891 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1891 - **State**: PUBLISHED - **Published Date**: June 12, 2024 at 15:56 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 26, 2024 at 15:14 UTC - **Assigned By**: tenable ### Vulnerability Description A stored cross site scripting vulnerability exists in Tenable Security Center where an authenticated, remote attacker could inject HTML code into a web application scan result page. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Tenable - Security Center** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.tenable.com/security/tns-2024-10) ### Credits - Paweł Bednarz
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2580, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2580 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2580 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 16:32 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.17 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.17 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html) 2. [](https://security.netapp.com/advisory/ntap-20200122-0002/) 3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15854, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15854 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15854 - **State**: PUBLISHED - **Published Date**: January 17, 2020 at 16:41 UTC - **Last Updated**: August 05, 2024 at 01:03 UTC - **Reserved Date**: September 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Maarch RM before 2.5. A privilege escalation vulnerability allows an authenticated user with lowest privileges to give herself highest administration privileges via a crafted PUT request to an unauthorized resource. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://labs.maarch.org/maarch/maarchRM/blob/master/CHANGELOG.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36504, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36504 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36504 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 23:48 UTC - **Last Updated**: August 02, 2024 at 16:45 UTC - **Reserved Date**: June 22, 2023 at 08:38 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in BBS e-Theme BBS e-Popup.This issue affects BBS e-Popup: from n/a through 2.4.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **BBS e-Theme - BBS e-Popup** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/bbs-e-popup/wordpress-bbs-e-popup-plugin-2-4-5-broken-access-control-vulnerability?_s_id=cve) ### Credits - Abdi Pranata (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24263, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24263 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24263 - **State**: PUBLISHED - **Published Date**: March 16, 2021 at 14:42 UTC - **Last Updated**: August 04, 2024 at 15:12 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Portainer 1.24.1 and earlier is affected by an insecure permissions vulnerability that may lead to remote arbitrary code execution. A non-admin user is allowed to spawn new containers with critical capabilities such as SYS_MODULE, which can be used to take over the Docker host. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/portainer/portainer/issues/4105)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0259, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0259 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0259 - **State**: PUBLISHED - **Published Date**: January 15, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in _mg/php/mg_thumbs.php in minimal Gallery 0.8 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) thumbcat and (2) thumb parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27265](http://www.securityfocus.com/bid/27265) 2. [4902](https://www.exploit-db.com/exploits/4902) 3. [minimalgallery-mgthumbs-file-include(39649)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39649) 4. [28391](http://secunia.com/advisories/28391)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5245, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5245 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5245 - **State**: PUBLISHED - **Published Date**: February 24, 2020 at 17:35 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2. ### CVSS Metrics - **CVSS Base Score**: 7.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **dropwizard - dropwizard-validation** Affected versions: - >= 1.3.0, < 1.3.19 (Status: affected) - >= 2.0.0, < 2.0.2 (Status: affected) ### References 1. [https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf](https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf) 2. [https://github.com/dropwizard/dropwizard/pull/3157](https://github.com/dropwizard/dropwizard/pull/3157) 3. [https://github.com/dropwizard/dropwizard/pull/3160](https://github.com/dropwizard/dropwizard/pull/3160) 4. [https://github.com/dropwizard/dropwizard/commit/28479f743a9d0aab6d0e963fc07f3dd98e8c8236](https://github.com/dropwizard/dropwizard/commit/28479f743a9d0aab6d0e963fc07f3dd98e8c8236) 5. [https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634](https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634) 6. [https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation](https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation) 7. [https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) 8. [https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm](https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1367, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1367 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1367 - **State**: PUBLISHED - **Published Date**: July 13, 2018 at 16:00 UTC - **Last Updated**: September 17, 2024 at 01:11 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Identity Governance and Intelligence Virtual Appliance 5.2 through 5.2.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 126860. ### Affected Products **IBM - Security Identity Governance and Intelligence** Affected versions: - 5.2 (Status: affected) - 5.2.1 (Status: affected) - 5.2.2 (Status: affected) - 5.2.2.1 (Status: affected) - 5.2.3 (Status: affected) - 5.2.3.1 (Status: affected) - 5.2.3.2 (Status: affected) ### References 1. [ibm-sig-cve20171367-info-disc(126860)](https://exchange.xforce.ibmcloud.com/vulnerabilities/126860) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22016869)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0325, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0325 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0325 - **State**: PUBLISHED - **Published Date**: February 10, 2021 at 16:50 UTC - **Last Updated**: August 03, 2024 at 15:39 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784 ### Affected Products **n/a - Android** Affected versions: - Android-8.1 Android-9 Android-10 Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-02-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4207, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4207 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4207 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [91716](http://www.securityfocus.com/bid/91716) 2. [1036281](http://www.securitytracker.com/id/1036281) 3. [40099](https://www.exploit-db.com/exploits/40099/) 4. [](https://helpx.adobe.com/security/products/acrobat/apsb16-26.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35548, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35548 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35548 - **State**: PUBLISHED - **Published Date**: May 28, 2024 at 20:25 UTC - **Last Updated**: February 13, 2025 at 15:58 UTC - **Reserved Date**: May 17, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL injection vulnerability in Mybatis plus versions below 3.5.6 allows remote attackers to obtain database information via a Boolean blind injection. NOTE: the vendor's position is that this can only occur in a misconfigured application; the documentation discusses how to develop applications that avoid SQL injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/baomidou/mybatis-plus/issues/6167) 2. [](https://baomidou.com/reference/about-cve/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40023 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 17:57 UTC - **Last Updated**: August 04, 2024 at 02:27 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. ### Affected Products **Huawei - EMUI** Affected versions: - 12.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/9/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38680, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38680 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38680 - **State**: PUBLISHED - **Published Date**: July 20, 2024 at 07:46 UTC - **Last Updated**: August 02, 2024 at 04:19 UTC - **Reserved Date**: June 19, 2024 at 11:15 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Appmaker Appmaker – Convert WooCommerce to Android & iOS Native Mobile Apps allows Reflected XSS.This issue affects Appmaker – Convert WooCommerce to Android & iOS Native Mobile Apps: from n/a through 1.36.12. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Appmaker - Appmaker – Convert WooCommerce to Android & iOS Native Mobile Apps** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/appmaker-woocommerce-mobile-app-manager/wordpress-appmaker-plugin-1-36-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Dimas Maulana (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24608 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 08:24 UTC - **Last Updated**: January 31, 2025 at 19:31 UTC - **Reserved Date**: January 23, 2025 at 14:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Milan Petrovic GD Mail Queue allows Reflected XSS. This issue affects GD Mail Queue: from n/a through 4.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Milan Petrovic - GD Mail Queue** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/gd-mail-queue/vulnerability/wordpress-gd-mail-queue-plugin-4-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16607 - **State**: PUBLISHED - **Published Date**: January 23, 2018 at 01:00 UTC - **Last Updated**: August 05, 2024 at 20:27 UTC - **Reserved Date**: November 06, 2017 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within heapdumps.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to download heap memory dump. An attacker can leverage this in conjunction with other vulnerabilities to disclose sensitive information in the context of the current process. Was ZDI-CAN-4718. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **NetGain Systems - NetGain Systems Enterprise Manager** Affected versions: - v7.2.586 build 877 (Status: affected) ### References 1. [102219](http://www.securityfocus.com/bid/102219) 2. [](https://zerodayinitiative.com/advisories/ZDI-17-949) 3. [](https://www.tenable.com/security/research/tra-2018-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0886, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0886 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0886 - **State**: PUBLISHED - **Published Date**: February 08, 2011 at 21:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface on the SMC SMCD3G-CCR (aka Comcast Business Gateway) with firmware before 1.4.0.49.2 allow remote attackers to (1) hijack the intranet connectivity of arbitrary users for requests that perform a login via goform/login, or hijack the authentication of administrators for requests that (2) enable external logins via an mso_remote_enable action to goform/RemoteRange or (3) change DNS settings via a manual_dns_enable action to goform/Basic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20110204 TWSL2011-002:Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR)](http://seclists.org/bugtraq/2011/Feb/36) 2. [smcd3gccr-interface-csrf(65185)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65185) 3. [43199](http://secunia.com/advisories/43199) 4. [8068](http://securityreason.com/securityalert/8068) 5. [46215](http://www.securityfocus.com/bid/46215) 6. [16123](http://www.exploit-db.com/exploits/16123/) 7. [20110205 TWSL2011-002:Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR)](http://www.securityfocus.com/archive/1/516205/100/0/threaded) 8. [](https://www.trustwave.com/spiderlabs/advisories/TWSL2011-002.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9757 - **State**: PUBLISHED - **Published Date**: June 19, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 19, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IPFire 2.19 has a Remote Command Injection vulnerability in ids.cgi via the OINKCODE parameter, which is mishandled by a shell. This can be exploited directly by authenticated users, or through CSRF. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42149](https://www.exploit-db.com/exploits/42149/) 2. [](https://twitter.com/0x09AL/status/873860385652256768) 3. [99173](http://www.securityfocus.com/bid/99173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35123, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35123 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35123 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 10:11 UTC - **Last Updated**: August 04, 2024 at 00:33 UTC - **Reserved Date**: June 21, 2021 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Buffer copy in GATT multi notification due to improper length check for the data coming over-the-air in Snapdragon Connectivity, Snapdragon Industrial IOT ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Connectivity, Snapdragon Industrial IOT** Affected versions: - AQT1000, QCA6390, QCA6391, SD 8 Gen1 5G, SD480, SD660, SD778G, SD780G, SD855, SD865 5G, SD870, SD888 5G, SDX55M, SM6375, SM7325P, WCD9335, WCD9370, WCD9375, WCD9380, WCD9385, WCN3980, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8830, WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27644, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27644 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27644 - **State**: PUBLISHED - **Published Date**: March 29, 2023 at 00:00 UTC - **Last Updated**: February 18, 2025 at 17:48 UTC - **Reserved Date**: March 22, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15797. ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **NETGEAR - R6700v3** Affected versions: - 1.0.4.120_10.0.91 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-520/) 2. [](https://kb.netgear.com/000064721/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0324) ### Credits - Kevin Denis (@0xmitsurugi) and Antide Petit (@xarkes_) from @Synacktiv
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42475 - **State**: PUBLISHED - **Published Date**: August 15, 2024 at 18:40 UTC - **Last Updated**: August 19, 2024 at 19:23 UTC - **Reserved Date**: August 02, 2024 at 14:13 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In the OAuth library for nim prior to version 0.11, the `state` values generated by the `generateState` function do not have sufficient entropy. These can be successfully guessed by an attacker allowing them to perform a CSRF vs a user, associating the user's session with the attacker's protected resources. While `state` isn't exactly a cryptographic value, it should be generated in a cryptographically secure way. `generateState` should be using a CSPRNG. Version 0.11 modifies the `generateState` function to generate `state` values of at least 128 bits of entropy while using a CSPRNG. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-330: Security Weakness - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **CORDEA - oauth** Affected versions: - < 0.11 (Status: affected) ### References 1. [https://github.com/CORDEA/oauth/security/advisories/GHSA-332c-q46h-fg8f](https://github.com/CORDEA/oauth/security/advisories/GHSA-332c-q46h-fg8f) 2. [https://github.com/CORDEA/oauth/blob/b8c163b0d9cfad6d29ce8c1fb394e5f47182ee1c/src/oauth2.nim#L179](https://github.com/CORDEA/oauth/blob/b8c163b0d9cfad6d29ce8c1fb394e5f47182ee1c/src/oauth2.nim#L179)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25679, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25679 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25679 - **State**: PUBLISHED - **Published Date**: November 15, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 15:50 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Denial of service in video due to improper access control in broadcast receivers in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables** Affected versions: - AQT1000 (Status: affected) - QCA6390 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6430 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM6490 (Status: affected) - QCN7606 (Status: affected) - QCS2290 (Status: affected) - QCS4290 (Status: affected) - QCS6490 (Status: affected) - SD 675 (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD460 (Status: affected) - SD480 (Status: affected) - SD662 (Status: affected) - SD665 (Status: affected) - SD675 (Status: affected) - SD678 (Status: affected) - SD680 (Status: affected) - SD690 5G (Status: affected) - SD695 (Status: affected) - SD720G (Status: affected) - SD730 (Status: affected) - SD765 (Status: affected) - SD765G (Status: affected) - SD768G (Status: affected) - SD778G (Status: affected) - SD780G (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SD870 (Status: affected) - SD888 (Status: affected) - SD888 5G (Status: affected) - SDX55M (Status: affected) - SM4375 (Status: affected) - SM6250 (Status: affected) - SM7250P (Status: affected) - SM7315 (Status: affected) - SM7325P (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR2150P (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN3660B (Status: affected) - WCN3680B (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3991 (Status: affected) - WCN3998 (Status: affected) - WCN6740 (Status: affected) - WCN6750 (Status: affected) - WCN6850 (Status: affected) - WCN6851 (Status: affected) - WCN6855 (Status: affected) - WCN6856 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0370 - **State**: PUBLISHED - **Published Date**: January 27, 2022 at 05:55 UTC - **Last Updated**: August 02, 2024 at 23:25 UTC - **Reserved Date**: January 26, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **livehelperchat - livehelperchat/livehelperchat** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca) 2. [](https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4252 - **State**: PUBLISHED - **Published Date**: July 10, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence ISDN Gateway devices with software 2.2(1.106) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90724. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032838](http://www.securitytracker.com/id/1032838) 2. [20150709 Cisco TelePresence ISDN Gateway Software Cross-Site Request Forgery Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39795)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20181 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 13:21 UTC - **Last Updated**: August 03, 2024 at 02:02 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5210 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 21:28 UTC - **Last Updated**: August 02, 2024 at 07:52 UTC - **Reserved Date**: September 26, 2023 at 19:24 UTC - **Assigned By**: WPScan ### Vulnerability Description The AMP+ Plus WordPress plugin through 3.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - AMP+ Plus** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1c3ff47a-12a5-49c1-a166-2c57e5c0d0aa) ### Credits - Nicolas Surribas - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26635 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 17:23 UTC - **Last Updated**: June 04, 2025 at 17:52 UTC - **Reserved Date**: February 12, 2025 at 19:23 UTC - **Assigned By**: microsoft ### Vulnerability Description Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-1390: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19044.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) ### References 1. [Windows Hello Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0015 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:27 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Teardrop IP denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:5579](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1332 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: January 08, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22117, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22117 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22117 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 21:03 UTC - **Last Updated**: September 13, 2024 at 15:55 UTC - **Reserved Date**: December 17, 2022 at 19:26 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - FLEXCUBE Universal Banking** Affected versions: - 12.3 (Status: affected) - 12.4 (Status: affected) - 14.0 (Status: affected) - 14.5 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3131 - **State**: PUBLISHED - **Published Date**: August 26, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 02:55 UTC - **Reserved Date**: August 26, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [41095](http://secunia.com/advisories/41095) 2. [SUSE-SA:2010:049](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html) 3. [14783](http://www.exploit-db.com/exploits/14783) 4. [20100824 Firefox <= 3.6.8 DLL Hijacking Exploit [dwmapi.dll]](http://www.securityfocus.com/archive/1/513324/100/0/threaded) 5. [ADV-2010-2201](http://www.vupen.com/english/advisories/2010/2201) 6. [14730](http://www.exploit-db.com/exploits/14730) 7. [](http://www.mozilla.org/security/announce/2010/mfsa2010-52.html) 8. [ADV-2010-2169](http://www.vupen.com/english/advisories/2010/2169) 9. [ADV-2010-2323](http://www.vupen.com/english/advisories/2010/2323) 10. [oval:org.mitre.oval:def:12143](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12143) 11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=579593) 12. [41168](http://secunia.com/advisories/41168)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15928, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15928 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15928 - **State**: PUBLISHED - **Published Date**: October 27, 2017 at 17:00 UTC - **Last Updated**: September 16, 2024 at 18:14 UTC - **Reserved Date**: October 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ohler55/ox/issues/194) 2. [](https://rubygems.org/gems/ox/versions/2.8.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29100, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29100 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29100 - **State**: PUBLISHED - **Published Date**: May 05, 2021 at 15:16 UTC - **Last Updated**: April 10, 2025 at 15:21 UTC - **Reserved Date**: March 23, 2021 at 00:00 UTC - **Assigned By**: Esri ### Vulnerability Description A path traversal vulnerability exists in Esri ArcGIS Earth versions 1.11.0 and below which allows arbitrary file creation on an affected system through crafted input. An attacker could exploit this vulnerability to gain arbitrary code execution under security context of the user running ArcGIS Earth by inducing the user to upload a crafted file to an affected system. ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **Esri - ArcGIS Earth** Affected versions: - 1.11 (Status: affected) ### References 1. [](https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27927 - **State**: PUBLISHED - **Published Date**: April 15, 2025 at 21:43 UTC - **Last Updated**: April 16, 2025 at 14:41 UTC - **Reserved Date**: April 01, 2025 at 17:19 UTC - **Assigned By**: icscert ### Vulnerability Description An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Growatt - Cloud portal** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04) ### Credits - Forescout Technologies reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46357 - **State**: PUBLISHED - **Published Date**: January 27, 2023 at 23:22 UTC - **Last Updated**: March 28, 2025 at 15:50 UTC - **Reserved Date**: November 30, 2022 at 17:48 UTC - **Assigned By**: hp ### Vulnerability Description Potential vulnerabilities have been identified in HP Security Manager which may allow escalation of privilege, arbitrary code execution, and information disclosure. ### Affected Products **HP Inc. - HP Security Manager** Affected versions: - See HP Security Bulletin reference for affected versions. (Status: affected) ### References 1. [](https://support.hp.com/us-en/document/ish_7334353-7334378-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35188 - **State**: REJECTED - **Published Date**: December 17, 2020 at 01:17 UTC - **Last Updated**: January 04, 2021 at 17:03 UTC - **Reserved Date**: December 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1501 - **State**: PUBLISHED - **Published Date**: May 11, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 11, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MidiCart PHP Shopping Cart allows remote attackers to obtain sensitive information via a direct request to (1) search_list.php, (2) item_list.php, or (3) item_show.php, which reveal the path in a PHP error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [16172](http://www.osvdb.org/16172) 2. [](http://www.hackgen.org/advisories/hackgen-2005-004.txt) 3. [midicart-path-disclosure(20425)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20425) 4. [20050505 [hackgen-2005-#004] - Multiple bugs in MidiCart PHP Shopping Cart](http://marc.info/?l=bugtraq&m=111533057918993&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17915, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17915 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17915 - **State**: PUBLISHED - **Published Date**: December 26, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:06 UTC - **Reserved Date**: December 26, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based buffer over-read in ReadMNGImage in coders/png.c, related to accessing one byte before testing whether a limit has been reached. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/graphicsmagick/bugs/535/) 2. [DSA-4321](https://www.debian.org/security/2018/dsa-4321) 3. [[debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html) 4. [](http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/1721f1b7e67a) 5. [[debian-lts-announce] 20180108 [SECURITY] [DLA 1231-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html) 6. [USN-4266-1](https://usn.ubuntu.com/4266-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8845 - **State**: PUBLISHED - **Published Date**: May 08, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 16:48 UTC - **Reserved Date**: May 08, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The lzo1x_decompress function in lzo1x_d.ch in LZO 2.08, as used in lrzip 0.631, allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted archive. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.gentoo.org/ago/2017/05/07/lrzip-invalid-memory-read-in-lzo_decompress_buf-stream-c/) 2. [](https://github.com/ckolivas/lrzip/issues/68) 3. [GLSA-202005-01](https://security.gentoo.org/glsa/202005-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1399 - **State**: PUBLISHED - **Published Date**: February 12, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:53 UTC - **Reserved Date**: February 12, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the Attachment module 2.3.10 and earlier for phpBB allows remote attackers to read arbitrary files via a .. (dot dot) in the filename. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041214 phpBB Attachment Mod Directory Traversal HTTP POST Injection](http://marc.info/?l=bugtraq&m=110304269031484&w=2) 2. [13421](http://secunia.com/advisories/13421/) 3. [attachment-mod-directory-traversal(18437)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18437) 4. [11893](http://www.securityfocus.com/bid/11893)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1794 - **State**: PUBLISHED - **Published Date**: December 26, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 20, 2011 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Integer overflow in the FilterEffect::copyImageBytes function in platform/graphics/filters/FilterEffect.cpp in the SVG filter implementation in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted dimensions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://crbug.com/78327) 2. [](http://trac.webkit.org/changeset/84422) 3. [](http://launchpad.net/bugs/778822)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27315 - **State**: PUBLISHED - **Published Date**: October 12, 2023 at 13:56 UTC - **Last Updated**: September 18, 2024 at 16:33 UTC - **Reserved Date**: February 28, 2023 at 17:20 UTC - **Assigned By**: netapp ### Vulnerability Description SnapGathers versions prior to 4.9 are susceptible to a vulnerability which could allow a local authenticated attacker to discover plaintext domain user credentials ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-256: Security Weakness ### Affected Products **NetApp - SnapGathers ** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.netapp.com/advisory/ntap-20231009-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46965 - **State**: PUBLISHED - **Published Date**: November 11, 2024 at 00:00 UTC - **Last Updated**: November 12, 2024 at 16:14 UTC - **Reserved Date**: September 16, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The DS allvideo.downloader.browser (aka Fast Video Downloader: Browser) application through 1.6-RC1 for Android allows an attacker to execute arbitrary JavaScript code via the allvideo.downloader.browser.DefaultBrowserActivity component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://play.google.com/store/apps/details?id=allvideo.downloader.browser) 2. [](https://github.com/actuator/allvideo.downloader.browser/blob/main/CVE-2024-46965)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1998 - **State**: PUBLISHED - **Published Date**: June 09, 2022 at 14:46 UTC - **Last Updated**: August 03, 2024 at 00:24 UTC - **Reserved Date**: June 06, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **n/a - Kernel** Affected versions: - Linux kernel 5.17-rc3 (Status: affected) ### References 1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d) 2. [](https://seclists.org/oss-sec/2022/q1/99) 3. [](https://security.netapp.com/advisory/ntap-20220707-0009/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45929, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45929 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45929 - **State**: PUBLISHED - **Published Date**: March 27, 2024 at 00:00 UTC - **Last Updated**: November 06, 2024 at 15:12 UTC - **Reserved Date**: October 16, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description S-Lang 2.3.2 was discovered to contain a segmentation fault via the function fixup_tgetstr(). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://lists.jedsoft.org/lists/slang-users/2023/0000002.html) 2. [](http://seclists.org/fulldisclosure/2024/Jan/57)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3253, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3253 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3253 - **State**: PUBLISHED - **Published Date**: October 14, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 20:07 UTC - **Reserved Date**: August 19, 2011 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2011-10-12-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html) 2. [](http://support.apple.com/kb/HT4999)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41168 - **State**: PUBLISHED - **Published Date**: October 11, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 12:35 UTC - **Reserved Date**: September 21, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Due to lack of proper memory management, when a victim opens a manipulated CATIA5 Part (.catpart, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. ### Weakness Classification (CWE) - CWE-119: Security Weakness - CWE-787: Out-of-bounds Write ### Affected Products **SAP SE - SAP 3D Visual Enterprise Author** Affected versions: - 9 (Status: affected) ### References 1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) 2. [](https://launchpad.support.sap.com/#/notes/3245929)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4703 - **State**: PUBLISHED - **Published Date**: February 01, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 23:53 UTC - **Reserved Date**: February 01, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Apache Tomcat 4.0.3, when running on Windows, allows remote attackers to obtain sensitive information via a request for a file that contains an MS-DOS device name such as lpt9, which leaks the pathname in an error message, as demonstrated by lpt9.xtp using Nikto. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tomcat.apache.org/security-4.html) 2. [20033](http://www.osvdb.org/20033) 3. [tomcat-msdos-path-disclosure(42914)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42914) 4. [28484](http://www.securityfocus.com/bid/28484) 5. [](http://osvdb.org/ref/20/20033-tomcat-dos-path_disclosure.txt) 6. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E) 7. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E) 8. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E)