System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8507, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8507 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8507 - **State**: PUBLISHED - **Published Date**: December 08, 2015 at 23:00 UTC - **Last Updated**: August 06, 2024 at 08:20 UTC - **Reserved Date**: December 08, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description mediaserver in Android 6.0 before 2015-12-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 24157524, a different vulnerability than CVE-2015-6616, CVE-2015-8505, and CVE-2015-8506. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2015-12-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43483 - **State**: PUBLISHED - **Published Date**: April 08, 2022 at 15:15 UTC - **Last Updated**: August 04, 2024 at 03:55 UTC - **Reserved Date**: November 08, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An Access Control vulnerability exists in CLARO KAON CG3000 1.00.67 in the router configuration, which could allow a malicious user to read or update the configuraiton without authentication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://alexandrevvo.medium.com/improper-access-control-no-control-at-all-in-kaon-cg3000-router-c225d2434ec1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24947 - **State**: PUBLISHED - **Published Date**: February 07, 2022 at 15:47 UTC - **Last Updated**: August 03, 2024 at 19:49 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The RVM WordPress plugin before 6.4.2 does not have proper authorisation, CSRF checks and validation of the rvm_upload_regions_file_path parameter in the rvm_import_regions AJAX action, allowing any authenticated user, such as subscriber, to read arbitrary files on the web server ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **Unknown - RVM – Responsive Vector Maps** Affected versions: - 6.4.2 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15370 - **State**: PUBLISHED - **Published Date**: October 05, 2018 at 14:00 UTC - **Last Updated**: November 26, 2024 at 14:36 UTC - **Reserved Date**: August 17, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco IOS ROM Monitor (ROMMON) Software for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, local attacker to bypass Cisco Secure Boot validation checks and load a compromised software image on an affected device. The vulnerability is due to the presence of a hidden command in the affected software. An attacker could exploit this vulnerability by connecting to an affected device via the console, forcing the device into ROMMON mode, and writing a malicious pattern to a specific memory address on the device. A successful exploit could allow the attacker to bypass signature validation checks by Cisco Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco. ### Weakness Classification (CWE) - CWE-264: Security Weakness ### Affected Products **Cisco - Cisco Catalyst 6800 Series Switches** Affected versions: - n/a (Status: affected) ### References 1. [20180926 Cisco Catalyst 6800 Series Switches ROM Monitor Software Secure Boot Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-catalyst6800) 2. [105412](http://www.securityfocus.com/bid/105412)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30994 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:54 UTC - **Last Updated**: June 06, 2025 at 15:17 UTC - **Reserved Date**: March 26, 2025 at 09:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Emraan Cheema CubeWP – All-in-One Dynamic Content Framework allows Cross Site Request Forgery. This issue affects CubeWP – All-in-One Dynamic Content Framework: from n/a through 1.1.23. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Emraan Cheema - CubeWP – All-in-One Dynamic Content Framework** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/cubewp-framework/vulnerability/wordpress-cubewp-all-in-one-dynamic-content-framework-plugin-1-1-23-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve) ### Credits - Nguyen Tran Tuan Dung (domiee13) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3785 - **State**: PUBLISHED - **Published Date**: September 15, 2021 at 12:05 UTC - **Last Updated**: August 03, 2024 at 17:09 UTC - **Reserved Date**: September 09, 2021 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **yourls - yourls/yourls** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638) 2. [](https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3061 - **State**: PUBLISHED - **Published Date**: September 03, 2009 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:07 UTC - **Reserved Date**: September 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in lesson.php in Alqatari Q R Script 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/0909-exploits/alqatarigroup-sql.txt) 2. [36554](http://secunia.com/advisories/36554)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10488 - **State**: PUBLISHED - **Published Date**: May 17, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 07:39 UTC - **Reserved Date**: April 27, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D Texture Width structures. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5420. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Foxit - Foxit Reader** Affected versions: - 9.0.0.29935 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://zerodayinitiative.com/advisories/ZDI-18-398)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6101 - **State**: PUBLISHED - **Published Date**: February 10, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 11:20 UTC - **Reserved Date**: February 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in click.php in Adult Banner Exchange Website allows remote attackers to execute arbitrary SQL commands via the targetid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [abew-click-sql-injection(45573)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45573) 2. [9387](https://www.exploit-db.com/exploits/9387) 3. [31510](http://www.securityfocus.com/bid/31510) 4. [6909](https://www.exploit-db.com/exploits/6909) 5. [32067](http://secunia.com/advisories/32067) 6. [](http://packetstorm.linuxsecurity.com/0809-exploits/abe-sql.txt) 7. [bes-click-sql-injection(52328)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52328)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48494 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 10:15 UTC - **Last Updated**: October 07, 2024 at 14:04 UTC - **Reserved Date**: November 16, 2023 at 23:29 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4923, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4923 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4923 - **State**: PUBLISHED - **Published Date**: September 21, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 19:32 UTC - **Reserved Date**: September 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in search.php in eSyndiCat Portal System allows remote attackers to inject arbitrary web script or HTML via the what parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-3710](http://www.vupen.com/english/advisories/2006/3710) 2. [21979](http://secunia.com/advisories/21979) 3. [20106](http://www.securityfocus.com/bid/20106) 4. [esyndicat-search-xss(29026)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29026) 5. [1618](http://securityreason.com/securityalert/1618) 6. [20060919 eSyndiCat Portal System XSS Vuln.](http://www.securityfocus.com/archive/1/446377/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33610 - **State**: PUBLISHED - **Published Date**: November 26, 2024 at 07:37 UTC - **Last Updated**: December 10, 2024 at 14:58 UTC - **Reserved Date**: May 22, 2024 at 09:00 UTC - **Assigned By**: jpcert ### Vulnerability Description "sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **Sharp Corporation - Multiple MFPs (multifunction printers)** Affected versions: - See the information provided by Sharp Corporation listed under [References] (Status: affected) **Toshiba Tec Corporation - Multiple MFPs (multifunction printers)** Affected versions: - See the information provided by Toshiba Tec Corporation listed under [References] (Status: affected) ### References 1. [](https://global.sharp/products/copier/info/info_security_2024-05.html) 2. [](https://jp.sharp/business/print/information/info_security_2024-05.html) 3. [](https://www.toshibatec.com/information/20240531_02.html) 4. [](https://www.toshibatec.co.jp/information/20240531_02.html) 5. [](https://jvn.jp/en/vu/JVNVU93051062/) 6. [](https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1843 - **State**: PUBLISHED - **Published Date**: April 03, 2007 at 16:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in gmapfactory/params.php in MapLab 2.2.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the gszAppPath parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-1203](http://www.vupen.com/english/advisories/2007/1203) 2. [20070402 Maplab <= 2.2.1 (gszAppPath) Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/464462/100/0/threaded) 3. [20070402 Re: Maplab <= 2.2.1 (gszAppPath) Remote File InclusionVulnerability](http://www.securityfocus.com/archive/1/464490/100/0/threaded) 4. [3638](https://www.exploit-db.com/exploits/3638) 5. [34620](http://osvdb.org/34620) 6. [23249](http://www.securityfocus.com/bid/23249) 7. [maplab-params-file-include(33360)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33360) 8. [20070402 Re: Maplab <= 2.2.1 (gszAppPath) Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/464503/100/0/threaded) 9. [24715](http://secunia.com/advisories/24715)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4040 - **State**: PUBLISHED - **Published Date**: August 24, 2022 at 15:13 UTC - **Last Updated**: August 03, 2024 at 17:16 UTC - **Reserved Date**: December 02, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulnerability is system availability. ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **n/a - AMQ Broker** Affected versions: - Fixed in v2.19.1, v2.20.0 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2028254) 2. [](https://access.redhat.com/security/cve/CVE-2021-4040) 3. [](https://issues.apache.org/jira/browse/ARTEMIS-3593) 4. [](https://github.com/apache/activemq-artemis/pull/3871/commits)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0162 - **State**: PUBLISHED - **Published Date**: April 12, 2016 at 23:00 UTC - **Last Updated**: February 10, 2025 at 16:53 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 9 through 11 allows remote attackers to determine the existence of files via crafted JavaScript code, aka "Internet Explorer Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1035521](http://www.securitytracker.com/id/1035521) 2. [MS16-037](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-037) 3. [85939](http://www.securityfocus.com/bid/85939)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1120 - **State**: PUBLISHED - **Published Date**: June 09, 2020 at 19:43 UTC - **Last Updated**: August 04, 2024 at 06:25 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1244. ### Affected Products **Microsoft - Windows 10 Version 2004 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 2004 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 2004 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 2004 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1120)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5002 - **State**: PUBLISHED - **Published Date**: July 07, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 14:47 UTC - **Reserved Date**: December 29, 2016 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC RSA Archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is affected by an open redirect vulnerability. A remote unprivileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the RSA Archer application without the victims realizing an attack occurred. ### Affected Products **n/a - RSA Archer version 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1** Affected versions: - RSA Archer version 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 (Status: affected) ### References 1. [99354](http://www.securityfocus.com/bid/99354) 2. [1038815](http://www.securitytracker.com/id/1038815) 3. [](http://seclists.org/fulldisclosure/2017/Jun/49)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39676 - **State**: PUBLISHED - **Published Date**: February 11, 2022 at 17:40 UTC - **Last Updated**: August 04, 2024 at 02:13 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In writeThrowable of AndroidFuture.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-197228210 ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2022-02-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7820 - **State**: PUBLISHED - **Published Date**: May 22, 2019 at 15:42 UTC - **Last Updated**: August 04, 2024 at 21:02 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-18.html) 2. [108315](http://www.securityfocus.com/bid/108315) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-19-504/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2940 - **State**: PUBLISHED - **Published Date**: July 18, 2018 at 13:00 UTC - **Last Updated**: October 02, 2024 at 20:16 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 6u191 (Status: affected) - 7u181 (Status: affected) - 8u172 (Status: affected) - 10.0.1; Java SE Embedded: 8u171 (Status: affected) ### References 1. [RHSA-2018:2254](https://access.redhat.com/errata/RHSA-2018:2254) 2. [RHSA-2018:3007](https://access.redhat.com/errata/RHSA-2018:3007) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) 4. [RHSA-2018:2713](https://access.redhat.com/errata/RHSA-2018:2713) 5. [](https://security.netapp.com/advisory/ntap-20180726-0001/) 6. [RHSA-2018:2255](https://access.redhat.com/errata/RHSA-2018:2255) 7. [RHSA-2018:2575](https://access.redhat.com/errata/RHSA-2018:2575) 8. [RHSA-2018:2256](https://access.redhat.com/errata/RHSA-2018:2256) 9. [RHSA-2018:2576](https://access.redhat.com/errata/RHSA-2018:2576) 10. [RHSA-2018:2253](https://access.redhat.com/errata/RHSA-2018:2253) 11. [RHSA-2018:2568](https://access.redhat.com/errata/RHSA-2018:2568) 12. [RHSA-2018:2569](https://access.redhat.com/errata/RHSA-2018:2569) 13. [RHSA-2018:2712](https://access.redhat.com/errata/RHSA-2018:2712) 14. [RHSA-2018:3008](https://access.redhat.com/errata/RHSA-2018:3008) 15. [1041302](http://www.securitytracker.com/id/1041302) 16. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us) 17. [104768](http://www.securityfocus.com/bid/104768) 18. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37199 - **State**: PUBLISHED - **Published Date**: July 12, 2023 at 07:04 UTC - **Last Updated**: November 07, 2024 at 14:44 UTC - **Reserved Date**: June 28, 2023 at 14:14 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause remote code execution when an admin user on DCE tampers with backups which are then manually restored. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Schneider Electric - StruxureWare Data Center Expert ** Affected versions: - v7.9.3 and earlier (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-192-01.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32661 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 19:04 UTC - **Last Updated**: August 30, 2024 at 17:09 UTC - **Reserved Date**: June 02, 2023 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper authentication in some Intel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation software before version 10.0.19041.29098 may allow an authenticated user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **n/a - Intel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation software** Affected versions: - before version 10.0.19041.29098 (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20095 - **State**: PUBLISHED - **Published Date**: December 30, 2019 at 04:39 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc) 3. [](https://security.netapp.com/advisory/ntap-20200204-0002/) 4. [openSUSE-SU-2020:0336](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2361 - **State**: PUBLISHED - **Published Date**: July 21, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 19:34 UTC - **Reserved Date**: April 19, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in admin/webservice/forms.php in the web services implementation in Moodle 2.0.x before 2.0.9, 2.1.x before 2.1.6, and 2.2.x before 2.2.3 allows remote authenticated users to inject arbitrary web script or HTML via the name field (aka the service name) to admin/webservice/service.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120523 Moodle security notifications public](http://openwall.com/lists/oss-security/2012/05/23/2) 2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31694)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3652 - **State**: PUBLISHED - **Published Date**: July 10, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 04:50 UTC - **Reserved Date**: December 28, 2017 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces. ### Affected Products **Intel Corporation - Intel Xeon Processor** Affected versions: - 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family (Status: affected) ### References 1. [](https://security.netapp.com/advisory/ntap-20180802-0001/) 2. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3323 - **State**: PUBLISHED - **Published Date**: April 17, 2024 at 18:53 UTC - **Last Updated**: August 01, 2024 at 20:05 UTC - **Reserved Date**: April 04, 2024 at 17:01 UTC - **Assigned By**: tibco ### Vulnerability Description Cross Site Scripting in UI Request/Response Validation in TIBCO JasperReports Server 8.0.4 and 8.2.0 allows allows for the injection of malicious executable scripts into the code of a trusted application that may lead to stealing the user's active session cookie via sending malicious link, enticing the user to interact. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L` ### Affected Products **TIBCO - JasperReports Server** Affected versions: - 8.0 (Status: affected) - 8.2 (Status: affected) ### References 1. [](https://community.tibco.com/advisories/tibco-security-advisory-april-9-2024-tibco-jasperreports-server-cve-2024-3323-r209/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7201 - **State**: PUBLISHED - **Published Date**: April 27, 2018 at 16:00 UTC - **Last Updated**: August 06, 2024 at 18:01 UTC - **Reserved Date**: December 23, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WebHybridClient.java in PayPal 5.3 and earlier for Android ignores SSL errors, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [paypal-cve20137201-sec-bypass(92098)](https://exchange.xforce.ibmcloud.com/vulnerabilities/92098) 2. [](https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/) 3. [57351](http://secunia.com/advisories/57351)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6732 - **State**: PUBLISHED - **Published Date**: March 19, 2019 at 19:56 UTC - **Last Updated**: August 04, 2024 at 20:31 UTC - **Reserved Date**: January 24, 2019 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the AFParseDateEx method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7453. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Foxit - PhantomPDF** Affected versions: - 9.3.0.10826 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-138/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22190 - **State**: PUBLISHED - **Published Date**: April 12, 2021 at 14:31 UTC - **Last Updated**: August 03, 2024 at 18:37 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **GitLab - GitLab** Affected versions: - >=13.7, <13.7.8 (Status: affected) - >=13.8, <13.8.5 (Status: affected) - >=13.9, <13.9.2 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/300281) 2. [](https://hackerone.com/reports/1040786) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22190.json) ### Credits - Thanks ledz1996 for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15248, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15248 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15248 - **State**: PUBLISHED - **Published Date**: November 23, 2020 at 19:40 UTC - **Last Updated**: August 04, 2024 at 13:08 UTC - **Reserved Date**: June 25, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.470, backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. Issue has been patched in Build 470 (v1.0.470) & v1.1.1. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **octobercms - october** Affected versions: - >= 1.0.319, < 1.0.470 (Status: affected) ### References 1. [](https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw) 2. [](https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4988 - **State**: PUBLISHED - **Published Date**: February 09, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 00:46 UTC - **Reserved Date**: May 24, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Build Failure Analyzer plugin before 1.16.0 in Jenkins allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-06-20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29187, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29187 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29187 - **State**: PUBLISHED - **Published Date**: April 11, 2023 at 03:09 UTC - **Last Updated**: February 26, 2025 at 19:07 UTC - **Reserved Date**: April 03, 2023 at 09:22 UTC - **Assigned By**: sap ### Vulnerability Description A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **SAP - SapSetup (Software Installation Program)** Affected versions: - 9.0 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/3311624) 2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52303, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52303 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52303 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 20:08 UTC - **Last Updated**: November 19, 2024 at 14:45 UTC - **Reserved Date**: November 06, 2024 at 19:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions starting with 3.10.6 and prior to 3.10.11, a memory leak can occur when a request produces a MatchInfoError. This was caused by adding an entry to a cache on each request, due to the building of each MatchInfoError producing a unique cache entry. An attacker may be able to exhaust the memory resources of a server by sending a substantial number (100,000s to millions) of such requests. Those who use any middlewares with aiohttp.web should upgrade to version 3.10.11 to receive a patch. ### Weakness Classification (CWE) - CWE-772: Security Weakness ### Affected Products **aio-libs - aiohttp** Affected versions: - >= 3.10.6, < 3.10.11 (Status: affected) ### References 1. [https://github.com/aio-libs/aiohttp/security/advisories/GHSA-27mf-ghqm-j3j8](https://github.com/aio-libs/aiohttp/security/advisories/GHSA-27mf-ghqm-j3j8) 2. [https://github.com/aio-libs/aiohttp/commit/bc15db61615079d1b6327ba42c682f758fa96936](https://github.com/aio-libs/aiohttp/commit/bc15db61615079d1b6327ba42c682f758fa96936)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27668 - **State**: PUBLISHED - **Published Date**: August 31, 2021 at 17:01 UTC - **Last Updated**: August 03, 2024 at 21:26 UTC - **Reserved Date**: February 24, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://discuss.hashicorp.com/t/hcsec-2021-05-vault-enterprise-s-dr-secondaries-exposed-license-metadata-without-authentication/21427) 2. [GLSA-202207-01](https://security.gentoo.org/glsa/202207-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33973 - **State**: PUBLISHED - **Published Date**: May 30, 2023 at 16:18 UTC - **Last Updated**: January 10, 2025 at 16:54 UTC - **Reserved Date**: May 24, 2023 at 13:46 UTC - **Assigned By**: GitHub_M ### Vulnerability Description RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send a crafted frame which is forwarded by the device. During encoding of the packet a NULL pointer dereference occurs. This crashes the device leading to denial of service. A patch is available at pull request 19678. There are no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **RIOT-OS - RIOT** Affected versions: - <= 2023.01 (Status: affected) ### References 1. [https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-r2pv-3jqc-vh7w](https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-r2pv-3jqc-vh7w) 2. [https://github.com/RIOT-OS/RIOT/pull/19678](https://github.com/RIOT-OS/RIOT/pull/19678) 3. [https://github.com/RIOT-OS/RIOT/commit/c9d7863e5664a169035038628029bb07e090c5ff](https://github.com/RIOT-OS/RIOT/commit/c9d7863e5664a169035038628029bb07e090c5ff) 4. [https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1067](https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1067) 5. [https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1495](https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1495) 6. [https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1511](https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1511) 7. [https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1644](https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1644) 8. [https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1655](https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1655)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10423, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10423 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10423 - **State**: PUBLISHED - **Published Date**: September 25, 2019 at 15:05 UTC - **Last Updated**: August 04, 2024 at 22:24 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins CodeScan Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. ### Affected Products **Jenkins project - Jenkins CodeScan Plugin** Affected versions: - 0.11 and earlier (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1551) 2. [[oss-security] 20190925 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/09/25/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31686 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 21:44 UTC - **Last Updated**: April 29, 2025 at 15:29 UTC - **Reserved Date**: March 31, 2025 at 21:30 UTC - **Assigned By**: drupal ### Vulnerability Description Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 0.0.0 before 12.3.11, from 12.4.0 before 12.4.10. ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Drupal - Open Social** Affected versions: - 0.0.0 (Status: affected) - 12.4.0 (Status: affected) ### References 1. [](https://www.drupal.org/sa-contrib-2025-015) ### Credits - Robert Ragas (robertragas) - zanvidmar - Denis Kolmerschlag (uber_denis) - zanvidmar - Greg Knaddison (greggles)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25655 - **State**: PUBLISHED - **Published Date**: June 24, 2021 at 08:55 UTC - **Last Updated**: August 03, 2024 at 20:11 UTC - **Reserved Date**: January 21, 2021 at 00:00 UTC - **Assigned By**: avaya ### Vulnerability Description A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix). ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **Avaya - Avaya Experience Portal** Affected versions: - 8.0 (Status: affected) - 7.2.3 (Status: affected) ### References 1. [](https://downloads.avaya.com/css/P8/documents/101076234)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1586 - **State**: PUBLISHED - **Published Date**: February 23, 2025 at 14:31 UTC - **Last Updated**: February 24, 2025 at 13:28 UTC - **Reserved Date**: February 22, 2025 at 15:51 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /Blood/A-.php. The manipulation of the argument Bloodname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **code-projects - Blood Bank System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-296566 | code-projects Blood Bank System A-.php cross site scripting](https://vuldb.com/?id.296566) 2. [VDB-296566 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.296566) 3. [Submit #505124 | code-projects blood-bank-system v1.0 Cross Site Scripting](https://vuldb.com/?submit.505124) 4. [](https://github.com/1337g/bloodbanksystem_poc/blob/main/xss-gu(1).pdf) 5. [](https://code-projects.org/) ### Credits - 1337gu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4197 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:04 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7. ### Affected Products **n/a - iOS, tvOS, Safari, iTunes for Windows, iCloud for Windows** Affected versions: - Versions prior to: iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT209141) 2. [](https://support.apple.com/kb/HT209140) 3. [](https://support.apple.com/kb/HT209107) 4. [](https://support.apple.com/kb/HT209106) 5. [](https://support.apple.com/kb/HT209109)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0751 - **State**: PUBLISHED - **Published Date**: May 24, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 12:26 UTC - **Reserved Date**: February 05, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cleanup script in crontabs in Apple Mac OS X 10.3.9 and 10.4.9 might delete filesystems that have been mounted in /tmp, which might allow local users to cause a denial of service, related to the find command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://docs.info.apple.com/article.html?artnum=305530) 2. [1018117](http://www.securitytracker.com/id?1018117) 3. [ADV-2007-1939](http://www.vupen.com/english/advisories/2007/1939) 4. [APPLE-SA-2007-05-24](http://lists.apple.com/archives/security-announce/2007/May/msg00004.html) 5. [25402](http://secunia.com/advisories/25402) 6. [macos-tmpfilesystem-dos(34500)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34500) 7. [24144](http://www.securityfocus.com/bid/24144) 8. [35145](http://www.osvdb.org/35145)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32902, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32902 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32902 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 21:01 UTC - **Last Updated**: March 27, 2025 at 14:42 UTC - **Reserved Date**: April 19, 2024 at 15:00 UTC - **Assigned By**: Google_Devices ### Vulnerability Description Remote prevention of access to cellular service with no user interaction (for example, crashing the cellular radio service with a malformed packet) ### Affected Products **Google - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2024-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5631 - **State**: PUBLISHED - **Published Date**: October 31, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 19:55 UTC - **Reserved Date**: October 31, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in change_pass.php in iG Shop 1.4 allows remote attackers to inject arbitrary web script or HTML via arbitrary query strings when the action parameter is not "1", as demonstrated using script in the action parameter, a different vulnerability than CVE-2006-5632. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20061031 Ig-shop change_pass.php XSS - 2 vectors](http://www.attrition.org/pipermail/vim/2006-October/001099.html) 2. [1017130](http://securitytracker.com/id?1017130) 3. [22701](http://secunia.com/advisories/22701) 4. [igshop-changepass-xss(29890)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29890)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6121 - **State**: PUBLISHED - **Published Date**: July 22, 2024 at 19:46 UTC - **Last Updated**: August 01, 2024 at 21:33 UTC - **Reserved Date**: June 18, 2024 at 11:41 UTC - **Assigned By**: NI ### Vulnerability Description An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-1395: Security Weakness ### Affected Products **NI - SystemLink Server** Affected versions: - 0 (Status: affected) **NI - FlexLogger** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/ni-systemlink-server-ships-out-of-date-redis-version.html) ### Credits - 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 working with Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27392, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27392 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27392 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 20:42 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 18, 2021 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Siveillance Video Open Network Bridge (2020 R3), Siveillance Video Open Network Bridge (2020 R2), Siveillance Video Open Network Bridge (2020 R1), Siveillance Video Open Network Bridge (2019 R3), Siveillance Video Open Network Bridge (2019 R2), Siveillance Video Open Network Bridge (2019 R1), Siveillance Video Open Network Bridge (2018 R3), Siveillance Video Open Network Bridge (2018 R2). Affected Open Network Bridges store user credentials for the authentication between ONVIF clients and ONVIF server using a hard-coded key. The encrypted credentials can be retrieved via the MIP SDK. This could allow an authenticated remote attacker to retrieve and decrypt all credentials stored on the ONVIF server. ### Weakness Classification (CWE) - CWE-321: Security Weakness ### Affected Products **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2020 R3 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2020 R2 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2020 R1 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2019 R3 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2019 R2 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2019 R1 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2018 R3 (Status: affected) **Siemens - Siveillance Video Open Network Bridge** Affected versions: - 2018 R2 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-853866.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2003 - **State**: PUBLISHED - **Published Date**: June 15, 2013 at 20:00 UTC - **Last Updated**: August 06, 2024 at 15:20 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [60121](http://www.securityfocus.com/bid/60121) 2. [FEDORA-2013-9096](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html) 3. [DSA-2681](http://www.debian.org/security/2013/dsa-2681) 4. [USN-1856-1](http://www.ubuntu.com/usn/USN-1856-1) 5. [[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries](http://www.openwall.com/lists/oss-security/2013/05/23/3) 6. [](http://www.x.org/wiki/Development/Security/Advisory-2013-05-23)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3041 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 23:31 UTC - **Last Updated**: April 01, 2025 at 03:50 UTC - **Reserved Date**: March 31, 2025 at 12:21 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in Project Worlds Online Time Table Generator 1.0. This affects an unknown part of the file /admin/updatestudent.php. The manipulation of the argument pic leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness - CWE-284: Security Weakness ### Affected Products **Project Worlds - Online Time Table Generator** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-302103 | Project Worlds Online Time Table Generator updatestudent.php unrestricted upload](https://vuldb.com/?id.302103) 2. [VDB-302103 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.302103) 3. [Submit #524935 | projectworlds Online Time Table Generator 1.0 Unrestricted Upload](https://vuldb.com/?submit.524935) 4. [](https://github.com/ydnd/cve/issues/12) ### Credits - IEeee (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2296 - **State**: PUBLISHED - **Published Date**: April 26, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 13:33 UTC - **Reserved Date**: April 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the FlipFileTypeAtom_BtoN function in Apple Quicktime 7.1.5, and other versions before 7.2, allows remote attackers to execute arbitrary code via a crafted M4V (MP4) file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26034](http://secunia.com/advisories/26034) 2. [quicktime-flipfiletypeatombton-overflow(34069)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34069) 3. [1018373](http://www.securitytracker.com/id?1018373) 4. [35578](http://www.osvdb.org/35578) 5. [TA07-193A](http://www.us-cert.gov/cas/techalerts/TA07-193A.html) 6. [ADV-2007-2510](http://www.vupen.com/english/advisories/2007/2510) 7. [23652](http://www.securityfocus.com/bid/23652) 8. [](http://security-protocols.com/sp-x46-advisory.php) 9. [](http://docs.info.apple.com/article.html?artnum=305947) 10. [1017967](http://www.securitytracker.com/id?1017967) 11. [APPLE-SA-2007-07-11](http://lists.apple.com/archives/Security-announce/2007/Jul/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15621, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15621 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15621 - **State**: PUBLISHED - **Published Date**: February 04, 2020 at 19:08 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 26, 2019 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link. ### Affected Products **n/a - Nextcloud Server** Affected versions: - 16.0.2 (Status: affected) ### References 1. [](https://hackerone.com/reports/619484) 2. [](https://nextcloud.com/security/advisory/?id=NC-SA-2020-012) 3. [openSUSE-SU-2020:0220](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html) 4. [openSUSE-SU-2020:0229](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1395, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1395 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1395 - **State**: PUBLISHED - **Published Date**: October 02, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 19:31 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138427. ### Affected Products **IBM - Rational Quality Manager** Affected versions: - 5.0 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) - 6.0.5 (Status: affected) - 6.0.6 (Status: affected) - 5.01 (Status: affected) - 5.02 (Status: affected) ### References 1. [ibm-rqm-cve20181395-xss(138427)](https://exchange.xforce.ibmcloud.com/vulnerabilities/138427) 2. [](http://www.ibm.com/support/docview.wss?uid=ibm10733078)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9977 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 18:00 UTC - **Last Updated**: September 17, 2024 at 03:12 UTC - **Reserved Date**: May 30, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in PlayReady DRM. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-07-01) 2. [99467](http://www.securityfocus.com/bid/99467)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32330 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 15:14 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fast Food Ordering System v1.0 is vulnerable to SQL Injection via /ffos/classes/Master.php?f=delete_menu. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/fast-food-ordering-system/SQLi-2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12077 - **State**: PUBLISHED - **Published Date**: April 23, 2020 at 02:20 UTC - **Last Updated**: August 04, 2024 at 11:48 UTC - **Reserved Date**: April 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mappress-google-maps-for-wordpress plugin before 2.53.9 for WordPress does not correctly implement AJAX functions with nonces (or capability checks), leading to remote code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/mappress-google-maps-for-wordpress/#developers) 2. [](https://www.wordfence.com/blog/2020/04/critical-vulnerabilities-patched-in-mappress-maps-plugin/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14998 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 09:46 UTC - **Reserved Date**: August 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Leagoo P1 Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains a hidden root privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB by modifying read-only system properties at runtime. Specifically, modifying the ro.debuggable and the ro.secure system properties to a certain value and then restarting the ADB daemon allows for a root shell to be obtained via ADB. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf) 2. [](https://www.kryptowire.com/portal/android-firmware-defcon-2018/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0433, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0433 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0433 - **State**: PUBLISHED - **Published Date**: February 02, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 25, 2006 at 00:00 UTC - **Assigned By**: freebsd ### Vulnerability Description Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote attackers to cause a denial of service (infinite loop). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-0409](http://www.vupen.com/english/advisories/2006/0409) 2. [FreeBSD-SA-06:08](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:08.sack.asc) 3. [22861](http://www.osvdb.org/22861) 4. [16466](http://www.securityfocus.com/bid/16466) 5. [1015566](http://securitytracker.com/id?1015566) 6. [399](http://securityreason.com/securityalert/399) 7. [bsd-sack-handling-dos(24453)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24453) 8. [18696](http://secunia.com/advisories/18696)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5553 - **State**: REJECTED - **Published Date**: October 18, 2007 at 20:00 UTC - **Last Updated**: December 06, 2007 at 10:00 UTC - **Reserved Date**: October 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27339 - **State**: PUBLISHED - **Published Date**: June 16, 2021 at 15:49 UTC - **Last Updated**: August 04, 2024 at 16:11 UTC - **Reserved Date**: October 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.insyde.com/security-pledge/SA-2021001) 2. [](https://security.netapp.com/advisory/ntap-20220216-0005/) 3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10172 - **State**: PUBLISHED - **Published Date**: April 16, 2018 at 22:00 UTC - **Last Updated**: August 05, 2024 at 07:32 UTC - **Reserved Date**: April 16, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description 7-Zip through 18.01 on Windows implements the "Large memory pages" option by calling the LsaAddAccountRights function to add the SeLockMemoryPrivilege privilege to the user's account, which makes it easier for attackers to bypass intended access restrictions by using this privilege in the context of a sandboxed process. Note: This has been disputed by 3rd parties who argue this is a valid feature of Windows. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/sevenzip/discussion/45797/thread/e730c709/?limit=25&page=1#b240)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8665 - **State**: PUBLISHED - **Published Date**: November 06, 2014 at 15:00 UTC - **Last Updated**: September 16, 2024 at 19:30 UTC - **Reserved Date**: November 06, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SAP Business Intelligence Development Workbench allows remote attackers to obtain sensitive information by reading unspecified files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://service.sap.com/sap/support/notes/0002018682) 2. [](http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5896 - **State**: PUBLISHED - **Published Date**: June 09, 2025 at 20:31 UTC - **Last Updated**: June 10, 2025 at 15:30 UTC - **Reserved Date**: June 09, 2025 at 06:53 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in tarojs taro up to 4.1.1. It has been declared as problematic. This vulnerability affects unknown code of the file taro/packages/css-to-react-native/src/index.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. Upgrading to version 4.1.2 is able to address this issue. The name of the patch is c2e321a8b6fc873427c466c69f41ed0b5e8814bf. It is recommended to upgrade the affected component. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-1333: Security Weakness - CWE-400: Security Weakness ### Affected Products **tarojs - taro** Affected versions: - 4.1.0 (Status: affected) - 4.1.1 (Status: affected) ### References 1. [VDB-311668 | tarojs taro index.js redos](https://vuldb.com/?id.311668) 2. [VDB-311668 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311668) 3. [Submit #585796 | @tarojs/taro 4.1.1 Inefficient Regular Expression Complexity](https://vuldb.com/?submit.585796) 4. [](https://github.com/NervJS/taro/pull/17619) 5. [](https://github.com/NervJS/taro/commit/c2e321a8b6fc873427c466c69f41ed0b5e8814bf) 6. [](https://github.com/NervJS/taro/releases/tag/v4.1.2) ### Credits - mmmsssttt (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46681, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46681 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46681 - **State**: PUBLISHED - **Published Date**: August 05, 2022 at 15:25 UTC - **Last Updated**: September 17, 2024 at 02:47 UTC - **Reserved Date**: February 08, 2022 at 00:00 UTC - **Assigned By**: ARTICA ### Vulnerability Description A XSS vulnerability exist in Pandora FMS version 756 and below, that allows an attacker to perform javascript code executions via module massive operation name field. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Artica PFMS - Pandora FMS** Affected versions: - v756 (Status: affected) ### References 1. [](https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/) 2. [](https://www.incibe.es/en/cve-assignment-publication/coordinated-cves)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43179 - **State**: REJECTED - **Published Date**: August 03, 2022 at 19:42 UTC - **Last Updated**: August 03, 2022 at 19:42 UTC - **Reserved Date**: November 01, 2021 at 00:00 UTC - **Assigned By**: SNPS ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36412 - **State**: PUBLISHED - **Published Date**: June 10, 2024 at 19:35 UTC - **Last Updated**: August 02, 2024 at 03:37 UTC - **Reserved Date**: May 27, 2024 at 15:59 UTC - **Assigned By**: GitHub_M ### Vulnerability Description SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **salesagility - SuiteCRM** Affected versions: - < 7.14.4 (Status: affected) - >= 8.0.0, < 8.6.1 (Status: affected) ### References 1. [https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-xjx2-38hv-5hh8](https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-xjx2-38hv-5hh8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18495 - **State**: PUBLISHED - **Published Date**: August 13, 2019 at 16:40 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: August 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The gravity-forms-sms-notifications plugin before 2.4.0 for WordPress has XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/gravity-forms-sms-notifications/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3303, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3303 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3303 - **State**: PUBLISHED - **Published Date**: July 25, 2008 at 13:18 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: July 25, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description admin/login.php in BilboBlog 0.2.1, when register_globals is enabled, allows remote attackers to bypass authentication and obtain administrative access via a direct request that sets the login, admin_login, password, and admin_passwd parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31054](http://secunia.com/advisories/31054) 2. [6073](https://www.exploit-db.com/exploits/6073) 3. [30225](http://www.securityfocus.com/bid/30225) 4. [bilboblog-login-auth-bypass(43762)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43762) 5. [4036](http://securityreason.com/securityalert/4036)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41144 - **State**: PUBLISHED - **Published Date**: January 27, 2023 at 18:08 UTC - **Last Updated**: March 10, 2025 at 21:18 UTC - **Reserved Date**: September 15, 2021 at 18:43 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **OpenMage - magento-lts** Affected versions: - < 19.4.22 (Status: affected) - >= 20.0.0, < 20.0.19 (Status: affected) ### References 1. [https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm](https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm) 2. [https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8](https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8) 3. [https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22](https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22) 4. [https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19](https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4322, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4322 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4322 - **State**: PUBLISHED - **Published Date**: June 24, 2020 at 14:10 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Secret Server 10.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 177511. ### Affected Products **IBM - Security Secret Server** Affected versions: - 10.7 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6237266) 2. [ibm-sss-cve20204322-clickjacking (177511)](https://exchange.xforce.ibmcloud.com/vulnerabilities/177511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0200 - **State**: PUBLISHED - **Published Date**: April 12, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 12:55 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user, aka "Microsoft Edge Memory Corruption Vulnerability." ### Affected Products **Microsoft Corporation - Edge** Affected versions: - Edge (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0200) 2. [97456](http://www.securityfocus.com/bid/97456) 3. [1038234](http://www.securitytracker.com/id/1038234)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1242 - **State**: PUBLISHED - **Published Date**: January 13, 2021 at 21:17 UTC - **Last Updated**: November 12, 2024 at 20:47 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-450: Security Weakness ### Affected Products **Cisco - Cisco Webex Teams** Affected versions: - n/a (Status: affected) ### References 1. [20210113 Cisco Webex Teams Shared File Manipulation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5360, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5360 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5360 - **State**: PUBLISHED - **Published Date**: June 30, 2016 at 17:00 UTC - **Last Updated**: August 06, 2024 at 01:00 UTC - **Reserved Date**: June 09, 2016 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20160609 Re: CVE Request: haproxy remote denial of service via reqdeny](http://www.openwall.com/lists/oss-security/2016/06/09/6) 2. [](http://git.haproxy.org/?p=haproxy-1.6.git%3Ba=commit%3Bh=60f01f8c89e4fb2723d5a9f2046286e699567e0b) 3. [USN-3011-1](http://www.ubuntu.com/usn/USN-3011-1) 4. [[oss-security] 20160609 CVE Request: haproxy remote denial of service via reqdeny](http://www.openwall.com/lists/oss-security/2016/06/09/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0095 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: February 18, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [CA-2003-05](http://www.cert.org/advisories/CA-2003-05.html) 2. [N-046](http://www.ciac.org/ciac/bulletins/n-046.shtml) 3. [6849](http://www.securityfocus.com/bid/6849) 4. [20030217 Oracle unauthenticated remote system compromise (#NISR16022003a)](http://marc.info/?l=bugtraq&m=104549693426042&w=2) 5. [](http://otn.oracle.com/deploy/security/pdf/2003alert51.pdf) 6. [oracle-username-bo(11328)](http://www.iss.net/security_center/static/11328.php) 7. [6319](http://www.osvdb.org/6319) 8. [VU#953746](http://www.kb.cert.org/vuls/id/953746)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0498 - **State**: PUBLISHED - **Published Date**: January 21, 2016 at 02:00 UTC - **Last Updated**: August 05, 2024 at 22:22 UTC - **Reserved Date**: December 09, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.2.2, 6.1.3.0, and 6.2.0.0 allows local users to affect confidentiality via unknown vectors related to Install. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html) 2. [1034727](http://www.securitytracker.com/id/1034727)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14933 - **State**: PUBLISHED - **Published Date**: August 11, 2019 at 20:56 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bagisto 0.1.5 allows CSRF under /admin URIs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bagisto/bagisto/issues/750) 2. [](https://forums.bagisto.com/category/1/announcements)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3989 - **State**: PUBLISHED - **Published Date**: October 10, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 20:21 UTC - **Reserved Date**: July 11, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50904](http://secunia.com/advisories/50904) 2. [50984](http://secunia.com/advisories/50984) 3. [50935](http://secunia.com/advisories/50935) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=783867) 5. [50856](http://secunia.com/advisories/50856) 6. [50892](http://secunia.com/advisories/50892) 7. [86097](http://osvdb.org/86097) 8. [oval:org.mitre.oval:def:16814](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16814) 9. [](http://www.mozilla.org/security/announce/2012/mfsa2012-80.html) 10. [SUSE-SU-2012:1351](http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html) 11. [USN-1611-1](http://www.ubuntu.com/usn/USN-1611-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37463 - **State**: PUBLISHED - **Published Date**: July 13, 2023 at 19:22 UTC - **Last Updated**: October 30, 2024 at 18:48 UTC - **Reserved Date**: July 06, 2023 at 13:01 UTC - **Assigned By**: GitHub_M ### Vulnerability Description cmark-gfm is an extended version of the C reference implementation of CommonMark, a rationalized version of Markdown syntax with a spec. Three polynomial time complexity issues in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. These vulnerabilities have been patched in 0.29.0.gfm.12. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **github - cmark-gfm** Affected versions: - < 0.29.0.gfm.12 (Status: affected) ### References 1. [https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5](https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5) 2. [https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26723, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26723 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26723 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 18:54 UTC - **Last Updated**: August 03, 2024 at 05:11 UTC - **Reserved Date**: March 08, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213256) 2. [](https://support.apple.com/en-us/HT213257)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20097, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20097 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20097 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 21:19 UTC - **Last Updated**: February 13, 2025 at 19:48 UTC - **Reserved Date**: October 12, 2024 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family before version R01.02.0002 may allow an authenticated user to potentially enable denial of service via network access. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-248: Security Weakness ### Affected Products **n/a - Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family** Affected versions: - before version R01.02.0002 (Status: affected) ### References 1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7590 - **State**: PUBLISHED - **Published Date**: October 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The WebPromoExperts (aka ua.com.webpromoexperts) application 1.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#913905](http://www.kb.cert.org/vuls/id/913905) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12098, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12098 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12098 - **State**: PUBLISHED - **Published Date**: January 19, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 18:28 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [102486](http://www.securityfocus.com/bid/102486) 2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4881, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4881 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4881 - **State**: PUBLISHED - **Published Date**: October 07, 2011 at 10:00 UTC - **Last Updated**: August 07, 2024 at 04:02 UTC - **Reserved Date**: October 07, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in calendar.class.php in ApPHP Calendar (ApPHP CAL) allow remote attackers to hijack the authentication of unspecified victims for requests that use the (1) category_name, (2) category_description, (3) event_name, or (4) event_description parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100831 ApPHP Calendar XSS - CSRF](http://www.securityfocus.com/archive/1/513445/100/0/threaded) 2. [](http://packetstormsecurity.org/1008-advisories/apphp-xssxsrf.txt) 3. [8433](http://securityreason.com/securityalert/8433)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8630 - **State**: PUBLISHED - **Published Date**: September 13, 2017 at 01:00 UTC - **Last Updated**: September 17, 2024 at 04:09 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Office 2016 allows a remote code execution vulnerability when it fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8631, CVE-2017-8632, and CVE-2017-8744. ### Affected Products **Microsoft Corporation - Microsoft Office** Affected versions: - Microsoft Office 2016 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8630) 2. [100732](http://www.securityfocus.com/bid/100732) 3. [1039315](http://www.securitytracker.com/id/1039315)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42563, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42563 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42563 - **State**: PUBLISHED - **Published Date**: December 05, 2023 at 02:49 UTC - **Last Updated**: August 02, 2024 at 19:23 UTC - **Reserved Date**: September 11, 2023 at 23:55 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Integer overflow vulnerability in landmarkCopyImageToNative of libFacePreProcessingjni.camera.samsung.so prior to SMR Dec-2023 Release 1 allows attacker to trigger heap overflow. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Dec-2023 Release in Android 12, 13, 14 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2268 - **State**: PUBLISHED - **Published Date**: November 16, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:06 UTC - **Reserved Date**: March 04, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description views/Index.php in the Install module in vTiger 6.0 before Security Patch 2 does not properly restrict access, which allows remote attackers to re-install the application via a request that sets the X-Requested-With HTTP header, as demonstrated by executing arbitrary PHP code via the db_name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [66757](http://www.securityfocus.com/bid/66757) 2. [](https://www.navixia.com/blog/entry/navixia-find-critical-vulnerabilities-in-vtiger-crm-cve-2014-2268-cve-2014-2269.html) 3. [[Vtigercrm-developers] 20140316 IMP: forgot password and re-installation security fix](http://vtiger-crm.2324883.n4.nabble.com/Vtigercrm-developers-IMP-forgot-password-and-re-installation-security-fix-tt9786.html) 4. [32794](http://www.exploit-db.com/exploits/32794)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17760 - **State**: PUBLISHED - **Published Date**: December 29, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 20:59 UTC - **Reserved Date**: December 19, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html) 2. [[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html) 3. [](https://github.com/opencv/opencv/issues/10351) 4. [](https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c) 5. [102974](http://www.securityfocus.com/bid/102974) 6. [[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update](https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33781 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 17:53 UTC - **Last Updated**: August 03, 2024 at 23:58 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure AD Security Feature Bypass Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33781)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1217 - **State**: PUBLISHED - **Published Date**: May 16, 2022 at 14:30 UTC - **Last Updated**: August 02, 2024 at 23:55 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Custom TinyMCE Shortcode Button WordPress plugin through 1.1 does not sanitise and escape the PHP_SELF variable before outputting it back in an attribute in an admin page, leading to Reflected Cross-Site Scripting. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Custom TinyMCE Shortcode Button** Affected versions: - 1.1 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5335 - **State**: PUBLISHED - **Published Date**: February 22, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in admin/registration/register.php in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 allows remote attackers to hijack the authentication of administrators for requests that send statistics to an arbitrary hub URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-51091) 2. [](https://moodle.org/mod/forum/discuss.php?d=323230)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1172 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description By design, Maximizer Enterprise 4 calendar and address book program allows arbitrary users to modify the calendar of other users when the calendar is being shared. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19990114 security hole in Maximizer](http://www.securityfocus.com/archive/1/11947)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4377 - **State**: REJECTED - **Last Updated**: April 29, 2025 at 22:15 UTC - **Reserved Date**: August 15, 2023 at 23:01 UTC - **Assigned By**: GitLab ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27752 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 17:23 UTC - **Last Updated**: June 04, 2025 at 17:52 UTC - **Reserved Date**: March 06, 2025 at 04:26 UTC - **Assigned By**: microsoft ### Vulnerability Description Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Microsoft Office 2019** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC for Mac 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2024** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Microsoft Office LTSC for Mac 2024** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Microsoft Office 2016** Affected versions: - 16.0.0 (Status: affected) ### References 1. [Microsoft Excel Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27752)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0658 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:30 UTC - **Reserved Date**: August 15, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (CSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause other clients to execute certain script or read cookies via malicious script in an invalid URL that is not properly quoted in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS01-045](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-045) 2. [isa-cross-site-scripting(6991)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6991) 3. [3198](http://www.securityfocus.com/bid/3198)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0255, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0255 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0255 - **State**: PUBLISHED - **Published Date**: May 14, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allow remote attackers to cause a denial of service (iSCSI service outage) by sending many crafted packets, aka "iSCSI Target Remote Denial of Service Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS14-028](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-028)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36079 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 14:36 UTC - **Last Updated**: April 23, 2025 at 19:29 UTC - **Reserved Date**: June 30, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge version 11.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted .SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Bridge** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb21-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43512 - **State**: PUBLISHED - **Published Date**: October 08, 2024 at 17:35 UTC - **Last Updated**: January 29, 2025 at 23:50 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Standards-Based Storage Management Service Denial of Service Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-835: Security Weakness ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Standards-Based Storage Management Service Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43512)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26788 - **State**: PUBLISHED - **Published Date**: April 10, 2023 at 00:00 UTC - **Last Updated**: February 11, 2025 at 16:44 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Veritas Appliance v4.1.0.1 is affected by Host Header Injection attacks. HTTP host header can be manipulated and cause the application to behave in unexpected ways. Any changes made to the header would just cause the request to be sent to a completely different Domain/IP address. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/IthacaLabs/Veritas-Technologies) 2. [](https://github.com/IthacaLabs/Veritas-Technologies/blob/main/Veritas%20Appliance%20v4.1.0.1/HHI/HHI_CVE-2023-26788.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32893 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2056 - **State**: PUBLISHED - **Published Date**: July 22, 2010 at 01:00 UTC - **Last Updated**: August 07, 2024 at 02:17 UTC - **Reserved Date**: May 25, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40532](http://secunia.com/advisories/40532) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=599621) 3. [ADV-2010-1757](http://www.vupen.com/english/advisories/2010/1757) 4. [](http://savannah.gnu.org/forum/forum.php?forum_id=6368) 5. [FEDORA-2010-10642](http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html) 6. [40475](http://secunia.com/advisories/40475) 7. [FEDORA-2010-10660](http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html) 8. [66249](http://www.osvdb.org/66249)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9922 - **State**: PUBLISHED - **Published Date**: July 05, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:25 UTC - **Reserved Date**: June 25, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpCompareResourceNames_U+0x0000000000000062." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9922)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46241 - **State**: PUBLISHED - **Published Date**: April 22, 2025 at 09:53 UTC - **Last Updated**: April 22, 2025 at 16:52 UTC - **Reserved Date**: April 22, 2025 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in codepeople Appointment Booking Calendar allows SQL Injection. This issue affects Appointment Booking Calendar: from n/a through 1.3.92. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **codepeople - Appointment Booking Calendar** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/appointment-booking-calendar/vulnerability/wordpress-appointment-booking-calendar-plugin-1-3-92-csrf-to-sql-injection-vulnerability?_s_id=cve) ### Credits - astra.r3verii (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27831, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27831 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27831 - **State**: PUBLISHED - **Published Date**: April 11, 2022 at 19:37 UTC - **Last Updated**: August 03, 2024 at 05:41 UTC - **Reserved Date**: March 24, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper boundary check in sflvd_rdbuf_bits of libsflvextractor prior to SMR Apr-2022 Release 1 allows attackers to read out of bounds memory. ### CVSS Metrics - **CVSS Base Score**: 2.9/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4)