System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4822
- **State**: PUBLISHED
- **Published Date**: September 11, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the device management interface in Buffalo AirStation WHR-G54S 1.20 allows remote attackers to make configuration changes as an administrator via HTTP requests to certain HTML pages in the res parameter with an inp req parameter to cgi-bin/cgi, as demonstrated by accessing (1) ap.html and (2) filter_ip.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.louhi.fi/advisory/buffalo_070907.txt)
2. [20070907 Re: Buffalo AirStation WHR-G54S CSRF vulnerability](http://www.securityfocus.com/archive/1/478801/100/0/threaded)
3. [37665](http://osvdb.org/37665)
4. [20070907 Buffalo AirStation WHR-G54S CSRF vulnerability](http://www.securityfocus.com/archive/1/478795/100/0/threaded)
5. [buffalo-aoss-management-csrf(36492)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36492)
6. [26712](http://secunia.com/advisories/26712)
7. [25588](http://www.securityfocus.com/bid/25588)
8. [3117](http://securityreason.com/securityalert/3117) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36671
- **State**: PUBLISHED
- **Published Date**: November 29, 2024 at 00:00 UTC
- **Last Updated**: December 04, 2024 at 16:57 UTC
- **Reserved Date**: May 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
nodemcu before v3.0.0-release_20240225 was discovered to contain an integer overflow via the getnum function at /modules/struct.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nodemcu/nodemcu-firmware/pull/3633)
2. [](https://github.com/nodemcu/nodemcu-firmware/pull/3634)
3. [](https://github.com/nodemcu/nodemcu-firmware/pull/3635)
4. [](https://github.com/nodemcu/nodemcu-firmware/commit/193fe3593eb1537667179089535cdb7457327887#diff-5c3fa597431eda03ac3339ae6bf7f05e1a50d6fc7333679ec38e21b337cb6721)
5. [](https://github.com/nodemcu/nodemcu-firmware/issues/3626) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3160
- **State**: PUBLISHED
- **Published Date**: July 14, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:28 UTC
- **Reserved Date**: July 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in IBM Data ONTAP 7.1 before 7.1.3, as used by IBM System Storage N series Filer and IBM System Storage N series Gateway, have unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-dataontap-filer-unspecified(43700)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43700)
2. [](http://www-1.ibm.com/support/docview.wss?uid=ssg1S7002373)
3. [](http://www-1.ibm.com/support/docview.wss?rs=1147&uid=ssg1S7002385)
4. [ibm-dataontap-gateway-unspecified(43699)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43699)
5. [30931](http://secunia.com/advisories/30931)
6. [](http://www-1.ibm.com/support/docview.wss?rs=1147&uid=ssg1S7002386)
7. [30160](http://www.securityfocus.com/bid/30160)
8. [](http://www-1.ibm.com/support/docview.wss?uid=ssg1S7002385&aid=1)
9. [](http://www-1.ibm.com/support/docview.wss?uid=ssg1S7002386&aid=1)
10. [1020463](http://www.securitytracker.com/id?1020463)
11. [](http://www-1.ibm.com/support/docview.wss?uid=ssg1S7002372)
12. [ADV-2008-2054](http://www.vupen.com/english/advisories/2008/2054) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3684
- **State**: PUBLISHED
- **Published Date**: November 02, 2020 at 06:21 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
u'QSEE reads the access permission policy for the SMEM TOC partition from the SMEM TOC contents populated by XBL Loader and applies them without validation' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8098, Bitra, IPQ6018, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8998, Nicobar, QCA6390, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- Agatti, APQ8009, APQ8098, Bitra, IPQ6018, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8998, Nicobar, QCA6390, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6698
- **State**: PUBLISHED
- **Published Date**: April 10, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 11:41 UTC
- **Reserved Date**: April 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in TARGET-E WorldCup Bets (worldcup) 2.0.0 and earlier extension for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46395](http://osvdb.org/46395)
2. [29826](http://www.securityfocus.com/bid/29826)
3. [worldcup-unspecified-xss(43214)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43214)
4. [](http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10311
- **State**: PUBLISHED
- **Published Date**: April 24, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 07:39 UTC
- **Reserved Date**: April 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the tag[pinyin] parameter to the /index.php?m=tags&f=index&v=add URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44618](https://www.exploit-db.com/exploits/44618/)
2. [](https://github.com/wuzhicms/wuzhicms/issues/131) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21926
- **State**: PUBLISHED
- **Published Date**: December 22, 2021 at 18:07 UTC
- **Last Updated**: August 03, 2024 at 18:30 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘health_filter’ parameter.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - Advantech**
Affected versions:
- Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021) (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25167
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 16:20 UTC
- **Last Updated**: April 16, 2025 at 16:29 UTC
- **Reserved Date**: September 04, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
OSIsoft PI Vision 2020 versions prior to 3.5.0 could disclose information to a user with insufficient privileges for an AF attribute.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**OSIsoft - PI Vision**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-20-315-02)
### Credits
- OSIsoft reported these vulnerabilities to CISA |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37600
- **State**: PUBLISHED
- **Published Date**: July 20, 2023 at 00:00 UTC
- **Last Updated**: October 24, 2024 at 16:47 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Office Suite Premium Version v10.9.1.42602 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /api?path=profile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2841
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 22:31 UTC
- **Last Updated**: October 15, 2024 at 18:55 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Investor Servicing accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### Affected Products
**Oracle Corporation - FLEXCUBE Investor Servicing**
Affected versions:
- 12.0.1 (Status: affected)
- 12.0.3 (Status: affected)
- 12.0.4 (Status: affected)
- 12.1.0 (Status: affected)
- 12.3.0 (Status: affected)
- 12.4.0 (Status: affected)
- 14.0.0 (Status: affected)
- 14.1.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7921
- **State**: PUBLISHED
- **Published Date**: September 12, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei B315s-22 products with software of 21.318.01.00.26 have an information leak vulnerability. Unauthenticated adjacent attackers may exploit this vulnerability to obtain device information.
### Affected Products
**Huawei Technologies Co., Ltd. - B315s-22**
Affected versions:
- 21.318.01.00.26 (Status: affected)
### References
1. [45971](https://www.exploit-db.com/exploits/45971/)
2. [](https://www.huawei.com/en/psirt/security-notices/huawei-sn-20180903-01-b315s-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5103
- **State**: REJECTED
- **Published Date**: December 21, 2016 at 16:00 UTC
- **Last Updated**: December 21, 2016 at 15:57 UTC
- **Reserved Date**: May 26, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1021
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:06 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In snoozeNotificationInt of NotificationManagerService.java, there is a possible way to disable notification for an arbitrary user due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-195031703
### Affected Products
**n/a - Android**
Affected versions:
- Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0063
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Color Management Module (ICM32.dll) memory handling functionality in Windows Vista SP2; Windows Server 2008 SP2 and R2; and Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to bypass ASLR and execute code in combination with another vulnerability through a crafted website, aka "Microsoft Color Management Information Disclosure Vulnerability." This vulnerability is different from that described in CVE-2017-0061.
### Affected Products
**Microsoft Corporation - Color Management**
Affected versions:
- The Color Management Module (ICM32.dll) memory handling functionality in Windows Vista SP2; Windows Server 2008 SP2 and R2; and Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 (Status: affected)
### References
1. [96643](http://www.securityfocus.com/bid/96643)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0063)
3. [41659](https://www.exploit-db.com/exploits/41659/)
4. [1038002](http://www.securitytracker.com/id/1038002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57362
- **State**: REJECTED
- **Last Updated**: February 03, 2025 at 17:15 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-7195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-7195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7195
- **State**: PUBLISHED
- **Published Date**: May 09, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 20:57 UTC
- **Reserved Date**: April 18, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache Tomcat 5.0.0 through 5.0.30 and 5.5.0 through 5.5.17 allows remote attackers to inject arbitrary web script or HTML via certain header values.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[Security-announce] 20080107 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1](http://lists.vmware.com/pipermail/security-announce/2008/000003.html)
2. [28481](http://www.securityfocus.com/bid/28481)
3. [ADV-2008-0065](http://www.vupen.com/english/advisories/2008/0065)
4. [20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)](http://www.securityfocus.com/archive/1/500412/100/0/threaded)
5. [33668](http://secunia.com/advisories/33668)
6. [20080108 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1](http://www.securityfocus.com/archive/1/485938/100/0/threaded)
7. [20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500396/100/0/threaded)
8. [ADV-2007-1729](http://www.vupen.com/english/advisories/2007/1729)
9. [ADV-2009-0233](http://www.vupen.com/english/advisories/2009/0233)
10. [28365](http://secunia.com/advisories/28365)
11. [](http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm)
12. [RHSA-2007:0327](http://www.redhat.com/support/errata/RHSA-2007-0327.html)
13. [](http://tomcat.apache.org/security-5.html)
14. [oval:org.mitre.oval:def:10514](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10514)
15. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
16. [](http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx)
17. [](http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15442
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 16:27 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Samsung on7xelteskt Android device with a build fingerprint of samsung/on7xelteskt/on7xelteskt:8.1.0/M1AJQ/G610SKSU2CSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kryptowire.com/android-firmware-2019/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36912
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 17:08 UTC
- **Last Updated**: February 27, 2025 at 21:08 UTC
- **Reserved Date**: June 27, 2023 at 20:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4889
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10229
- **State**: PUBLISHED
- **Published Date**: September 14, 2020 at 19:55 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 08, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A CSRF issue in vtecrm vtenext 19 CE allows attackers to carry out unwanted actions on an administrator's behalf, such as uploading files, adding users, and deleting accounts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vtenext.com/en/)
2. [](https://sourceforge.net/projects/vtecrm/)
3. [](https://www.exploit-db.com/exploits/48804) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35696
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 10:00 UTC
- **Last Updated**: April 23, 2025 at 16:28 UTC
- **Reserved Date**: July 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6633
- **State**: PUBLISHED
- **Published Date**: February 05, 2018 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 03:43 UTC
- **Reserved Date**: February 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80000038.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/80000038) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2260
- **State**: PUBLISHED
- **Published Date**: November 04, 2019 at 16:15 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cryptocat before 2.0.22: Cryptocat.random() Function Array Key has Entropy Weakness
### Affected Products
**Cryptocat - Cryptocat**
Affected versions:
- before 2.0.22 (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2013/07/10/15)
2. [](https://tobtu.com/decryptocat.php)
3. [](https://vuldb.com/?id.9435)
4. [](https://www.securityfocus.com/bid/61091/info) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3753
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 18:47 UTC
- **Last Updated**: September 16, 2024 at 20:48 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC PowerConnect 8024, 7000, M6348, M6220, M8024 and M8024-K running firmware versions prior to 5.1.15.2 contain a plain-text password storage vulnerability. TACACS\Radius credentials are stored in plain text in the system settings menu. An authenticated malicious user with access to the system settings menu may obtain the exposed password to use it in further attacks.
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**Dell EMC - PowerConnect 8024**
Affected versions:
- unspecified (Status: affected)
**Dell EMC - PowerConnect 7000**
Affected versions:
- unspecified (Status: affected)
**Dell EMC - PowerConnect M6348**
Affected versions:
- unspecified (Status: affected)
**Dell EMC - PowerConnect M6220**
Affected versions:
- unspecified (Status: affected)
**Dell EMC - PowerConnect M8024**
Affected versions:
- unspecified (Status: affected)
**Dell EMC - PowerConnect M8024-K**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/article/sln318359/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6342
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 01:55 UTC
- **Last Updated**: September 10, 2024 at 15:18 UTC
- **Reserved Date**: June 26, 2024 at 03:23 UTC
- **Assigned By**: Zyxel
### Vulnerability Description
**UNSUPPORTED WHEN ASSIGNED** A command injection vulnerability in the export-cgi program of Zyxel NAS326 firmware versions through V5.21(AAZF.18)C0 and NAS542 firmware versions through V5.21(ABAG.15)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Zyxel - NAS326 firmware**
Affected versions:
- <= V5.21(AAZF.18)C0 (Status: affected)
**Zyxel - NAS542 firmware**
Affected versions:
- <= V5.21(ABAG.15)C0 (Status: affected)
### References
1. [](https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-nas-products-09-10-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12387
- **State**: PUBLISHED
- **Published Date**: June 10, 2019 at 11:34 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 28, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html)
2. [](https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2)
3. [](https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html)
4. [openSUSE-SU-2019:1760](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html)
5. [openSUSE-SU-2019:1785](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html)
6. [FEDORA-2019-b67877d7c2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/)
7. [USN-4308-2](https://usn.ubuntu.com/4308-2/)
8. [USN-4308-1](https://usn.ubuntu.com/4308-1/)
9. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5730
- **State**: PUBLISHED
- **Published Date**: October 30, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the individual net socket listen vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23731](http://www.securityfocus.com/bid/23731)
2. [MDKSA-2007:203](http://www.mandriva.com/security/advisories?name=MDKSA-2007:203)
3. [RHSA-2008:0194](http://www.redhat.com/support/errata/RHSA-2008-0194.html)
4. [qemu-net-socket-bo(38239)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38239)
5. [42985](http://osvdb.org/42985)
6. [DSA-1284](http://www.debian.org/security/2007/dsa-1284)
7. [25073](http://secunia.com/advisories/25073)
8. [](http://taviso.decsystem.org/virtsec.pdf)
9. [27486](http://secunia.com/advisories/27486)
10. [MDVSA-2008:162](http://www.mandriva.com/security/advisories?name=MDVSA-2008:162)
11. [oval:org.mitre.oval:def:10000](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000)
12. [29963](http://secunia.com/advisories/29963)
13. [ADV-2007-1597](http://www.vupen.com/english/advisories/2007/1597)
14. [29129](http://secunia.com/advisories/29129)
15. [25095](http://secunia.com/advisories/25095)
16. [20071030 Clarification on old QEMU/NE2000/Xen issues](http://www.attrition.org/pipermail/vim/2007-October/001842.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0650
- **State**: PUBLISHED
- **Published Date**: February 13, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in cpaint2.inc.php in the CPAINT library before 2.0.3, as used in multiple scripts, allows remote attackers to inject arbitrary web script or HTML via the cpaint_response_type parameter, which is displayed in a resulting error message, as demonstrated using a hex-encoded IFRAME tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1015608](http://securitytracker.com/id?1015608)
2. [20060210 CPAINT AJAX Library Cross Site Scripting](http://www.securityfocus.com/archive/1/424663/100/0/threaded)
3. [18765](http://secunia.com/advisories/18765)
4. [cpaint-response-type-xss(24594)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24594)
5. [16559](http://www.securityfocus.com/bid/16559)
6. [](http://cpaint.booleansystems.com/forums/viewtopic.php?t=98)
7. [](http://www.gulftech.org/?node=research&article_id=00097-02092006)
8. [ADV-2006-0487](http://www.vupen.com/english/advisories/2006/0487) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20634
- **State**: PUBLISHED
- **Published Date**: March 18, 2021 at 00:56 UTC
- **Last Updated**: August 03, 2024 at 17:45 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Improper access control vulnerability in Custom App of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and obtain the date of Custom App via unspecified vectors.
### Affected Products
**Cybozu, Inc. - Cybozu Office**
Affected versions:
- 10.0.0 to 10.8.4 (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN45797538/index.html)
2. [](https://kb.cybozu.support/article/36865/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1487
- **State**: PUBLISHED
- **Published Date**: March 11, 2024 at 17:56 UTC
- **Last Updated**: March 28, 2025 at 23:22 UTC
- **Reserved Date**: February 14, 2024 at 03:12 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Photos and Files Contest Gallery WordPress plugin before 21.3.1 does not sanitize and escape some parameters, which could allow users with a role as low as author to perform Cross-Site Scripting attacks.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Photos and Files Contest Gallery**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c028cd73-f30a-4c8b-870f-3071055f0496/)
### Credits
- Giulio
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32153
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 16:48 UTC
- **Last Updated**: September 16, 2024 at 16:43 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: Splunk
### Vulnerability Description
Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-297: Security Weakness
### Affected Products
**Splunk, Inc - Splunk Enterprise**
Affected versions:
- 9.0 (Status: affected)
**Splunk, Inc - Splunk Cloud Platform**
Affected versions:
- 8.2 (Status: affected)
### References
1. [](https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation)
2. [](https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates)
3. [](https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/)
4. [](https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/)
5. [](https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/)
6. [](https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/)
7. [](https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html)
### Credits
- Chris Green at Splunk |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58097
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 14:11 UTC
- **Last Updated**: May 26, 2025 at 05:16 UTC
- **Reserved Date**: March 06, 2025 at 15:52 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix RCU stall while reaping monitor destination ring
While processing the monitor destination ring, MSDUs are reaped from the
link descriptor based on the corresponding buf_id.
However, sometimes the driver cannot obtain a valid buffer corresponding
to the buf_id received from the hardware. This causes an infinite loop
in the destination processing, resulting in a kernel crash.
kernel log:
ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309
ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed
ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309
ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed
Fix this by skipping the problematic buf_id and reaping the next entry,
replacing the break with the next MSDU processing.
Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
### Affected Products
**Linux - Linux**
Affected versions:
- d5c65159f2895379e11ca13f62feabe93278985d (Status: affected)
- d5c65159f2895379e11ca13f62feabe93278985d (Status: affected)
**Linux - Linux**
Affected versions:
- 5.6 (Status: affected)
- 0 (Status: unaffected)
- 6.14.2 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b4991fc41745645f8050506f5a8578bd11e6b378)
2. [](https://git.kernel.org/stable/c/16c6c35c03ea73054a1f6d3302a4ce4a331b427d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47053
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 16:43 UTC
- **Reserved Date**: December 12, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the Digital Assets Manager module of DNN Corp DotNetNuke v7.0.0 to v9.10.2 allows attackers to execute arbitrary code via a crafted SVG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dnnsoftware.com/community/security/security-center)
2. [](https://www.dnnsoftware.com/community/security/security-center#:~:text=XSS%20in%20Digital%20Asset%20Manager) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28204
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 05:02 UTC
- **Last Updated**: September 17, 2024 at 03:38 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**ASUS - BMC firmware for Z10PR-D16**
Affected versions:
- 1.14.51 (Status: affected)
**ASUS - BMC firmware for ASMB8-iKVM**
Affected versions:
- 1.14.51 (Status: affected)
**ASUS - BMC firmware for Z10PE-D16 WS**
Affected versions:
- 1.14.2 (Status: affected)
### References
1. [](https://www.asus.com/content/ASUS-Product-Security-Advisory/)
2. [](https://www.asus.com/tw/support/callus/)
3. [](https://www.twcert.org.tw/tw/cp-132-4574-b61a6-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19833
- **State**: PUBLISHED
- **Published Date**: December 31, 2019 at 15:06 UTC
- **Last Updated**: August 05, 2024 at 11:44 UTC
- **Reserved Date**: December 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The owned function of a smart contract implementation for DDQ, an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SmartContractResearcher/SmartContractSecurity/blob/master/New%20Vulnerabilities%20Allow%20Anyone%20to%20Own%20Certain%20ERC20-Based%20Smart%20Contracts%28CVE-2018-19830%2C%20CVE-2018-19831%2C%20CVE-2018-19832%2C%20CVE-2018-19833%2C%20CVE-2018-19834%29/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2235
- **State**: PUBLISHED
- **Published Date**: December 09, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: June 09, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=607662)
2. [RHSA-2010:0775](http://www.redhat.com/support/errata/RHSA-2010-0775.html)
3. [](http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2638
- **State**: PUBLISHED
- **Published Date**: August 20, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: August 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in PHPFreeNews 1.40 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) NewsMode parameter to NewsCategoryForm.php, or the (2) Match or (3) NewsMode parameter to SearchResults.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16490](http://secunia.com/advisories/16490/)
2. [1014726](http://securitytracker.com/id?1014726)
3. [20050817 PHPFreeNews V1.40 and prior Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=112439254700016&w=2)
4. [14590](http://www.securityfocus.com/bid/14590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0605
- **State**: PUBLISHED
- **Published Date**: March 04, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: March 01, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2005:331](http://www.redhat.com/support/errata/RHSA-2005-331.html)
2. [RHSA-2005:412](http://www.redhat.com/support/errata/RHSA-2005-412.html)
3. [1013339](http://securitytracker.com/id?1013339)
4. [18049](http://secunia.com/advisories/18049)
5. [20060403-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U)
6. [SCOSA-2006.5](ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt)
7. [](http://bugs.gentoo.org/show_bug.cgi?id=83598)
8. [GLSA-200503-15](http://www.gentoo.org/security/en/glsa/glsa-200503-15.xml)
9. [DSA-723](http://www.debian.org/security/2005/dsa-723)
10. [19624](http://secunia.com/advisories/19624)
11. [](https://bugs.freedesktop.org/attachment.cgi?id=1909)
12. [APPLE-SA-2005-08-15](http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html)
13. [18316](http://secunia.com/advisories/18316)
14. [14460](http://secunia.com/advisories/14460)
15. [RHSA-2005:198](http://www.redhat.com/support/errata/RHSA-2005-198.html)
16. [FLSA-2006:152803](http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html)
17. [RHSA-2005:044](http://www.redhat.com/support/errata/RHSA-2005-044.html)
18. [GLSA-200503-08](http://security.gentoo.org/glsa/glsa-200503-08.xml)
19. [12714](http://www.securityfocus.com/bid/12714)
20. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
21. [](http://bugs.gentoo.org/show_bug.cgi?id=83655)
22. [RHSA-2005:473](http://www.redhat.com/support/errata/RHSA-2005-473.html)
23. [APPLE-SA-2005-08-17](http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html)
24. [SCOSA-2005.57](ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt)
25. [USN-97-1](https://usn.ubuntu.com/97-1/)
26. [oval:org.mitre.oval:def:10411](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10411)
27. [USN-92-1](https://usn.ubuntu.com/92-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22262
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 05:54 UTC
- **Last Updated**: February 13, 2025 at 17:33 UTC
- **Reserved Date**: January 08, 2024 at 18:43 UTC
- **Assigned By**: vmware
### Vulnerability Description
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Affected Products
**Spring - Spring Framework**
Affected versions:
- 6.1.x (Status: affected)
- 6.0.x (Status: affected)
- 5.3.x (Status: affected)
### References
1. [](https://spring.io/security/cve-2024-22262)
2. [](https://security.netapp.com/advisory/ntap-20240524-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0490
- **State**: PUBLISHED
- **Published Date**: January 19, 2011 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: January 18, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)](http://archives.seul.org/or/announce/Jan-2011/msg00000.html)
2. [](https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog)
3. [](http://blog.torproject.org/blog/tor-02129-released-security-patches)
4. [tor-libevent-dos(64889)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64889)
5. [](https://trac.torproject.org/projects/tor/ticket/2190)
6. [45953](http://www.securityfocus.com/bid/45953) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3981
- **State**: PUBLISHED
- **Published Date**: May 12, 2015 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: May 12, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SAP NetWeaver RFC SDK allows attackers to obtain sensitive information via unspecified vectors, aka SAP Security Note 2084037.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [74627](http://www.securityfocus.com/bid/74627)
2. [](https://erpscan.io/press-center/blog/sap-security-notes-april-2015/)
3. [1032308](http://www.securitytracker.com/id/1032308) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1917
- **State**: PUBLISHED
- **Published Date**: July 05, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 21:07 UTC
- **Reserved Date**: June 08, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
kpopper 1.0 and earlier allows local users to create and overwrite arbitrary files via a symlink attack on the .popper-new temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zataz.net/adviso/kpopper-06152005.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42700
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 00:54 UTC
- **Last Updated**: December 02, 2024 at 17:37 UTC
- **Reserved Date**: September 13, 2023 at 07:40 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9289
- **State**: PUBLISHED
- **Published Date**: June 16, 2020 at 20:12 UTC
- **Last Updated**: October 25, 2024 at 14:25 UTC
- **Reserved Date**: February 19, 2020 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key.
### Affected Products
**n/a - Fortinet FortiManager**
Affected versions:
- FortiManager 6.2.3 and below (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-19-007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17503
- **State**: PUBLISHED
- **Published Date**: December 11, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ReadGRAYImage in coders/gray.c in GraphicsMagick 1.3.26 has a magick/import.c ImportGrayQuantumType heap-based buffer over-read via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/graphicsmagick/bugs/522/)
2. [DSA-4321](https://www.debian.org/security/2018/dsa-4321)
3. [[debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html)
4. [](http://hg.code.sf.net/p/graphicsmagick/code/rev/460ef5e858ad)
5. [[debian-lts-announce] 20180108 [SECURITY] [DLA 1231-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html)
6. [FEDORA-2019-da4c20882c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/)
7. [FEDORA-2019-425a1aa7c9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/)
8. [USN-4248-1](https://usn.ubuntu.com/4248-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6129
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 16:36 UTC
- **Last Updated**: October 14, 2024 at 14:55 UTC
- **Reserved Date**: November 14, 2023 at 16:12 UTC
- **Assigned By**: openssl
### Vulnerability Description
Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications running
on PowerPC CPU based platforms if the CPU provides vector instructions.
Impact summary: If an attacker can influence whether the POLY1305 MAC
algorithm is used, the application state might be corrupted with various
application dependent consequences.
The POLY1305 MAC (message authentication code) implementation in OpenSSL for
PowerPC CPUs restores the contents of vector registers in a different order
than they are saved. Thus the contents of some of these vector registers
are corrupted when returning to the caller. The vulnerable code is used only
on newer PowerPC processors supporting the PowerISA 2.07 instructions.
The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However unless the compiler uses the vector registers for storing
pointers, the most likely consequence, if any, would be an incorrect result
of some application dependent calculations or a crash leading to a denial of
service.
The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3. If this cipher is enabled on the server a malicious
client can influence whether this AEAD cipher is used. This implies that
TLS server applications using OpenSSL can be potentially impacted. However
we are currently not aware of any concrete application that would be affected
by this issue therefore we consider this a Low severity security issue.
### Weakness Classification (CWE)
- CWE-440: Security Weakness
### Affected Products
**OpenSSL - OpenSSL**
Affected versions:
- 3.2.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
### References
1. [OpenSSL Advisory](https://www.openssl.org/news/secadv/20240109.txt)
2. [3.2.1 git commit](https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04)
3. [3.1.5 git commit](https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015)
4. [3.0.13 git commit](https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35)
### Credits
- Sverker Eriksson
- Rohan McLure |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39584
- **State**: PUBLISHED
- **Published Date**: August 28, 2024 at 05:46 UTC
- **Last Updated**: August 28, 2024 at 14:15 UTC
- **Reserved Date**: June 26, 2024 at 02:16 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1392: Security Weakness
### Affected Products
**Dell - Dell Client Platform BIOS**
Affected versions:
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000227594/dsa-2024-354)
### Credits
- CVE-2024-39584: Dell Technologies would like to thank BINARLY REsearch team for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3049
- **State**: PUBLISHED
- **Published Date**: September 26, 2022 at 15:01 UTC
- **Last Updated**: May 21, 2025 at 16:00 UTC
- **Reserved Date**: August 30, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html)
2. [](https://crbug.com/1316892)
3. [GLSA-202209-23](https://security.gentoo.org/glsa/202209-23)
4. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41884
- **State**: PUBLISHED
- **Published Date**: November 18, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 16:06 UTC
- **Reserved Date**: September 30, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. We have patched the issue in GitHub commit 2b56169c16e375c521a3bc8ea658811cc0793784. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-670: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.10.0, < 2.10.1 (Status: affected)
- >= 2.9.0, < 2.9.3 (Status: affected)
- < 2.8.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636)
2. [](https://github.com/tensorflow/tensorflow/commit/2b56169c16e375c521a3bc8ea658811cc0793784) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19898
- **State**: PUBLISHED
- **Published Date**: January 23, 2020 at 20:54 UTC
- **Last Updated**: August 05, 2024 at 02:32 UTC
- **Reserved Date**: December 18, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In IXP EasyInstall 6.2.13723, there are cleartext credentials in network communication on TCP port 20050 when using the Administrator console remotely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://improsec.com/tech-blog/multiple-vulnerabilities-in-easyinstall-rmm-and-deployment-software) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8453
- **State**: PUBLISHED
- **Published Date**: May 03, 2017 at 05:13 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: May 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 have an out-of-bounds read that allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted font in a PDF document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [98317](http://www.securityfocus.com/bid/98317)
2. [](https://www.foxitsoftware.com/support/security-bulletins.php)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-17-134/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43771
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 23:04 UTC
- **Last Updated**: March 18, 2025 at 13:38 UTC
- **Reserved Date**: August 15, 2024 at 20:40 UTC
- **Assigned By**: google_android
### Vulnerability Description
In gatts_process_read_req of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 15 (Status: affected)
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2025-01-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46089
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 00:00 UTC
- **Last Updated**: April 18, 2025 at 13:50 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
74cms <=3.33 is vulnerable to remote code execution (RCE) in the background interface apiadmin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/Q16G/laravel_bug/blob/master/74cms.md)
2. [](https://github.com/Q16G/cve_detail/blob/main/74cms/unzipRCE.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18721
- **State**: PUBLISHED
- **Published Date**: October 28, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 11:16 UTC
- **Reserved Date**: October 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue was discovered in admin/link/editlink?id=5 in YUNUCMS 1.1.5.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/source-trace/yunucms/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0036
- **State**: PUBLISHED
- **Published Date**: April 17, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2014-3573](http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html)
2. [FEDORA-2014-3526](http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html)
3. [[oss-security] 20140306 CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client](http://seclists.org/oss-sec/2014/q1/509)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1058595) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21285
- **State**: PUBLISHED
- **Published Date**: January 19, 2022 at 11:23 UTC
- **Last Updated**: September 24, 2024 at 20:27 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - MySQL Cluster**
Affected versions:
- 7.4.34 and prior (Status: affected)
- 7.5.24 and prior (Status: affected)
- 7.6.20 and prior (Status: affected)
- 8.0.27 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2022.html)
2. [](https://security.netapp.com/advisory/ntap-20220121-0008/)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-089/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1311
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [H-21](http://ciac.llnl.gov/ciac/bulletins/h-21.shtml)
2. [HPSBUX9701-046](http://ciac.llnl.gov/ciac/bulletins/h-21.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4114
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 05:31 UTC
- **Last Updated**: August 02, 2024 at 07:17 UTC
- **Reserved Date**: August 02, 2023 at 20:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHP Jabbers Night Club Booking Software 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235961 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PHP Jabbers - Night Club Booking Software**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.235961)
2. [](https://vuldb.com/?ctiid.235961)
3. [](http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html)
### Credits
- skalvin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27531
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 14:55 UTC
- **Last Updated**: June 10, 2025 at 15:30 UTC
- **Reserved Date**: February 28, 2025 at 03:26 UTC
- **Assigned By**: apache
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Apache InLong.
This issue affects Apache InLong: from 1.13.0 before 2.1.0,
this issue would allow an authenticated attacker to read arbitrary files by double writing the param.
Users are recommended to upgrade to version 2.1.0, which fixes the issue.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Apache Software Foundation - Apache InLong**
Affected versions:
- 1.13.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/r62lkqrr739wvcb60j6ql6q63rh4bxx5)
### Credits
- Ming |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5156
- **State**: PUBLISHED
- **Published Date**: October 19, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2015:2292](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html)
2. [RHSA-2016:0855](http://rhn.redhat.com/errata/RHSA-2016-0855.html)
3. [DSA-3364](http://www.debian.org/security/2015/dsa-3364)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
5. [SUSE-SU-2015:1727](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html)
6. [RHSA-2015:1978](http://rhn.redhat.com/errata/RHSA-2015-1978.html)
7. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
8. [FEDORA-2015-0253d1f070](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171454.html)
9. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39)
10. [](https://github.com/torvalds/linux/commit/48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39)
11. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html)
12. [76230](http://www.securityfocus.com/bid/76230)
13. [USN-2774-1](http://www.ubuntu.com/usn/USN-2774-1)
14. [](https://bugzilla.redhat.com/show_bug.cgi?id=1243852)
15. [USN-2773-1](http://www.ubuntu.com/usn/USN-2773-1)
16. [FEDORA-2015-c15f00eb95](http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169378.html)
17. [1034045](http://www.securitytracker.com/id/1034045)
18. [USN-2777-1](http://www.ubuntu.com/usn/USN-2777-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1074
- **State**: PUBLISHED
- **Published Date**: March 29, 2022 at 05:50 UTC
- **Last Updated**: April 15, 2025 at 14:44 UTC
- **Reserved Date**: March 25, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in TEM FLEX-1085 1.6.0 and classified as problematic. Using the input <h1>HTML Injection</h1> in the WiFi settings of the dashboard leads to html injection.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**TEM - FLEX-1085**
Affected versions:
- 1.6.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.194845) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2792
- **State**: PUBLISHED
- **Published Date**: September 02, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: September 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the custom_welcome_page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16617](http://secunia.com/advisories/16617/)
2. [phpldapadmin-welcome-file-include(22103)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22103)
3. [20050829 phpLDAPadmin 0.9.6 - 0.9.7/alpha5 (possibly prior versions)](http://marc.info/?l=bugtraq&m=112542447219235&w=2)
4. [14695](http://www.securityfocus.com/bid/14695)
5. [](http://www.rgod.altervista.org/phpldap.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11851
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 11:29 UTC
- **Last Updated**: January 15, 2025 at 14:33 UTC
- **Reserved Date**: November 26, 2024 at 21:18 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The NitroPack plugin for WordPress is vulnerable to unauthorized arbitrary transient update due to a missing capability check on the nitropack_rml_notification function in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update arbitrary transients. Note, that these transients can only be updated to integers and not arbitrary values.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**nitropack - NitroPack – Caching & Speed Optimization for Core Web Vitals, Defer CSS & JS, Lazy load Images and CDN**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8945bae7-2224-4d9f-b693-10c94c94dea0?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3211235/nitropack)
### Credits
- Sean Murphy |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19999
- **State**: PUBLISHED
- **Published Date**: June 07, 2019 at 16:13 UTC
- **Last Updated**: August 05, 2024 at 11:51 UTC
- **Reserved Date**: December 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The local management interface in SolarWinds Serv-U FTP Server 15.1.6.25 has incorrect access controls that permit local users to bypass authentication in the application and execute code in the context of the Windows SYSTEM account, leading to privilege escalation. To exploit this vulnerability, an attacker must have local access the the host running Serv-U, and a Serv-U administrator have an active management console session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.themissinglink.com.au/security-advisories-cve-2018-19999)
2. [](https://seclists.org/fulldisclosure/2019/May/46) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26441
- **State**: PUBLISHED
- **Published Date**: August 02, 2023 at 12:23 UTC
- **Last Updated**: August 02, 2024 at 11:46 UTC
- **Reserved Date**: February 22, 2023 at 20:42 UTC
- **Assigned By**: OX
### Vulnerability Description
Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**OX Software GmbH - OX App Suite**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf)
2. [](https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json)
3. [](http://seclists.org/fulldisclosure/2023/Aug/8)
4. [](http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4976
- **State**: PUBLISHED
- **Published Date**: July 16, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:34 UTC
- **Reserved Date**: July 16, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dell SonicWall Scrutinizer 11.0.1 allows remote authenticated users to change user passwords via the user ID in the savePrefs parameter in a change password request to cgi-bin/admin.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140710 Dell Scrutinizer 11.01 multiple vulnerabilities](http://seclists.org/fulldisclosure/2014/Jul/44)
2. [dell-scrutinizer-admin-sec-bypass(94438)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94438)
3. [](http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html)
4. [68495](http://www.securityfocus.com/bid/68495)
5. [](https://gist.github.com/brandonprry/36b4b8df1cde279a9305)
6. [](https://gist.github.com/brandonprry/76741d9a0d4f518fe297) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0854
- **State**: PUBLISHED
- **Published Date**: May 11, 2023 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 20:59 UTC
- **Reserved Date**: February 16, 2023 at 00:00 UTC
- **Assigned By**: Canon
### Vulnerability Description
Buffer overflow in NetBIOS QNAME registering and communication process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Canon Inc. - Canon Office/Small Office Multifunction Printers and Laser Printers**
Affected versions:
- Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe. (Status: affected)
### References
1. [](https://www.canon-europe.com/support/product-security-latest-news/)
2. [](https://psirt.canon/advisory-information/cp2023-001/)
3. [](https://canon.jp/support/support-info/230414vulnerability-response)
4. [](https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1816
- **State**: PUBLISHED
- **Published Date**: August 14, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Forman before 1.7.4 does not verify SSL certificates for LDAP connections, which allows man-in-the-middle attackers to spoof LDAP servers via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:1592](https://access.redhat.com/errata/RHSA-2015:1592)
2. [](https://github.com/theforeman/foreman/pull/2265)
3. [](http://projects.theforeman.org/issues/9858)
4. [RHSA-2015:1591](https://access.redhat.com/errata/RHSA-2015:1591)
5. [](https://groups.google.com/forum/#%21topic/foreman-announce/9ZnuPcplNLI) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2507
- **State**: PUBLISHED
- **Published Date**: July 14, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 23:00 UTC
- **Reserved Date**: June 15, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
libraries/server_synchronize.lib.php in the Synchronize implementation in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly quote regular expressions, which allows remote authenticated users to inject a PCRE e (aka PREG_REPLACE_EVAL) modifier, and consequently execute arbitrary PHP code, by leveraging the ability to modify the SESSION superglobal array.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt)
2. [[oss-security] 20110628 CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/28/2)
3. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/)
4. [45292](http://secunia.com/advisories/45292)
5. [[oss-security] 20110628 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/28/6)
6. [](http://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php)
7. [[oss-security] 20110628 Re: [Phpmyadmin-security] CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/28/8)
8. [MDVSA-2011:124](http://www.mandriva.com/security/advisories?name=MDVSA-2011:124)
9. [8306](http://securityreason.com/securityalert/8306)
10. [](http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=69fb0f8e7dc38075427aceaf09bcac697d0590ff)
11. [45139](http://secunia.com/advisories/45139)
12. [](http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html)
13. [DSA-2286](http://www.debian.org/security/2011/dsa-2286)
14. [](http://0x6a616d6573.blogspot.com/2011/07/phpmyadmin-fud.html)
15. [20110707 phpMyAdmin 3.x Multiple Remote Code Executions](http://www.securityfocus.com/archive/1/518804/100/0/threaded)
16. [[oss-security] 20110629 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/29/11)
17. [73613](http://www.osvdb.org/73613)
18. [](http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html)
19. [45315](http://secunia.com/advisories/45315)
20. [FEDORA-2011-9144](http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39485
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:43 UTC
- **Last Updated**: May 23, 2025 at 13:37 UTC
- **Reserved Date**: April 16, 2025 at 06:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Tour | Travel Agency WordPress allows Object Injection. This issue affects Grand Tour | Travel Agency WordPress: from n/a through 5.5.1.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**ThemeGoods - Grand Tour | Travel Agency WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/grandtour/vulnerability/wordpress-grandtour-theme-5-5-1-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2869
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 04:38 UTC
- **Last Updated**: October 23, 2024 at 14:48 UTC
- **Reserved Date**: May 24, 2023 at 16:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP-Members Membership plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the do_field_reorder function in versions up to, and including, 3.4.7.3. This makes it possible for authenticated attackers with subscriber-level access to reorder form elements on login forms.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**cbutlerjr - WP-Members Membership Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bf05a79a-0375-4c9d-bbf0-a87484327b87?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wp-members/trunk/includes/admin/tabs/class-wp-members-admin-tab-fields.php?rev=2895180#L799)
3. [](https://plugins.trac.wordpress.org/changeset/2920897/wp-members/trunk/includes/admin/tabs/class-wp-members-admin-tab-fields.php)
### Credits
- Marco Wotschka |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46188
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 00:00 UTC
- **Last Updated**: May 10, 2025 at 02:05 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in superadmin_phpmyadmin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/@bijay.kumar1857/sql-injection-to-rce-exploitation-0a5048e592be)
2. [](https://github.com/x6vrn/mitre/blob/main/CVE-2025-46188.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0137
- **State**: PUBLISHED
- **Published Date**: June 23, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:10 UTC
- **Reserved Date**: February 11, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in init for IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system panic) as a result of "page invalidation issues."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10549](http://www.securityfocus.com/bid/10549)
2. [irix-page-dos(16417)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16417)
3. [20040601-01-P](ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc)
4. [11872](http://secunia.com/advisories/11872)
5. [7124](http://www.osvdb.org/7124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21384
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 17:01 UTC
- **Last Updated**: September 06, 2024 at 20:11 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Package Manager, there is a possible possible permissions bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27430, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27430
- **State**: REJECTED
- **Published Date**: May 17, 2024 at 12:02 UTC
- **Last Updated**: May 25, 2024 at 13:27 UTC
- **Reserved Date**: February 25, 2024 at 13:47 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47152
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 20:03 UTC
- **Last Updated**: May 30, 2025 at 14:22 UTC
- **Reserved Date**: October 31, 2023 at 00:13 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**IBM - Db2 for Linux, UNIX and Windows**
Affected versions:
- 11.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7105605)
2. [](https://security.netapp.com/advisory/ntap-20240307-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28305
- **State**: REJECTED
- **Published Date**: January 22, 2021 at 19:44 UTC
- **Last Updated**: January 22, 2021 at 19:44 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: Mend
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2739
- **State**: PUBLISHED
- **Published Date**: July 06, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: March 25, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:1229](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html)
2. [RHSA-2015:1455](http://rhn.redhat.com/errata/RHSA-2015-1455.html)
3. [SUSE-SU-2015:1268](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html)
4. [GLSA-201512-10](https://security.gentoo.org/glsa/201512-10)
5. [75541](http://www.securityfocus.com/bid/75541)
6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
7. [DSA-3324](http://www.debian.org/security/2015/dsa-3324)
8. [USN-2673-1](http://www.ubuntu.com/usn/USN-2673-1)
9. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1168207)
10. [1032784](http://www.securitytracker.com/id/1032784)
11. [RHSA-2015:1207](http://rhn.redhat.com/errata/RHSA-2015-1207.html)
12. [](http://www.mozilla.org/security/announce/2015/mfsa2015-66.html)
13. [SUSE-SU-2015:1269](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html)
14. [openSUSE-SU-2015:1266](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html)
15. [USN-2656-1](http://www.ubuntu.com/usn/USN-2656-1)
16. [SUSE-SU-2015:1449](http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html)
17. [1032783](http://www.securitytracker.com/id/1032783)
18. [DSA-3300](http://www.debian.org/security/2015/dsa-3300)
19. [USN-2656-2](http://www.ubuntu.com/usn/USN-2656-2)
20. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7659
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The ExpeditersOnline.com Forum (aka com.quoord.tapatalkeo.activity) application 3.7.13 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#327473](http://www.kb.cert.org/vuls/id/327473)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12351
- **State**: PUBLISHED
- **Published Date**: November 30, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 18:36 UTC
- **Reserved Date**: August 03, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the guest shell feature of Cisco NX-OS System Software could allow an authenticated, local attacker to read and send packets outside the scope of the guest shell container. An attacker would need valid administrator credentials to perform this attack. The vulnerability is due to insufficient internal security measures in the guest shell feature. An attacker could exploit this vulnerability by sending or receiving packets on the device-internal network outside of the guest shell container, aka "Unauthorized Internal Interface Access." This vulnerability affects the following products running Cisco NX-OS System Software: Nexus 3000 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvf33038.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**n/a - Cisco NX-OS**
Affected versions:
- Cisco NX-OS (Status: affected)
### References
1. [102019](http://www.securityfocus.com/bid/102019)
2. [1039932](http://www.securitytracker.com/id/1039932)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23312
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 15:17 UTC
- **Last Updated**: August 03, 2024 at 03:36 UTC
- **Reserved Date**: January 18, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP9 Security Patch 1). The integrated web application "Online Help" in affected product contains a Cross-Site Scripting (XSS) vulnerability that could be exploited if unsuspecting users are tricked into accessing a malicious link.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Siemens - Spectrum Power 4**
Affected versions:
- All versions < V4.70 SP9 Security Patch 1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-831168.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6083
- **State**: REJECTED
- **Last Updated**: November 13, 2023 at 23:39 UTC
- **Reserved Date**: November 10, 2023 at 22:03 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8361
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:20 UTC
- **Reserved Date**: September 28, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. The application uses a hard-coded username with no password allowing an attacker into the system without authentication.
### Affected Products
**n/a - Lynxspring JENEsys BAS Bridge 1.1.8 and older**
Affected versions:
- Lynxspring JENEsys BAS Bridge 1.1.8 and older (Status: affected)
### References
1. [94344](http://www.securityfocus.com/bid/94344)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9323
- **State**: PUBLISHED
- **Published Date**: March 18, 2020 at 13:11 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: February 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aquaforest TIFF Server 4.0 allows Unauthenticated File and Directory Enumeration via tiffserver/tssp.aspx.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.criticalstart.com/resources/)
2. [](https://www.aquaforest.com/en/release_history.asp)
3. [](https://www.criticalstart.com/multiple-vulnerabilities-discovered-in-tiff-server-from-aquaforest/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31475
- **State**: PUBLISHED
- **Published Date**: May 21, 2021 at 14:40 UTC
- **Last Updated**: August 03, 2024 at 23:03 UTC
- **Reserved Date**: April 16, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Job Scheduler 2020.2.1 HF 2. Authentication is required to exploit this vulnerability. The specific flaw exists within the JobRouterService WCF service. The issue is due to the WCF service configuration, which allows a critical resource to be accessed by unprivileged users. An attacker can leverage this vulnerability to execute code in the context of an administrator. Was ZDI-CAN-12007.
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**SolarWinds - Orion Job Scheduler**
Affected versions:
- 2020.2.1 HF 2 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-605/)
2. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/orion_platform_2020-2-5_release_notes.htm)
### Credits
- Harrison Neal |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0591
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: July 27, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Oracle JSP 1.0.x through 1.1.1 and Oracle 8.1.7 iAS Release 1.0.2 can allow a remote attacker to read or execute arbitrary .jsp files via a '..' (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2286](http://www.securityfocus.com/bid/2286)
2. [20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root](http://archives.neohapsis.com/archives/bugtraq/2001-02/0239.html)
3. [oracle-handlers-directory-traversal(5986)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5986) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15494
- **State**: REJECTED
- **Published Date**: January 23, 2018 at 17:00 UTC
- **Last Updated**: January 23, 2018 at 16:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10743, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10743
- **State**: PUBLISHED
- **Published Date**: November 03, 2024 at 21:31 UTC
- **Last Updated**: November 04, 2024 at 17:11 UTC
- **Reserved Date**: November 02, 2024 at 18:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been classified as problematic. Affected is an unknown function of the file /shopping/admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php. The manipulation of the argument value leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PHPGurukul - Online Shopping Portal**
Affected versions:
- 2.0 (Status: affected)
### References
1. [VDB-282912 | PHPGurukul Online Shopping Portal editable_ajax.php cross site scripting](https://vuldb.com/?id.282912)
2. [VDB-282912 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282912)
3. [Submit #436060 | PHPGurukul Online Shopping Portal 2.0 Improper Neutralization of Alternate XSS Syntax](https://vuldb.com/?submit.436060)
4. [](https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(editable_ajax.php).md)
5. [](https://phpgurukul.com/)
### Credits
- secuserx (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33448
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 12:26 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cesanta/mjs/issues/170)
2. [](https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3880
- **State**: PUBLISHED
- **Published Date**: November 29, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Omnistar KBase 4.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) article_id parameter in users/comments.php, (2) category_id and (3) id parameters in users/kb.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17773](http://secunia.com/advisories/17773)
2. [ADV-2005-2623](http://www.vupen.com/english/advisories/2005/2623)
3. [](http://pridels0.blogspot.com/2005/11/omnistar-kbase-sql-inj-vuln.html)
4. [21204](http://www.osvdb.org/21204)
5. [21203](http://www.osvdb.org/21203)
6. [15635](http://www.securityfocus.com/bid/15635) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4626
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 19:59 UTC
- **Last Updated**: March 25, 2025 at 17:37 UTC
- **Reserved Date**: December 21, 2022 at 09:36 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The PPWP WordPress plugin before 1.8.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - PPWP**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0309
- **State**: PUBLISHED
- **Published Date**: May 07, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:14 UTC
- **Reserved Date**: May 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19990212 i386 trace-trap handling when DDB was configured could cause a system crash.](http://www.openbsd.org/errata24.html#trctrap)
2. [6126](http://www.osvdb.org/6126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0704
- **State**: PUBLISHED
- **Published Date**: April 22, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in API features in Cisco Unified MeetingPlace 8.6(1.9) allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus95884.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150421 Cisco Unified MeetingPlace Server Multiple State Changing URL API Functionalities Cross-Site Request Forgery Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=38460)
2. [1032334](http://www.securitytracker.com/id/1032334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1746
- **State**: PUBLISHED
- **Published Date**: March 30, 2023 at 23:00 UTC
- **Last Updated**: November 22, 2024 at 21:49 UTC
- **Reserved Date**: March 30, 2023 at 19:31 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Dreamer CMS up to 3.5.0. Affected is an unknown function of the component File Upload Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-224634 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Dreamer CMS**
Affected versions:
- 3.0 (Status: affected)
- 3.1 (Status: affected)
- 3.2 (Status: affected)
- 3.3 (Status: affected)
- 3.4 (Status: affected)
- 3.5 (Status: affected)
### References
1. [](https://vuldb.com/?id.224634)
2. [](https://vuldb.com/?ctiid.224634)
3. [](https://github.com/iteachyou-wjn/dreamer_cms/issues/11)
### Credits
- Xinca0 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22363
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 16:57 UTC
- **Last Updated**: January 07, 2025 at 17:37 UTC
- **Reserved Date**: January 03, 2025 at 13:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in ORION Allada T-shirt Designer for Woocommerce.This issue affects Allada T-shirt Designer for Woocommerce: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ORION - Allada T-shirt Designer for Woocommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/allada-tshirt-designer-for-woocommerce/vulnerability/wordpress-allada-t-shirt-designer-for-woocommerce-plugin-1-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5664
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Spider Solitaire (aka com.mobilityware.spider) application 3.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#194329](http://www.kb.cert.org/vuls/id/194329)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35797
- **State**: PUBLISHED
- **Published Date**: July 03, 2023 at 09:08 UTC
- **Last Updated**: February 13, 2025 at 16:55 UTC
- **Reserved Date**: June 17, 2023 at 19:36 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.
This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.
Before version 6.1.1 it was possible to bypass the security check to RCE via
principal parameter. For this to be exploited it requires access to modifying the connection details.
It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache Airflow Apache Hive Provider**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/31983)
2. [](https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y)
3. [](http://www.openwall.com/lists/oss-security/2023/07/12/3)
### Credits
- id_No2015429 of 3H Secruity Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33023
- **State**: PUBLISHED
- **Published Date**: August 05, 2024 at 14:21 UTC
- **Last Updated**: August 05, 2024 at 14:42 UTC
- **Reserved Date**: April 23, 2024 at 04:42 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- MDM9628 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA6174A (Status: affected)
- QCA6391 (Status: affected)
- QCA6426 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCM4325 (Status: affected)
- QCM4490 (Status: affected)
- QCM5430 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6024 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9024 (Status: affected)
- QCS410 (Status: affected)
- QCS4490 (Status: affected)
- QCS5430 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8530P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD660 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SG4150P (Status: affected)
- SG8275P (Status: affected)
- SM6370 (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM8550P (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 660 Mobile Platform (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon X12 LTE Modem (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- TalynPlus (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9335 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46548
- **State**: PUBLISHED
- **Published Date**: January 27, 2022 at 20:22 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via add_lineno_map_item at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cesanta/mjs/issues/228) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6732
- **State**: PUBLISHED
- **Published Date**: April 21, 2009 at 18:07 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: April 21, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Language skin object in DotNetNuke before 4.8.4 allows remote attackers to inject arbitrary web script or HTML via "newly generated paths."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29686](http://www.securityfocus.com/bid/29686)
2. [30617](http://secunia.com/advisories/30617)
3. [dotnetnuke-lso-xss(43030)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43030)
4. [](http://www.dotnetnuke.com/News/SecurityPolicy/SecurityBulletinno20/tabid/1167/Default.aspx)
5. [46322](http://www.osvdb.org/46322) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.