System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3432, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3432
- **State**: PUBLISHED
- **Published Date**: September 19, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Pydio (formerly AjaXplorer) before 6.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Pydio XSS Vulnerabilities."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pydio.com/en/community/releases/pydio-core/pydio-607-security-release)
2. [74596](http://www.securityfocus.com/bid/74596) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2470
- **State**: PUBLISHED
- **Published Date**: May 30, 2023 at 07:49 UTC
- **Last Updated**: January 10, 2025 at 17:37 UTC
- **Reserved Date**: May 02, 2023 at 09:06 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Add to Feedly**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04)
### Credits
- Fioravante Souza (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6552
- **State**: PUBLISHED
- **Published Date**: October 15, 2014 at 22:03 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 11.1.1.5, 11.1.1.7, 11.1.2.1, and 11.1.2.2 allows remote attackers to affect integrity via unknown vectors related to Admin Console.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [61767](http://secunia.com/advisories/61767)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
3. [70452](http://www.securityfocus.com/bid/70452) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1360
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in Scanner Access Now Easy (SANE) before 1.0.5, related to pnm and saned.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp.mostang.com/pub/sane/sane-1.0.8/sane-backends-1.0.8.tar.gz)
2. [20010719 [VulnWatch] Changelog maddness (14 various broken apps)](http://archives.neohapsis.com/archives/vulnwatch/2001-q3/0005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14265
- **State**: PUBLISHED
- **Published Date**: September 11, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LibRaw/LibRaw/issues/99) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41066
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 20:12 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 22, 2023 at 18:10 UTC
- **Assigned By**: apple
### Vulnerability Description
An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to unexpectedly leak a user's credentials from secure text fields.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213940)
2. [](http://seclists.org/fulldisclosure/2023/Oct/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37541
- **State**: PUBLISHED
- **Published Date**: August 06, 2021 at 13:21 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23592
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:29 UTC
- **Last Updated**: January 22, 2025 at 19:51 UTC
- **Reserved Date**: January 16, 2025 at 11:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound dForms allows Reflected XSS. This issue affects dForms: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - dForms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/dforms/vulnerability/wordpress-dforms-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25226
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 16:20 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 15, 2022 at 00:00 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
### Affected Products
**n/a - ThinVNC**
Affected versions:
- 1.0b1 (Status: affected)
### References
1. [](https://fluidattacks.com/advisories/sinatra/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4095
- **State**: PUBLISHED
- **Published Date**: September 10, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 12, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4087, CVE-2014-4096, and CVE-2014-4101.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69604](http://www.securityfocus.com/bid/69604)
2. [1030818](http://www.securitytracker.com/id/1030818)
3. [MS14-052](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052)
4. [ms-ie-cve20144095-code-exec(95525)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95525) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24257
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 03, 2025 at 13:17 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to cause unexpected system termination or write kernel memory.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122371)
2. [](https://support.apple.com/en-us/122373)
3. [](https://support.apple.com/en-us/122378) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3750
- **State**: PUBLISHED
- **Published Date**: May 16, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Bilyoner application before 2.3.1 for Android and before 4.6.2 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sceptive.com/p/bilyoner-mobile-apps-prone-to-various-ssltls-attacks) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16258
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 21:39 UTC
- **Last Updated**: April 09, 2025 at 13:44 UTC
- **Reserved Date**: October 31, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_sx, at 0x9d014f7c, the value for the `cmd4` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Insteon - Hub**
Affected versions:
- Not specified (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2712
- **State**: PUBLISHED
- **Published Date**: January 27, 2023 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 18:48 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**The Eclipse Foundation - Eclipse GlassFish**
Affected versions:
- 5.1.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://bugs.eclipse.org/580502) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6630
- **State**: PUBLISHED
- **Published Date**: December 08, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 21, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to read screenshots and consequently gain privileges via a crafted application, aka internal bug 19121797.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2015-12-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45827
- **State**: PUBLISHED
- **Published Date**: June 12, 2023 at 12:44 UTC
- **Last Updated**: November 01, 2024 at 14:02 UTC
- **Reserved Date**: November 23, 2022 at 07:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GalleryPlugins Video Contest plugin <= 3.2 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GalleryPlugins - Video Contest**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/video-contest/wordpress-video-contest-wordpress-plugin-plugin-3-2-cross-site-scripting-xss?_s_id=cve)
### Credits
- Cat (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9590
- **State**: PUBLISHED
- **Published Date**: April 26, 2018 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 02:59 UTC
- **Reserved Date**: November 23, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
puppet-swift before versions 8.2.1, 9.4.4 is vulnerable to an information-disclosure in Red Hat OpenStack Platform director's installation of Object Storage (swift). During installation, the Puppet script responsible for deploying the service incorrectly removes and recreates the proxy-server.conf file with world-readable permissions.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**unspecified - puppet-swift**
Affected versions:
- puppet-swift 8.2.1 (Status: affected)
- puppet-swift 9.4.4 (Status: affected)
### References
1. [RHSA-2017:0359](http://rhn.redhat.com/errata/RHSA-2017-0359.html)
2. [95448](http://www.securityfocus.com/bid/95448)
3. [RHSA-2017:0361](http://rhn.redhat.com/errata/RHSA-2017-0361.html)
4. [RHSA-2017:0200](http://rhn.redhat.com/errata/RHSA-2017-0200.html)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30284
- **State**: PUBLISHED
- **Published Date**: November 12, 2021 at 06:16 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 07, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8096AU, AQT1000, AR6003, CSR6030, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9150, MDM9205, MDM9206, MDM9207, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9607, MDM9615, MDM9615M, MDM9625, MDM9628, MDM9630, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8976SG, MSM8996AU, QCA4004, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6390, QCA6391, QCA6420, QCA6430, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595AU, QCA6694, QCA6694AU, QCA9367, QCA9377, QCA9379, QCM6490, QCS6490, QET4101, QSW8573, SD 636, SD 675, SD205, SD210, SD429, SD439, SD450, SD460, SD480, SD660, SD662, SD665, SD675, SD678, SD690 5G, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD820, SD821, SD835, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM630, SDM830, SDW2500, SDX12, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM6225, SM6250, SM6375, SM7250, SM7325, WCD9306, WCD9326, W ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47779
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 16:54 UTC
- **Last Updated**: May 22, 2025 at 17:26 UTC
- **Reserved Date**: May 09, 2025 at 19:49 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-140: Security Weakness
- CWE-792: Cross-site Scripting (XSS)
### Affected Products
**asterisk - asterisk**
Affected versions:
- < 18.9-cert14 (Status: affected)
- >= 18.10, < 18.26.2 (Status: affected)
- >= 20.0, < 20.7-cert5 (Status: affected)
- >= 20.8, < 20.14.1 (Status: affected)
- >= 21.0, < 21.9.1 (Status: affected)
- >= 22.0, < 22.4.1 (Status: affected)
### References
1. [https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw](https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw)
2. [https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample](https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20575
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 18:29 UTC
- **Last Updated**: November 27, 2024 at 16:01 UTC
- **Reserved Date**: October 27, 2022 at 18:53 UTC
- **Assigned By**: AMD
### Vulnerability Description
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
### Affected Products
**AMD - 1st Gen AMD EPYC™ Processors**
Affected versions:
- various (Status: affected)
**AMD - 2nd Gen AMD EPYC™ Processors**
Affected versions:
- various (Status: affected)
**AMD - 3rd Gen AMD EPYC™ Processors**
Affected versions:
- various (Status: affected)
**AMD - 4th Gen AMD EPYC™ Processors**
Affected versions:
- Various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19142
- **State**: PUBLISHED
- **Published Date**: December 10, 2020 at 21:07 UTC
- **Last Updated**: August 04, 2024 at 14:08 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iCMS 7 attackers to execute arbitrary OS commands via shell metacharacters in the DB_PREFIX parameter to install/install.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/idreamsoft/iCMS/issues/65) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39205
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:30 UTC
- **Last Updated**: April 22, 2025 at 17:22 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Onedev is an open source, self-hosted Git Server with CI/CD and Kanban. In versions of Onedev prior to 7.3.0 unauthenticated users can take over a OneDev instance if there is no properly configured reverse proxy. The /git-prereceive-callback endpoint is used by the pre-receive git hook on the server to check for branch protections during a push event. It is only intended to be accessed from localhost, but the check relies on the X-Forwarded-For header. Invoking this endpoint leads to the execution of one of various git commands. The environment variables of this command execution can be controlled via query parameters. This allows attackers to write to arbitrary files, which can in turn lead to the execution of arbitrary code. Such an attack would be very hard to detect, which increases the potential impact even more. Users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**theonedev - onedev**
Affected versions:
- < 7.3.0 (Status: affected)
### References
1. [](https://github.com/theonedev/onedev/security/advisories/GHSA-4f9h-h82c-4xm2)
2. [](https://github.com/theonedev/onedev/commit/f1e97688e4e19d6de1dfa1d00e04655209d39f8e)
3. [](https://github.com/theonedev/onedev/releases/tag/v7.3.0)
4. [](https://blog.sonarsource.com/onedev-remote-code-execution/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1553
- **State**: PUBLISHED
- **Published Date**: May 13, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 26, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid MaxAge parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT010098](http://marc.info/?l=bugtraq&m=127360750704351&w=2)
2. [](http://zerodayinitiative.com/advisories/ZDI-10-084/)
3. [SSRT090228](http://marc.info/?l=bugtraq&m=127360750704351&w=2)
4. [HPSBMA02527](http://marc.info/?l=bugtraq&m=127360750704351&w=2)
5. [20100511 ZDI-10-084: HP OpenView NNM getnnmdata.exe CGI Invalid MaxAge Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/511241/100/0/threaded)
6. [8153](http://securityreason.com/securityalert/8153) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4433
- **State**: REJECTED
- **Published Date**: December 11, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 22:14 UTC
- **Reserved Date**: November 10, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23539, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23539
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 14:36 UTC
- **Last Updated**: February 13, 2025 at 17:39 UTC
- **Reserved Date**: January 18, 2024 at 05:12 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract: <1.8.5.
Users are recommended to upgrade to version 1.8.5 or 1.9.0, which fix the issue.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Apache Software Foundation - Apache Fineract**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cwiki.apache.org/confluence/display/FINERACT/Apache+Fineract+Security+Report)
2. [](https://lists.apache.org/thread/g8sv1gnjv716lx2h89jbvjdgtrrjmy7h)
3. [](http://www.openwall.com/lists/oss-security/2024/03/29/3)
### Credits
- Yash Sancheti of GH Solutions Consultants |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44735
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 12:56 UTC
- **Last Updated**: February 19, 2025 at 21:33 UTC
- **Reserved Date**: November 04, 2022 at 16:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gus Sevilla WP Clictracker plugin <= 1.0.5 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Gus Sevilla - WP Clictracker**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/clictracker/wordpress-clictracker-plugin-1-0-5-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- sk4rl1ghT (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7922, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7922 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7922
- **State**: REJECTED
- **Published Date**: March 16, 2017 at 15:00 UTC
- **Last Updated**: March 16, 2017 at 14:57 UTC
- **Reserved Date**: October 22, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3800
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:20 UTC
- **Reserved Date**: November 01, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in IBAX go-ibax. Affected by this issue is some unknown functionality of the file /api/v2/open/rowsInfo. The manipulation of the argument table_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212636.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-707: Security Weakness
### Affected Products
**IBAX - go-ibax**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/IBAX-io/go-ibax/issues/2061)
2. [](https://vuldb.com/?id.212636) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2842
- **State**: PUBLISHED
- **Published Date**: April 15, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Juniper ScreenOS 6.3 and earlier allows remote attackers to cause a denial of service (crash and restart or failover) via a malformed SSL/TLS packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#480428](http://www.kb.cert.org/vuls/id/480428)
2. [](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10624)
3. [66802](http://www.securityfocus.com/bid/66802)
4. [57910](http://secunia.com/advisories/57910)
5. [1030564](http://www.securitytracker.com/id/1030564) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6960
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 17:09 UTC
- **Last Updated**: April 10, 2025 at 20:27 UTC
- **Reserved Date**: December 19, 2023 at 19:28 UTC
- **Assigned By**: certcc
### Vulnerability Description
TTLock App virtual keys and settings are only deleted client side, and if preserved, can access the lock after intended deletion.
### Affected Products
**Sciener - TTLock App**
Affected versions:
- 6.4.5 (Status: affected)
### References
1. [](https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3163
- **State**: PUBLISHED
- **Published Date**: October 06, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 18:59 UTC
- **Reserved Date**: October 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Polipo 0.9.8 and earlier allows attackers to read files outside of the web root.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.pps.jussieu.fr/~jch/software/polipo/CHANGES.text)
2. [14970](http://www.securityfocus.com/bid/14970) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21504
- **State**: PUBLISHED
- **Published Date**: March 19, 2024 at 05:00 UTC
- **Last Updated**: August 27, 2024 at 20:55 UTC
- **Reserved Date**: December 22, 2023 at 12:33 UTC
- **Assigned By**: snyk
### Vulnerability Description
Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the context of the user's browser session by crafting a malicious link and convincing the user to click on it.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P`
### Affected Products
**n/a - livewire/livewire**
Affected versions:
- 3.3.5 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222)
2. [](https://github.com/livewire/livewire/releases/tag/v3.4.9)
3. [](https://github.com/livewire/livewire/pull/8117)
4. [](https://github.com/livewire/livewire/commit/c65b3f0798ab2c9338213ede3588c3cdf4e6fcc0)
### Credits
- Dan Harrin |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46708
- **State**: REJECTED
- **Last Updated**: May 08, 2023 at 00:00 UTC
- **Reserved Date**: December 07, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29134
- **State**: PUBLISHED
- **Published Date**: March 19, 2024 at 13:52 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 17, 2024 at 16:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Tourfic allows Stored XSS.This issue affects Tourfic: from n/a through 2.11.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Themefic - Tourfic**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54404
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:13 UTC
- **Last Updated**: December 16, 2024 at 19:59 UTC
- **Reserved Date**: December 02, 2024 at 12:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan MDC Comment Toolbar allows Stored XSS.This issue affects MDC Comment Toolbar: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Nazmul Ahsan - MDC Comment Toolbar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mdc-comment-toolbar/vulnerability/wordpress-mdc-comment-toolbar-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1793
- **State**: PUBLISHED
- **Published Date**: April 02, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: April 02, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-1192](http://www.vupen.com/english/advisories/2007/1192)
2. [](http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php)
3. [20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability](http://www.securityfocus.com/archive/1/464456/100/0/threaded)
4. [1021386](http://www.securitytracker.com/id?1021386)
5. [1017837](http://www.securitytracker.com/id?1017837)
6. [23241](http://www.securityfocus.com/bid/23241)
7. [1021388](http://www.securitytracker.com/id?1021388)
8. [1021389](http://www.securitytracker.com/id?1021389)
9. [](http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php)
10. [](http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html)
11. [symantec-firewall-ssdt-dos(33352)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33352)
12. [](http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php)
13. [34692](http://osvdb.org/34692)
14. [1017838](http://www.securitytracker.com/id?1017838)
15. [1021387](http://www.securitytracker.com/id?1021387)
16. [24677](http://secunia.com/advisories/24677)
17. [20070918 Plague in (security) software drivers & BSDOhook utility](http://www.securityfocus.com/archive/1/479830/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4466
- **State**: PUBLISHED
- **Published Date**: April 25, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20121002 CVE Request: Ruby safe level bypasses](http://www.openwall.com/lists/oss-security/2012/10/02/4)
2. [MDVSA-2013:124](http://www.mandriva.com/security/advisories?name=MDVSA-2013:124)
3. [[oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses](http://www.openwall.com/lists/oss-security/2012/10/03/9)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=862614)
5. [FEDORA-2012-15376](http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089554.html)
6. [FEDORA-2012-15395](http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089887.html)
7. [](http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/)
8. [](http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068)
9. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5155
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [RHSA-2018:1415](https://access.redhat.com/errata/RHSA-2018:1415)
2. [GLSA-201810-01](https://security.gentoo.org/glsa/201810-01)
3. [RHSA-2018:1726](https://access.redhat.com/errata/RHSA-2018:1726)
4. [RHSA-2018:1414](https://access.redhat.com/errata/RHSA-2018:1414)
5. [GLSA-201811-13](https://security.gentoo.org/glsa/201811-13)
6. [](https://www.mozilla.org/security/advisories/mfsa2018-13/)
7. [](https://www.mozilla.org/security/advisories/mfsa2018-11/)
8. [USN-3660-1](https://usn.ubuntu.com/3660-1/)
9. [1040896](http://www.securitytracker.com/id/1040896)
10. [DSA-4199](https://www.debian.org/security/2018/dsa-4199)
11. [USN-3645-1](https://usn.ubuntu.com/3645-1/)
12. [[debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html)
13. [[debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html)
14. [RHSA-2018:1725](https://access.redhat.com/errata/RHSA-2018:1725)
15. [DSA-4209](https://www.debian.org/security/2018/dsa-4209)
16. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1448774)
17. [](https://www.mozilla.org/security/advisories/mfsa2018-12/)
18. [104136](http://www.securityfocus.com/bid/104136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5424
- **State**: PUBLISHED
- **Published Date**: June 28, 2024 at 08:33 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 27, 2024 at 14:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘galleryID’ and 'className' parameters in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**gallerycreator - Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3e7bd708-2e82-4fef-85f2-bf4f56f66bc4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/blocks/init.php#L127)
3. [](https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/blocks/init.php#L132)
4. [](https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/blocks/init.php#L70)
5. [](https://plugins.trac.wordpress.org/changeset/3107152/simply-gallery-block/trunk/blocks/init.php)
6. [](https://wordpress.org/plugins/simply-gallery-block/#developers)
### Credits
- Craig Smith |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1506
- **State**: PUBLISHED
- **Published Date**: April 17, 2013 at 05:04 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: January 30, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53372](http://secunia.com/advisories/53372)
2. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml)
3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html)
4. [RHSA-2013:0772](http://rhn.redhat.com/errata/RHSA-2013-0772.html)
5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0035
- **State**: PUBLISHED
- **Published Date**: April 10, 2019 at 20:13 UTC
- **Last Updated**: September 16, 2024 at 17:47 UTC
- **Reserved Date**: October 11, 2018 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to a possible administrative bypass with physical access to the console. OAM volumes (e.g. flash drives) are typically instantiated as /dev/gpt/oam, or /oam for short. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D68; 16.1 versions prior to 16.1R3-S10, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S8; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2. This issue does not affect Junos OS releases prior to 15.1.
### Weakness Classification (CWE)
- CWE-501: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 15.1 (Status: affected)
- 15.1X49 (Status: affected)
- 15.1X53 (Status: affected)
- 16.1 (Status: affected)
- 16.1X65 (Status: affected)
- 16.2 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.2X75 (Status: affected)
- 18.3 (Status: affected)
- all (Status: unaffected)
### References
1. [](https://kb.juniper.net/JSA10924) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24697
- **State**: PUBLISHED
- **Published Date**: November 08, 2021 at 17:35 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the 1) sdm_active_tab GET parameter and 2) sdm_stats_start_date/sdm_stats_end_date POST parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Simple Download Monitor**
Affected versions:
- 3.9.5 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/ef9ae513-6c29-45c2-b5ae-4a06a217c499)
### Credits
- apple502j |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30644
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 19:52 UTC
- **Last Updated**: May 07, 2025 at 18:55 UTC
- **Reserved Date**: March 24, 2025 at 19:34 UTC
- **Assigned By**: juniper
### Vulnerability Description
A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series allows an attacker to send a specific DHCP packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
Under a rare timing scenario outside the attacker's control, memory corruption may be observed when DHCP Option 82 is enabled, leading to an FPC crash and affecting packet forwarding. Due to the nature of the heap-based overflow, exploitation of this vulnerability could also lead to remote code execution within the FPC, resulting in complete control of the vulnerable component.
This issue affects Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series:
* All versions before 21.4R3-S9,
* from 22.2 before 22.2R3-S5,
* from 22.4 before 22.4R3-S5,
* from 23.2 before 23.2R2-S3,
* from 23.4 before 23.4R2-S3,
* from 24.2 before 24.2R2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 22.2 (Status: affected)
- 22.4 (Status: affected)
- 23.2 (Status: affected)
- 23.4 (Status: affected)
- 24.2 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA96453) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2817
- **State**: PUBLISHED
- **Published Date**: May 24, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A stack buffer overflow vulnerability exists in the ISO parsing functionality of Power Software Ltd PowerISO 6.8. A specially crafted ISO file can cause a vulnerability resulting in potential code execution. An attacker can send a specific ISO file to trigger this vulnerability.
### Affected Products
**Power Software - PowerISO**
Affected versions:
- 6.8 (6, 8, 0, 0) (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0318) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3929
- **State**: PUBLISHED
- **Published Date**: September 04, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gather-messages.sh in Ampache 3.4.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filelist temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-200812-22](http://security.gentoo.org/glsa/glsa-200812-22.xml)
2. [[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire](http://www.openwall.com/lists/oss-security/2008/10/30/2)
3. [](http://dev.gentoo.org/~rbu/security/debiantemp/ampache)
4. [33316](http://secunia.com/advisories/33316)
5. [](https://bugs.gentoo.org/show_bug.cgi?id=235770)
6. [31657](http://secunia.com/advisories/31657)
7. [30875](http://www.securityfocus.com/bid/30875)
8. [ampache-gathermessages-symlink(44739)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44739)
9. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496369)
10. [](http://freshmeat.net/projects/ampache/releases/283935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7977
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3691](http://www.debian.org/security/2016/dsa-3691)
2. [95334](http://www.securityfocus.com/bid/95334)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
4. [RHSA-2017:0013](http://rhn.redhat.com/errata/RHSA-2017-0013.html)
5. [](http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=8abd22010eb4db0fb1b10e430d5f5d83e015ef70)
6. [[oss-security] 20160928 Re: ImageMagick identify "d:" hangs](http://www.openwall.com/lists/oss-security/2016/09/29/28)
7. [RHSA-2017:0014](http://rhn.redhat.com/errata/RHSA-2017-0014.html)
8. [](https://bugs.ghostscript.com/show_bug.cgi?id=697169)
9. [[oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems](http://www.openwall.com/lists/oss-security/2016/10/05/15)
10. [](https://ghostscript.com/doc/9.21/History9.htm)
11. [GLSA-201702-31](https://security.gentoo.org/glsa/201702-31) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3855
- **State**: PUBLISHED
- **Published Date**: February 24, 2023 at 13:02 UTC
- **Last Updated**: March 11, 2025 at 15:43 UTC
- **Reserved Date**: October 04, 2021 at 08:29 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Liman Central Management System Liman MYS (HTTP/Controllers, CronMail, Jobs modules) allows Command Injection.This issue affects Liman Central Management System: from 1.7.0 before 1.8.3-462.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Liman Central Management System - Liman Central Management System**
Affected versions:
- 1.7.0 (Status: affected)
### References
1. [](https://docs.liman.dev/baslangic/guvenlik)
2. [](https://www.usom.gov.tr/bildirim/tr-23-0109)
### Credits
- Mehmet INCE from PRODAFT |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2579
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 08:23 UTC
- **Last Updated**: April 24, 2025 at 13:54 UTC
- **Reserved Date**: March 20, 2025 at 21:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Lottie Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via File uploads in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the uploaded file.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bplugins - Lottie Player- Great Lottie Player Solution**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b85b314d-a155-4cec-95c9-0db4b9d8e59b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/embed-lottie-player/tags/1.1.8/plugin.php#L82)
3. [](https://plugins.trac.wordpress.org/browser/embed-lottie-player/tags/1.1.8/plugin.php#L130)
4. [](https://wordpress.org/plugins/embed-lottie-player/#developers)
### Credits
- Avraham Shemesh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6056
- **State**: PUBLISHED
- **Published Date**: November 20, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 15:54 UTC
- **Reserved Date**: November 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
frame.html in Aida-Web (Aida Web) allows remote attackers to bypass a protection mechanism and obtain comment and task details via modified values to the (1) Mehr and (2) SUPER parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45300](http://osvdb.org/45300)
2. [20071115 Aida-Web Information Exposure](http://www.securityfocus.com/archive/1/483749/100/0/threaded)
3. [aida-web-information-disclosure(38504)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38504)
4. [3385](http://securityreason.com/securityalert/3385)
5. [26464](http://www.securityfocus.com/bid/26464) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7419
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 15:21 UTC
- **Last Updated**: February 10, 2025 at 17:14 UTC
- **Reserved Date**: August 02, 2024 at 13:37 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. This is due to the missing input validation and sanitization of user-supplied data. This makes it possible for unauthenticated attackers to inject arbitrary PHP code into form fields that get executed on the server during the export, potentially leading to a complete site compromise.
As a prerequisite, the custom export field should include fields containing user-supplied data.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**WP All Import - WP All Export Pro**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/40b57370-4fd7-4316-9e99-a3f1d34616e8?source=cve)
2. [](https://www.wpallimport.com/upgrade-to-wp-all-export-pro/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3136
- **State**: PUBLISHED
- **Published Date**: June 22, 2006 at 22:00 UTC
- **Last Updated**: January 17, 2025 at 13:57 UTC
- **Reserved Date**: June 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Nucleus 3.23 allow remote attackers to execute arbitrary PHP code via a URL the DIR_LIBS parameter in (1) path/action.php, and to files in path/nucleus including (2) media.php, (3) /xmlrpc/server.php, and (4) /xmlrpc/api_metaweblog.inc.php. NOTE: this is a similar vulnerability to CVE-2006-2583. NOTE: this issue has been disputed by third parties, who state that the DIR_LIBS parameter is defined in an include file before being used
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27502](http://www.osvdb.org/27502)
2. [20060617 Re: file include exploits in nucleus 3.23](http://www.securityfocus.com/archive/1/437986/100/200/threaded)
3. [1120](http://securityreason.com/securityalert/1120)
4. [ADV-2006-2408](http://www.vupen.com/english/advisories/2006/2408)
5. [1016325](http://securitytracker.com/id?1016325)
6. [20060616 file include exploits in nucleus 3.23](http://www.securityfocus.com/archive/1/437423/100/0/threaded)
7. [18475](http://www.securityfocus.com/bid/18475) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2008
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 19:56 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In createEffect of AudioFlinger.cpp, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9Android ID: A-122309228
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.0 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32679
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 16:09 UTC
- **Last Updated**: April 09, 2025 at 18:08 UTC
- **Reserved Date**: April 09, 2025 at 11:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ZealousWeb User Registration Using Contact Form 7 allows Cross Site Request Forgery. This issue affects User Registration Using Contact Form 7: from n/a through 2.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ZealousWeb - User Registration Using Contact Form 7**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/user-registration-using-contact-form-7/vulnerability/wordpress-user-registration-using-contact-form-7-plugin-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1914
- **State**: PUBLISHED
- **Published Date**: April 22, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 08:40 UTC
- **Reserved Date**: April 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote attackers to execute arbitrary code via a long URI in a request to TCP port 6080. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5451](https://www.exploit-db.com/exploits/5451)
2. [ADV-2008-1238](http://www.vupen.com/english/advisories/2008/1238/references)
3. [28795](http://www.securityfocus.com/bid/28795)
4. [20080417 Re: BigAnt Server 2.2 PreAuth Remote SEH Overflow Exploit (0day)](http://www.securityfocus.com/archive/1/491035/100/0/threaded)
5. [29831](http://secunia.com/advisories/29831)
6. [bigantmessenger-antserver-bo(41830)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41830)
7. [20080415 BigAnt Server 2.2 PreAuth Remote SEH Overflow Exploit (0day)](http://www.securityfocus.com/archive/1/490916/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4908
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 20:35 UTC
- **Last Updated**: September 17, 2024 at 00:05 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 returns the product version and release information on the login dialog. This information could be used in further attacks against the system.
### Affected Products
**IBM - Financial Transaction Manager**
Affected versions:
- 3.2.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6371260)
2. [ibm-ftm-cve20204908-info-disc (191113)](https://exchange.xforce.ibmcloud.com/vulnerabilities/191113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4874
- **State**: PUBLISHED
- **Published Date**: May 26, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: May 26, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TalkBack 2.3.14 does not properly restrict access to the edit comment feature (comments.php), which allows remote attackers to modify comments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.juniper.net/security/auto/vulnerabilities/vuln35619.html)
2. [35619](http://www.securityfocus.com/bid/35619)
3. [](http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt)
4. [35735](http://secunia.com/advisories/35735)
5. [55745](http://osvdb.org/55745)
6. [9095](http://www.exploit-db.com/exploits/9095) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1868
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:49 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212317)
2. [](https://support.apple.com/en-us/HT212323)
3. [](https://support.apple.com/en-us/HT212324)
4. [](https://support.apple.com/en-us/HT212325)
5. [](https://support.apple.com/en-us/HT212326)
6. [](https://support.apple.com/en-us/HT212327) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31635
- **State**: PUBLISHED
- **Published Date**: June 13, 2023 at 16:10 UTC
- **Last Updated**: January 03, 2025 at 14:43 UTC
- **Reserved Date**: May 25, 2022 at 21:05 UTC
- **Assigned By**: hp
### Vulnerability Description
Potential time-of-check to time-of-use (TOCTOU) vulnerabilities have been identified in the BIOS for certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
### Affected Products
**HP Inc. - HP PC BIOS**
Affected versions:
- See HP Security Bulletin reference for affected versions. (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_7149996-7150021-16/hpsbhf03814) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56439
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 02:05 UTC
- **Last Updated**: January 08, 2025 at 15:28 UTC
- **Reserved Date**: December 26, 2024 at 08:45 UTC
- **Assigned By**: huawei
### Vulnerability Description
Access control vulnerability in the identity authentication module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2025/1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23152
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:04 UTC
- **Last Updated**: May 05, 2025 at 16:54 UTC
- **Reserved Date**: December 09, 2021 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper access control in the Intel(R) Advisor software before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) Advisor software**
Affected versions:
- before version 2021.2 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14319
- **State**: PUBLISHED
- **Published Date**: September 04, 2019 at 19:57 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 27, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The TikTok (formerly Musical.ly) application 12.2.0 for Android and iOS performs unencrypted transmission of images, videos, and likes. This allows an attacker to extract private sensitive information by sniffing network traffic.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://play.google.com/store/apps/details?id=com.zhiliaoapp.musically&hl=en_US)
2. [](http://p16.muscdn.com/img/musically-maliva-obj/1626792871331845~c5_100x100.jpeg)
3. [](http://p16.muscdn.com/img/tos-maliva-p-0068/d9e7889f4f2d43028b41947cb0950c32~noop.image)
4. [](https://github.com/MelroyB/CVE-2019-14319/blob/master/CVE%202019-14319%20.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2690
- **State**: PUBLISHED
- **Published Date**: January 18, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:32 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
2. [1040202](http://www.securitytracker.com/id/1040202)
3. [102694](http://www.securityfocus.com/bid/102694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4658
- **State**: PUBLISHED
- **Published Date**: September 25, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207141)
2. [1036858](http://www.securitytracker.com/id/1036858)
3. [APPLE-SA-2016-09-20](http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html)
4. [APPLE-SA-2016-09-20-3](http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html)
5. [APPLE-SA-2016-09-20-5](http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html)
6. [APPLE-SA-2016-09-20-6](http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html)
7. [93054](http://www.securityfocus.com/bid/93054)
8. [](https://support.apple.com/HT207170)
9. [GLSA-201701-37](https://security.gentoo.org/glsa/201701-37)
10. [](https://support.apple.com/HT207142)
11. [](https://support.apple.com/HT207143)
12. [1038623](http://www.securitytracker.com/id/1038623)
13. [](https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1335
- **State**: PUBLISHED
- **Published Date**: December 03, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: December 02, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in w3m 0.3.2 does not escape an HTML tag in a frame, which allows remote attackers to insert arbitrary web script or HTML and access files or cookies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2003:045](http://www.redhat.com/support/errata/RHSA-2003-045.html)
2. [6793](http://www.securityfocus.com/bid/6793)
3. [8031](http://secunia.com/advisories/8031)
4. [](http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200211.month/838.html)
5. [OpenPKG-SA-2003.009](http://www.openpkg.com/security/advisories/OpenPKG-SA-2003.009.html)
6. [8015](http://secunia.com/advisories/8015)
7. [8016](http://secunia.com/advisories/8016)
8. [6981](http://www.osvdb.org/6981)
9. [DSA-251](http://www.debian.org/security/2003/dsa-251)
10. [RHSA-2003:044](http://www.redhat.com/support/errata/RHSA-2003-044.html)
11. [8053](http://secunia.com/advisories/8053)
12. [w3m-html-frame-xss(10842)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10842)
13. [DSA-249](http://www.debian.org/security/2003/dsa-249)
14. [](http://sourceforge.net/project/shownotes.php?release_id=124484)
15. [DSA-250](http://www.debian.org/security/2003/dsa-250) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0606
- **State**: PUBLISHED
- **Published Date**: February 06, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the Shambo2 (com_shambo2) component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27609](http://www.securityfocus.com/bid/27609)
2. [shambo2-index-sql-injection(40238)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40238)
3. [5059](https://www.exploit-db.com/exploits/5059) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1738
- **State**: PUBLISHED
- **Published Date**: July 10, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Rational Quality Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 contains an undisclosed vulnerability that would allow an authenticated user to obtain elevated privileges. IBM X-Force ID: 134919.
### Affected Products
**IBM - Rational Quality Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
### References
1. [ibm-rqm-cve20171738-priv-escalation(134919)](https://exchange.xforce.ibmcloud.com/vulnerabilities/134919)
2. [](http://www.ibm.com/support/docview.wss?uid=ibm10716607) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48427
- **State**: PUBLISHED
- **Published Date**: October 24, 2024 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 19:44 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in Sourcecodester Packers and Movers Management System v1.0 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in /mpms/admin/?page=services/manage_service&id
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/php/15360/packers-and-movers-management-system-phpoop-free-source-code.html)
2. [](https://github.com/vighneshnair7/CVE-2024-48427/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35117
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 01:32 UTC
- **Last Updated**: January 27, 2025 at 15:52 UTC
- **Reserved Date**: May 09, 2024 at 16:27 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM OpenPages with Watson 9.0 may write sensitive information, under specific configurations, in clear text to the system tracing log files that could be obtained by a privileged user.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**IBM - OpenPages with Watson**
Affected versions:
- 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7165392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3982, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3982
- **State**: PUBLISHED
- **Published Date**: October 01, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable arbitrary write vulnerability exists in the Word document parser of the Atlantis Word Processor 3.0.2.3 and 3.0.2.5. A specially crafted document can prevent Atlas from adding elements to an array that is indexed by a loop. When reading from this array, the application will use an out-of-bounds index which can result in arbitrary data being read as a pointer. Later, when the application attempts to write to said pointer, an arbitrary write will occur. This can allow an attacker to further corrupt memory, which leads to code execution under the context of the application. An attacker must convince a victim to open a document in order to trigger this vulnerability.
### Affected Products
**The Atlantis Word Processor Team - Atlantis Word Processor**
Affected versions:
- 3.0.2.3, 3.0.2.5 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0650) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13477
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for CTESale, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CTESale) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30927
- **State**: PUBLISHED
- **Published Date**: June 06, 2022 at 22:10 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability exists in Simple Task Scheduling System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL database through the vulnerable "id" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/php/15328/simple-task-scheduler-system-phpoop-free-source-code.html)
2. [](https://www.sourcecodester.com/sites/default/files/download/oretnom23/tss.zip)
3. [](https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34166
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 00:00 UTC
- **Last Updated**: December 11, 2024 at 18:53 UTC
- **Reserved Date**: May 29, 2023 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.1 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2023/6/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0881
- **State**: PUBLISHED
- **Published Date**: February 12, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in the Seitenschutz plugin for OPENi-CMS 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the (1) config[oi_dir] and possibly (2) config[openi_dir] parameters to open-admin/plugins/site_protection/index.php. NOTE: vector 2 might be the same as CVE-2006-4750.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0556](http://www.vupen.com/english/advisories/2007/0556)
2. [24119](http://secunia.com/advisories/24119)
3. [22511](http://www.securityfocus.com/bid/22511)
4. [33175](http://osvdb.org/33175)
5. [](http://echo.or.id/adv/adv64-y3dips-2007.txt)
6. [internalrange-oidir-file-include(32423)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32423)
7. [3292](https://www.exploit-db.com/exploits/3292) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26601
- **State**: PUBLISHED
- **Published Date**: October 06, 2020 at 18:36 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 06, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in DirEncryptService on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. PendingIntent with an empty intent is mishandled, allowing an attacker to perform a privileged action via a modified intent. The Samsung ID is SVE-2020-18034 (October 2020).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7627
- **State**: PUBLISHED
- **Published Date**: April 02, 2020 at 21:28 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.
### Affected Products
**n/a - node-key-sender**
Affected versions:
- All versions including 1.0.11 (Status: affected)
### References
1. [](https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117%2C)
2. [](https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25985
- **State**: PUBLISHED
- **Published Date**: November 16, 2021 at 09:45 UTC
- **Last Updated**: April 30, 2025 at 15:44 UTC
- **Reserved Date**: January 22, 2021 at 00:00 UTC
- **Assigned By**: Mend
### Vulnerability Description
In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**FactorJS - Factor**
Affected versions:
- 1.0.4 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65)
2. [](https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985)
### Credits
- WhiteSource Vulnerability Research Team (WVR) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2739
- **State**: PUBLISHED
- **Published Date**: October 09, 2007 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: October 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The setup routine (setup.php) in PHProjekt 4.2.1 and earlier allows remote attackers to modify system configuration via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phprojekt-setup-command-execution(18320)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18320)
2. [11797](http://www.securityfocus.com/bid/11797)
3. [GLSA-200412-06](http://www.gentoo.org/security/en/glsa/glsa-200412-06.xml)
4. [SuSE-SR:2004:004](http://www.novell.com/linux/security/advisories/2004_04_sr.html)
5. [1012369](http://securitytracker.com/id?1012369)
6. [13355](http://secunia.com/advisories/13355)
7. [12174](http://www.osvdb.org/12174)
8. [](http://www.phprojekt.com/modules.php?op=modload&name=News&file=article&sid=189&mode=thread&order=0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2334
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 20:55 UTC
- **Last Updated**: August 06, 2024 at 23:00 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free vulnerability exists in WebKit in Google Chrome before Blink M12 in RenderLayerwhen removing elements with reflections.
### Affected Products
**Google - Chrome**
Affected versions:
- before Blink M12 (Status: affected)
### References
1. [](https://bugs.chromium.org/p/chromium/issues/detail?id=81348)
2. [](http://trac.webkit.org/changeset/86005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26272
- **State**: PUBLISHED
- **Published Date**: August 28, 2023 at 00:05 UTC
- **Last Updated**: October 02, 2024 at 13:54 UTC
- **Reserved Date**: February 21, 2023 at 13:55 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Guardium Data Encryption (IBM Guardium Cloud Key Manager (GCKM) 1.10.3)) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 248133.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**IBM - Guardium Cloud Key Manager**
Affected versions:
- 1.10.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6995161)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/248133) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3880
- **State**: PUBLISHED
- **Published Date**: June 10, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 27, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The (1) execve and (2) fexecve system calls in the FreeBSD kernel 8.4 before p11, 9.1 before p14, 9.2 before p7, and 10.0 before p4 destroys the virtual memory address space and mappings for a process before all threads have terminated, which allows local users to cause a denial of service (triple-fault and system reboot) via a crafted system call, which triggers an invalid page table pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2952](http://www.debian.org/security/2014/dsa-2952)
2. [59034](http://secunia.com/advisories/59034)
3. [](http://www.freebsd.org/security/advisories/FreeBSD-EN-14%3A06.exec.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36528
- **State**: PUBLISHED
- **Published Date**: June 03, 2022 at 14:55 UTC
- **Last Updated**: April 15, 2025 at 14:36 UTC
- **Reserved Date**: May 27, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Platinum Mobile 1.0.4.850. Affected is /MobileHandler.ashx which leads to broken access control. The attack requires authentication. Upgrading to version 1.0.4.851 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**unspecified - Platinum Mobile**
Affected versions:
- 1.0.4.850 (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2020/Oct/4)
2. [](https://vuldb.com/?id.162264)
### Credits
- M. Li |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0591
- **State**: PUBLISHED
- **Published Date**: March 05, 2010 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 18:19 UTC
- **Reserved Date**: February 10, 2010 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5), 7.x before 7.1(3b)SU2, and 8.x before 8.0(1) allows remote attackers to cause a denial of service (process failure) via a malformed SIP REG message, related to an overflow of the Telephone-URL field, aka Bug ID CSCtc62362.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1023670](http://securitytracker.com/id?1023670)
2. [20100303 Cisco Unified Communications Manager Denial of Service Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml)
3. [38498](http://www.securityfocus.com/bid/38498) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5269
- **State**: PUBLISHED
- **Published Date**: September 07, 2012 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 20:22 UTC
- **Reserved Date**: September 07, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in tbb.dll in Intel Threading Building Blocks (TBB) 2.2.013 allows local users to gain privileges via a Trojan horse tbbmalloc.dll file in the current working directory, as demonstrated by a directory that contains a .pbk file. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42506](http://secunia.com/advisories/42506)
2. [](http://www.coresecurity.com/content/adobe-pixel-bender-toolkit-tbbmalloc-dll-hijacking-exploit-10-5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0704
- **State**: PUBLISHED
- **Published Date**: July 21, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: July 20, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in (1) duplicates.cgi and (2) buglist.cgi in Bugzilla 2.16.x before 2.16.6, 2.18 before 2.18rc1, when configured to hide products, allows remote attackers to view hidden products.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10698](http://www.securityfocus.com/bid/10698)
2. [20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7](http://marc.info/?l=bugtraq&m=108965446813639&w=2)
3. [bugzilla-product-name-disclosure(16671)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42099
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:13 UTC
- **Last Updated**: August 15, 2024 at 15:50 UTC
- **Reserved Date**: September 06, 2023 at 21:14 UTC
- **Assigned By**: zdi
### Vulnerability Description
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Intel - Driver & Support Assistant**
Affected versions:
- 23.3.25.6 (Status: affected)
### References
1. [ZDI-23-1449](https://www.zerodayinitiative.com/advisories/ZDI-23-1449/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8552
- **State**: REJECTED
- **Published Date**: February 22, 2017 at 21:00 UTC
- **Last Updated**: February 22, 2017 at 20:57 UTC
- **Reserved Date**: October 07, 2016 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25295
- **State**: PUBLISHED
- **Published Date**: February 14, 2025 at 16:50 UTC
- **Last Updated**: March 03, 2025 at 17:26 UTC
- **Reserved Date**: February 06, 2025 at 17:13 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Label Studio is an open source data labeling tool. A path traversal vulnerability in Label Studio SDK versions prior to 1.0.10 allows unauthorized file access outside the intended directory structure. The flaw exists in the VOC, COCO and YOLO export functionalities. These functions invoke a `download` function on the `label-studio-sdk` python package, which fails to validate file paths when processing image references during task exports. By creating tasks with path traversal sequences in the image field, an attacker can force the application to read files from arbitrary server filesystem locations when exporting projects in any of the mentioned formats. This is authentication-required vulnerability allowing arbitrary file reads from the server filesystem. It may lead to potential exposure of sensitive information like configuration files, credentials, and confidential data. Label Studio versions before 1.16.0 specified SDK versions prior to 1.0.10 as dependencies, and the issue was confirmed in Label Studio version 1.13.2.dev0; therefore, Label Studio users should upgrade to 1.16.0 or newer to mitigate it.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
- CWE-26: Security Weakness
### Affected Products
**HumanSignal - label-studio**
Affected versions:
- < 1.0.10 (Status: affected)
### References
1. [https://github.com/HumanSignal/label-studio/security/advisories/GHSA-rgv9-w7jp-m23g](https://github.com/HumanSignal/label-studio/security/advisories/GHSA-rgv9-w7jp-m23g)
2. [https://github.com/HumanSignal/label-studio-sdk/commit/4a9715c6b0b619371e89c09ea8d1c86ce5c880df](https://github.com/HumanSignal/label-studio-sdk/commit/4a9715c6b0b619371e89c09ea8d1c86ce5c880df) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23521
- **State**: PUBLISHED
- **Published Date**: January 17, 2023 at 22:17 UTC
- **Last Updated**: February 13, 2025 at 16:32 UTC
- **Reserved Date**: January 19, 2022 at 21:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**git - git**
Affected versions:
- < 2.30.7 (Status: affected)
- >= 2.31.0, < 2.31.6 (Status: affected)
- >= 2.32.0, < 2.32.5 (Status: affected)
- >= 2.33.0, < 2.33.6 (Status: affected)
- >= 2.34.0, < 2.34.6 (Status: affected)
- >= 2.35.0, < 2.35.6 (Status: affected)
- >= 2.36.0, < 2.36.4 (Status: affected)
- >= 2.37.0, < 2.37.5 (Status: affected)
- >= 2.38.0, < 2.38.3 (Status: affected)
- = 2.39.0 (Status: affected)
### References
1. [https://github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89](https://github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89)
2. [https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76](https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76)
3. [](https://security.gentoo.org/glsa/202312-15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2792
- **State**: PUBLISHED
- **Published Date**: July 08, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2786 and CVE-2014-2813.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-037](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037)
2. [68377](http://www.securityfocus.com/bid/68377)
3. [59775](http://secunia.com/advisories/59775)
4. [1030532](http://www.securitytracker.com/id/1030532) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3148
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 16:31 UTC
- **Last Updated**: August 02, 2024 at 06:48 UTC
- **Reserved Date**: June 07, 2023 at 13:55 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0 and classified as critical. This issue affects some unknown processing of the file admin\posts\manage_post.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231017 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Online Discussion Forum Site**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.231017)
2. [](https://vuldb.com/?ctiid.231017)
3. [](https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#6sql-injection-vulnerability-in-adminpostsmanage_postphp)
### Credits
- peanut886886 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12562
- **State**: PUBLISHED
- **Published Date**: August 05, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/erikd/libsndfile/issues/292)
2. [GLSA-201811-23](https://security.gentoo.org/glsa/201811-23)
3. [[debian-lts-announce] 20220628 [SECURITY] [DLA 3058-1] libsndfile security update](https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1816
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040315 Multiple Vendor SOAP server array DoS](http://marc.info/?l=bugtraq&m=107936690702515&w=2)
2. [11130](http://secunia.com/advisories/11130)
3. [soap-array-dos(15473)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15473)
4. [57517](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1)
5. [201713](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1)
6. [9877](http://www.securityfocus.com/bid/9877) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47761
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:30 UTC
- **Last Updated**: December 09, 2024 at 18:46 UTC
- **Reserved Date**: November 09, 2023 at 18:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WPDeveloper Simple 301 Redirects by BetterLinks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple 301 Redirects by BetterLinks: from n/a through 2.0.7.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WPDeveloper - Simple 301 Redirects by BetterLinks**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/simple-301-redirects/vulnerability/wordpress-simple-301-redirects-by-betterlinks-plugin-2-0-7-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1175
- **State**: PUBLISHED
- **Published Date**: March 04, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 16:31 UTC
- **Reserved Date**: March 04, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
### Weakness Classification (CWE)
- CWE-131: Security Weakness
### Affected Products
**vim - vim/vim**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e)
2. [](https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba)
3. [FEDORA-2023-43cb13aefb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/)
4. [FEDORA-2023-d4ebe53978](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/)
5. [FEDORA-2023-030318ca00](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/)
6. [[debian-lts-announce] 20230612 [SECURITY] [DLA 3453-1] vim security update](https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22550
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 14:57 UTC
- **Last Updated**: January 07, 2025 at 16:28 UTC
- **Reserved Date**: January 07, 2025 at 10:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AddFunc AddFunc Mobile Detect allows Stored XSS.This issue affects AddFunc Mobile Detect: from n/a through 3.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**AddFunc - AddFunc Mobile Detect**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/addfunc-mobile-detect/vulnerability/wordpress-addfunc-mobile-detect-plugin-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4015
- **State**: PUBLISHED
- **Published Date**: November 16, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 01:27 UTC
- **Reserved Date**: November 16, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Sports Club Management System 119. This affects an unknown part of the file admin/make_payments.php. The manipulation of the argument m_id/plan leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213789 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-707: Security Weakness
### Affected Products
**unspecified - Sports Club Management System**
Affected versions:
- 119 (Status: affected)
### References
1. [](https://github.com/shreyansh225/Sports-Club-Management-System/issues/6)
2. [](https://vuldb.com/?id.213789) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0137
- **State**: PUBLISHED
- **Published Date**: March 24, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 04:03 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM PowerVC Standard 1.2.0.x before 1.2.0.4 and 1.2.1.x before 1.2.2 validates Hardware Management Console (HMC) certificates only during the pre-login stage, which allows man-in-the-middle attackers to spoof devices via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=nas8N1020611) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10170
- **State**: PUBLISHED
- **Published Date**: October 20, 2024 at 04:00 UTC
- **Last Updated**: October 21, 2024 at 15:37 UTC
- **Reserved Date**: October 18, 2024 at 19:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. This issue affects some unknown processing of the file get_doctor.php. The manipulation of the argument specilizationid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Hospital Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-280955 | code-projects Hospital Management System get_doctor.php sql injection](https://vuldb.com/?id.280955)
2. [VDB-280955 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.280955)
3. [Submit #426440 | code-projects Hospital Management System Using PHP 1,0 SQL Injection](https://vuldb.com/?submit.426440)
4. [](https://github.com/zer0-1s/cve/issues/1)
5. [](https://code-projects.org/)
### Credits
- zer0-1s (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46710
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 06:33 UTC
- **Last Updated**: May 04, 2025 at 09:32 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Prevent unmapping active read buffers
The kms paths keep a persistent map active to read and compare the cursor
buffer. These maps can race with each other in simple scenario where:
a) buffer "a" mapped for update
b) buffer "a" mapped for compare
c) do the compare
d) unmap "a" for compare
e) update the cursor
f) unmap "a" for update
At step "e" the buffer has been unmapped and the read contents is bogus.
Prevent unmapping of active read buffers by simply keeping a count of
how many paths have currently active maps and unmap only when the count
reaches 0.
### Affected Products
**Linux - Linux**
Affected versions:
- 485d98d472d53f9617ffdfba5e677ac29ad4fe20 (Status: affected)
- 485d98d472d53f9617ffdfba5e677ac29ad4fe20 (Status: affected)
- 485d98d472d53f9617ffdfba5e677ac29ad4fe20 (Status: affected)
- 485d98d472d53f9617ffdfba5e677ac29ad4fe20 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.54 (Status: unaffected)
- 6.10.8 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/58a3714db4d9dcaeb9fc4905141e17b9f536c0a5)
2. [](https://git.kernel.org/stable/c/0851b1ec650adadcaa23ec96daad95a55bf966f0)
3. [](https://git.kernel.org/stable/c/d5228d158e4c0b1663b3983044913c15c3d0135e)
4. [](https://git.kernel.org/stable/c/aba07b9a0587f50e5d3346eaa19019cf3f86c0ea) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1488
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
sdrd daemon in IBM SP2 System Data Repository (SDR) allows remote attackers to read files without authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [371](http://www.securityfocus.com/bid/371)
2. [I-079A](http://ciac.llnl.gov/ciac/bulletins/i-079a.shtml)
3. [ibm-sdr-read-files(7217)](http://www.iss.net/security_center/static/7217.php) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.