System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4164
- **State**: PUBLISHED
- **Published Date**: September 22, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:08 UTC
- **Reserved Date**: September 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cron.php in MemHT Portal 3.9.0 and earlier allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [memhtportal-cron-path-disclosure(45413)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45413)
2. [6393](https://www.exploit-db.com/exploits/6393)
3. [4288](http://securityreason.com/securityalert/4288) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1178
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 19:43 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted authentication request to an affected SharePoint server, aka 'Microsoft SharePoint Server Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server**
Affected versions:
- 2016 (Status: affected)
- 2013 Service Pack 1 (Status: affected)
**Microsoft - Microsoft SharePoint Server**
Affected versions:
- 2010 Service Pack 2 (Status: affected)
- 2019 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1178) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6946
- **State**: PUBLISHED
- **Published Date**: January 23, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 20:50 UTC
- **Reserved Date**: January 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web server in the NEC MultiWriter 1700C allows remote attackers to modify the device configuration via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#63999575](http://jvn.jp/jp/JVN%2363999575/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2918
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: October 02, 2024 at 20:19 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks). The supported version that is affected is Prior to 8.7.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Sun ZFS Storage Appliance Kit (AK) Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [104783](http://www.securityfocus.com/bid/104783)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
3. [1041303](http://www.securitytracker.com/id/1041303) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3826
- **State**: PUBLISHED
- **Published Date**: July 17, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 7 on Windows XP SP2 allows remote attackers to prevent users from leaving a site, spoof the address bar, and conduct phishing and other attacks via repeated document.open function calls after a user requests a new page, but before the onBeforeUnload function is called.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070713 MSIE7 entrapment again (+ FF tidbit)](http://www.securityfocus.com/archive/1/473702/100/0/threaded)
2. [ADV-2007-2540](http://www.vupen.com/english/advisories/2007/2540)
3. [38212](http://osvdb.org/38212)
4. [26069](http://secunia.com/advisories/26069)
5. [oval:org.mitre.oval:def:2324](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2324)
6. [24911](http://www.securityfocus.com/bid/24911)
7. [HPSBST02280](http://www.securityfocus.com/archive/1/482366/100/0/threaded)
8. [SSRT071480](http://www.securityfocus.com/archive/1/482366/100/0/threaded)
9. [ie-open-addressbar-spoofing(35421)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35421)
10. [](http://lcamtuf.coredump.cx/ietrap3/)
11. [1018788](http://securitytracker.com/id?1018788)
12. [MS07-057](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057)
13. [TA07-282A](http://www.us-cert.gov/cas/techalerts/TA07-282A.html)
14. [2892](http://securityreason.com/securityalert/2892) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3110
- **State**: PUBLISHED
- **Published Date**: June 21, 2023 at 19:44 UTC
- **Last Updated**: December 09, 2024 at 17:05 UTC
- **Reserved Date**: June 05, 2023 at 17:28 UTC
- **Assigned By**: Silabs
### Vulnerability Description
Description: A vulnerability in SiLabs Unify Gateway 1.3.1 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
- CWE-125: Out-of-bounds Read
### Affected Products
**Silicon Labs - Unify Gateway**
Affected versions:
- 1.3.2 (Status: unaffected)
### References
1. [](https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26281
- **State**: PUBLISHED
- **Published Date**: April 05, 2022 at 01:50 UTC
- **Last Updated**: August 03, 2024 at 04:56 UTC
- **Reserved Date**: February 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BigAnt Server v5.6.06 was discovered to contain an incorrect access control issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bigant.com)
2. [](https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-26281)
3. [](https://www.bigantsoft.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7032
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The MYHABIT (aka com.amazon.myhabit) application @7F080041 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#667681](http://www.kb.cert.org/vuls/id/667681)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2152
- **State**: PUBLISHED
- **Published Date**: March 18, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:10 UTC
- **Reserved Date**: February 28, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xen 4.5.x and earlier enables certain default backends when emulating a VGA device for an x86 HVM guest qemu even when the configuration disables them, which allows local guest users to obtain access to the VGA console by (1) setting the DISPLAY environment variable, when compiled with SDL support, or connecting to the VNC server on (2) ::1 or (3) 127.0.0.1, when not compiled with SDL support.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201504-04](https://security.gentoo.org/glsa/201504-04)
2. [1031919](http://www.securitytracker.com/id/1031919)
3. [FEDORA-2015-3944](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html)
4. [FEDORA-2015-3721](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html)
5. [73068](http://www.securityfocus.com/bid/73068)
6. [FEDORA-2015-3935](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html)
7. [](http://xenbits.xen.org/xsa/advisory-119.html)
8. [openSUSE-SU-2015:0732](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html)
9. [1031806](http://www.securitytracker.com/id/1031806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8392
- **State**: PUBLISHED
- **Published Date**: May 01, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: May 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201709-02](https://security.gentoo.org/glsa/201709-02)
2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=21409) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9548
- **State**: PUBLISHED
- **Published Date**: March 02, 2020 at 03:58 UTC
- **Last Updated**: August 04, 2024 at 10:34 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20200305 [SECURITY] [DLA 2135-1] jackson-databind security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html)
2. [[zookeeper-issues] 20200307 [jira] [Created] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596%40%3Cissues.zookeeper.apache.org%3E)
3. [[zookeeper-dev] 20200307 [jira] [Created] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1%40%3Cdev.zookeeper.apache.org%3E)
4. [[zookeeper-issues] 20200307 [jira] [Updated] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6%40%3Cissues.zookeeper.apache.org%3E)
5. [[zookeeper-issues] 20200308 [jira] [Commented] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd%40%3Cissues.zookeeper.apache.org%3E)
6. [[zookeeper-issues] 20200319 [jira] [Commented] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb%40%3Cissues.zookeeper.apache.org%3E)
7. [[zookeeper-issues] 20200319 [jira] [Updated] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca%40%3Cissues.zookeeper.apache.org%3E)
8. [[zookeeper-issues] 20200430 [jira] [Resolved] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546](https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097%40%3Cissues.zookeeper.apache.org%3E)
9. [](https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062)
10. [](https://www.oracle.com/security-alerts/cpujul2020.html)
11. [](https://github.com/FasterXML/jackson-databind/issues/2634)
12. [[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12](https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E)
13. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
14. [](https://security.netapp.com/advisory/ntap-20200904-0006/)
15. [](https://www.oracle.com/security-alerts/cpujan2021.html)
16. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12115
- **State**: PUBLISHED
- **Published Date**: December 07, 2024 at 01:45 UTC
- **Last Updated**: December 09, 2024 at 18:02 UTC
- **Reserved Date**: December 03, 2024 at 20:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.4. This is due to missing or incorrect nonce validation on the duplicate_poll() function. This makes it possible for unauthenticated attackers to duplicate polls via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ays-pro - Poll Maker – Versus Polls, Anonymous Polls, Image Polls**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e76447ec-2815-4758-ae2c-67a938a739d9?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3202972/poll-maker/tags/5.5.5/includes/lists/class-poll-maker-polls-list-table.php?old=3202972&old_path=poll-maker%2Ftags%2F5.5.4%2Fincludes%2Flists%2Fclass-poll-maker-polls-list-table.php)
### Credits
- Noah Stead |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44775
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 00:00 UTC
- **Last Updated**: October 16, 2024 at 18:23 UTC
- **Reserved Date**: August 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in kmqtt v0.2.7 allows attackers to cause a Denial of Service(DoS) via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/pengwGit/26fd8630392af5d8829c2e220091ac4f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3788
- **State**: REJECTED
- **Last Updated**: November 03, 2022 at 00:00 UTC
- **Reserved Date**: November 01, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23579
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:32 UTC
- **Last Updated**: April 22, 2025 at 18:24 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `SafeToRemoveIdentity` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-617: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.7.0, < 2.7.1 (Status: affected)
- >= 2.6.0, < 2.6.3 (Status: affected)
- < 2.5.3 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr)
2. [](https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662)
3. [](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10128
- **State**: PUBLISHED
- **Published Date**: October 18, 2024 at 21:00 UTC
- **Last Updated**: October 21, 2024 at 18:03 UTC
- **Reserved Date**: October 18, 2024 at 13:42 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**Topdata - Inner Rep Plus WebServer**
Affected versions:
- 2.01 (Status: affected)
### References
1. [VDB-280916 | Topdata Inner Rep Plus WebServer td.js.gz risky encryption](https://vuldb.com/?id.280916)
2. [VDB-280916 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.280916)
3. [Submit #422604 | Topdata Top Data Inner Rep Plus Web Server v.2.01 Cryptographic Issues](https://vuldb.com/?submit.422604)
### Credits
- j369 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33223
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 00:00 UTC
- **Last Updated**: January 07, 2025 at 16:21 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c)
2. [](https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46748
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 07:12 UTC
- **Last Updated**: May 04, 2025 at 09:33 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT
Set the maximum size of a subrequest that writes to cachefiles to be
MAX_RW_COUNT so that we don't overrun the maximum write we can make to the
backing filesystem.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10.10 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cec226f9b1fd6cf55bc157873aec61b523083e96)
2. [](https://git.kernel.org/stable/c/51d37982bbac3ea0ca21b2797a9cb0044272b3aa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5697
- **State**: PUBLISHED
- **Published Date**: August 31, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: July 29, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2748-1](http://www.ubuntu.com/usn/USN-2748-1)
2. [USN-2751-1](http://www.ubuntu.com/usn/USN-2751-1)
3. [USN-2731-1](http://www.ubuntu.com/usn/USN-2731-1)
4. [](https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16)
5. [SUSE-SU-2015:1727](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html)
6. [[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver](http://www.openwall.com/lists/oss-security/2015/07/28/2)
7. [76066](http://www.securityfocus.com/bid/76066)
8. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
9. [USN-2752-1](http://www.ubuntu.com/usn/USN-2752-1)
10. [](https://bugzilla.redhat.com/show_bug.cgi?id=1249011)
11. [DSA-3329](http://www.debian.org/security/2015/dsa-3329)
12. [USN-2732-1](http://www.ubuntu.com/usn/USN-2732-1)
13. [USN-2749-1](http://www.ubuntu.com/usn/USN-2749-1)
14. [FEDORA-2015-12908](http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html)
15. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6)
16. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16)
17. [FEDORA-2015-13396](http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html)
18. [FEDORA-2015-13391](http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html)
19. [1033211](http://www.securitytracker.com/id/1033211)
20. [USN-2777-1](http://www.ubuntu.com/usn/USN-2777-1)
21. [FEDORA-2015-12917](http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46880
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:48 UTC
- **Reserved Date**: December 09, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.<br />*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-52/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-53/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-40/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1749292)
5. [GLSA-202305-06](https://security.gentoo.org/glsa/202305-06)
6. [GLSA-202305-13](https://security.gentoo.org/glsa/202305-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21544
- **State**: PUBLISHED
- **Published Date**: July 19, 2022 at 21:07 UTC
- **Last Updated**: September 24, 2024 at 20:00 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1-12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - FLEXCUBE Universal Banking**
Affected versions:
- 12.1-12.4 (Status: affected)
- 14.0-14.3 (Status: affected)
- 14.5 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8864
- **State**: PUBLISHED
- **Published Date**: September 15, 2024 at 00:31 UTC
- **Last Updated**: September 16, 2024 at 20:20 UTC
- **Reserved Date**: September 14, 2024 at 05:56 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in composiohq composio up to 0.5.6 and classified as critical. Affected by this vulnerability is the function Calculator of the file python/composio/tools/local/mathematical/actions/calculator.py. The manipulation leads to code injection. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**composiohq - composio**
Affected versions:
- 0.5.0 (Status: affected)
- 0.5.1 (Status: affected)
- 0.5.2 (Status: affected)
- 0.5.3 (Status: affected)
- 0.5.4 (Status: affected)
- 0.5.5 (Status: affected)
- 0.5.6 (Status: affected)
### References
1. [VDB-277501 | composiohq composio calculator.py Calculator code injection](https://vuldb.com/?id.277501)
2. [VDB-277501 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.277501)
3. [Submit #403204 | composiohq composio <=0.5.6 Composio's Local tools Mathematical has a code injection](https://vuldb.com/?submit.403204)
4. [](https://rumbling-slice-eb0.notion.site/Composio-s-Local-tools-Mathematical-has-a-code-injection-risk-in-composiohq-composio-ea0e89ee10fe4edfb9a8cfeed158c765?pvs=4)
### Credits
- aftersnow (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22508
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 15:39 UTC
- **Last Updated**: January 10, 2025 at 20:39 UTC
- **Reserved Date**: January 07, 2025 at 10:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roninwp FAT Event Lite allows PHP Local File Inclusion.This issue affects FAT Event Lite: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**Roninwp - FAT Event Lite**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/fat-event-lite/vulnerability/wordpress-fat-event-lite-plugin-1-1-unauthenticated-non-arbitrary-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0562
- **State**: PUBLISHED
- **Published Date**: July 12, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: July 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BlackIce Defender 2.1 and earlier, and BlackIce Pro 2.0.23 and earlier, do not properly block Back Orifice traffic when the security setting is Nervous or lower.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000620 BlackICE by Network ICE Corp vulnerability against Back Orifice 1.2](http://archives.neohapsis.com/archives/bugtraq/2000-06/0190.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38234
- **State**: PUBLISHED
- **Published Date**: August 10, 2023 at 13:17 UTC
- **Last Updated**: February 27, 2025 at 21:05 UTC
- **Reserved Date**: July 13, 2023 at 16:21 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb23-30.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9776
- **State**: PUBLISHED
- **Published Date**: October 12, 2024 at 05:39 UTC
- **Last Updated**: October 14, 2024 at 16:27 UTC
- **Reserved Date**: October 09, 2024 at 22:15 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The ImagePress – Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**butterflymedia - ImagePress – Image Gallery**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/655c08e6-4ef2-438e-b381-1bc3748c3771?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/image-gallery/trunk/includes/page-settings.php)
3. [](https://plugins.trac.wordpress.org/changeset/3167164/)
### Credits
- 家桥 王 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9207
- **State**: PUBLISHED
- **Published Date**: November 19, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: April 02, 2018 at 00:00 UTC
- **Assigned By**: larry_cashdollar
### Vulnerability Description
Arbitrary file upload in jQuery Upload File <= 4.0.2
### Affected Products
**hayageek - jQuery Upload File**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://www.vapidlabs.com/advisory.php?v=206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2761
- **State**: PUBLISHED
- **Published Date**: January 05, 2009 at 20:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: January 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33065](http://www.securityfocus.com/bid/33065)
2. [RHSA-2010:0837](https://rhn.redhat.com/errata/RHSA-2010-0837.html)
3. [](http://www.phreedom.org/research/rogue-ca/)
4. [VU#836068](http://www.kb.cert.org/vuls/id/836068)
5. [4866](http://securityreason.com/securityalert/4866)
6. [](http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/)
7. [20090115 MD5 Hashes May Allow for Certificate Spoofing](http://www.cisco.com/en/US/products/products_security_response09186a0080a5d24a.html)
8. [](http://www.win.tue.nl/hashclash/SoftIntCodeSign/)
9. [33826](http://secunia.com/advisories/33826)
10. [34281](http://secunia.com/advisories/34281)
11. [](http://www.microsoft.com/technet/security/advisory/961509.mspx)
12. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03814en_us)
13. [](http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx)
14. [](http://www.doxpara.com/research/md5/md5_someday.pdf)
15. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02)
16. [RHSA-2010:0838](https://rhn.redhat.com/errata/RHSA-2010-0838.html)
17. [](https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php)
18. [USN-740-1](http://www.ubuntu.com/usn/usn-740-1)
19. [1024697](http://securitytracker.com/id?1024697)
20. [FEDORA-2009-1276](https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00096.html)
21. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888)
22. [20081230 MD5 Considered Harmful Today: Creating a rogue CA certificate](http://www.securityfocus.com/archive/1/499685/100/0/threaded)
23. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935)
24. [42181](http://secunia.com/advisories/42181)
25. [](http://www.win.tue.nl/hashclash/rogue-ca/)
26. [](https://bugzilla.redhat.com/show_bug.cgi?id=648886) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5231
- **State**: PUBLISHED
- **Published Date**: September 07, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 01:42 UTC
- **Reserved Date**: September 07, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in DivX Player 7.2.019 allows local users to gain privileges via a Trojan horse VersionCheckDLL.dll file in the current working directory, as demonstrated by a directory that contains a .avi file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secunia.com/blog/120)
2. [41108](http://secunia.com/advisories/41108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24217
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 21:12 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://labcollector.com/labcollector-lims/add-ons/eln-electronic-lab-notebook/)
2. [](http://packetstormsecurity.com/files/171252/Agilebio-Lab-Collector-4.234-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2696
- **State**: PUBLISHED
- **Published Date**: July 27, 2011 at 01:29 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 11, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [48644](http://www.securityfocus.com/bid/48644)
2. [RHSA-2011:1084](http://www.redhat.com/support/errata/RHSA-2011-1084.html)
3. [[oss-security] 20110715 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/15/4)
4. [](https://bugs.gentoo.org/show_bug.cgi?id=375125)
5. [DSA-2288](http://www.debian.org/security/2011/dsa-2288)
6. [FEDORA-2011-9325](http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062955.html)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=721234)
8. [45351](http://secunia.com/advisories/45351)
9. [[oss-security] 20110715 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/15/3)
10. [[oss-security] 20110714 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/14/3)
11. [[oss-security] 20110714 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/14/2)
12. [](http://www.mega-nerd.com/libsndfile/ChangeLog)
13. [45125](http://secunia.com/advisories/45125)
14. [openSUSE-SU-2011:0855](https://hermes.opensuse.org/messages/10387521)
15. [45388](http://secunia.com/advisories/45388)
16. [[oss-security] 20110718 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/18/1)
17. [MDVSA-2011:119](http://www.mandriva.com/security/advisories?name=MDVSA-2011:119)
18. [](http://www.securelist.com/en/advisories/45125)
19. [45384](http://secunia.com/advisories/45384)
20. [[oss-security] 20110714 CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/14/1)
21. [[oss-security] 20110714 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/14/4)
22. [USN-1174-1](http://www.ubuntu.com/usn/USN-1174-1)
23. [[oss-security] 20110715 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files](http://www.openwall.com/lists/oss-security/2011/07/15/1)
24. [45433](http://secunia.com/advisories/45433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9165
- **State**: PUBLISHED
- **Published Date**: March 28, 2019 at 18:59 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Nagios XI before 5.5.11 allows attackers to execute arbitrary SQL commands via the API when using fusekeys and malicious user id.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/products/security/)
2. [](https://www.nagios.com/downloads/nagios-xi/change-log/)
3. [](http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25854
- **State**: PUBLISHED
- **Published Date**: April 29, 2022 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 04:19 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N`
### Affected Products
**n/a - @yaireo/tagify**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-YAIREOTAGIFY-2404358)
2. [](https://github.com/yairEO/tagify/issues/988)
3. [](https://github.com/yairEO/tagify/releases/tag/v4.9.8)
4. [](https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7)
5. [](https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/)
### Credits
- Roman Rott |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14817
- **State**: REJECTED
- **Published Date**: January 02, 2019 at 19:00 UTC
- **Last Updated**: January 06, 2021 at 16:15 UTC
- **Reserved Date**: September 27, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26818
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 00:00 UTC
- **Last Updated**: April 04, 2025 at 15:26 UTC
- **Reserved Date**: February 14, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netwrix Password Secure through 9.2 allows command injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf)
2. [](https://security.netwrix.com/advisories/adv-2025-009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20064
- **State**: PUBLISHED
- **Published Date**: May 06, 2024 at 02:51 UTC
- **Last Updated**: March 28, 2025 at 23:59 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08572601; Issue ID: MSV-1229.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**MediaTek, Inc. - MT6580, MT6761, MT6762, MT6768, MT6781, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT6989, MT8678, MT8755, MT8775, MT8792, MT8796**
Affected versions:
- Android 13.0, 14.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/May-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2403
- **State**: PUBLISHED
- **Published Date**: July 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:22 UTC
- **Reserved Date**: July 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The login protocol in RealChat 3.5.1b does not use authentication, which allows remote attackers to log on as other users by sniffing the beginning of a chat session and replaying it via a modified username.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14358](http://www.securityfocus.com/bid/14358)
2. [20050723 Realchat user impersonation - BSA 200506110001](http://seclists.org/lists/bugtraq/2005/Jul/0403.html)
3. [realchat-account-login(21497)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21497)
4. [1014562](http://securitytracker.com/id?1014562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10056
- **State**: PUBLISHED
- **Published Date**: March 23, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 03:07 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the sixel_decode function in coders/sixel.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1410465)
3. [[oss-security] 20161226 Re: CVE requests for various ImageMagick issues](http://www.openwall.com/lists/oss-security/2016/12/26/9)
4. [95190](http://www.securityfocus.com/bid/95190)
5. [95191](http://www.securityfocus.com/bid/95191)
6. [](https://github.com/ImageMagick/ImageMagick/commit/eedd0c35bb2d8af7aa05f215689fdebd11633fa1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5153
- **State**: PUBLISHED
- **Published Date**: September 06, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:41 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in FotoSlate 4.0 Build 146 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .plp file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43564](http://secunia.com/advisories/43564) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22059
- **State**: PUBLISHED
- **Published Date**: May 31, 2024 at 17:38 UTC
- **Last Updated**: August 01, 2024 at 22:35 UTC
- **Reserved Date**: January 05, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A SQL injection vulnerability in web component of Ivanti Neurons for ITSM allows a remote authenticated user to read/modify/delete information in the underlying database. This may also lead to DoS.
### Affected Products
**Ivanti - ITSM**
Affected versions:
- 2023.3 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-May-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38765
- **State**: PUBLISHED
- **Published Date**: December 08, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 15:48 UTC
- **Reserved Date**: August 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0033
- **State**: PUBLISHED
- **Published Date**: February 10, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: December 14, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA10-040A](http://www.us-cert.gov/cas/techalerts/TA10-040A.html)
2. [oval:org.mitre.oval:def:7711](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7711)
3. [MS10-004](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-004)
4. [1023563](http://www.securitytracker.com/id?1023563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21015
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 19:00 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getAvailabilityStatus of several Transcode Permission Controllers, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244569778
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46219
- **State**: REJECTED
- **Last Updated**: April 23, 2025 at 02:55 UTC
- **Reserved Date**: April 22, 2025 at 07:37 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27869
- **State**: PUBLISHED
- **Published Date**: June 21, 2022 at 14:23 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 25, 2022 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted TIFF file in Autodesk AutoCAD 2023 can be forced to read and write beyond allocated boundaries when parsing the TIFF file. This vulnerability can be exploited to execute arbitrary code.
### Affected Products
**n/a - Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D**
Affected versions:
- 2023 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39877
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 00:00 UTC
- **Last Updated**: May 20, 2025 at 14:49 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper access control vulnerability in ProfileSharingAccount in Group Sharing prior to versions 13.0.6.15 in Android S(12), 13.0.6.14 in Android R(11) and below allows attackers to identify the device.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Samsung Mobile - Group Sharing **
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3272
- **State**: PUBLISHED
- **Published Date**: September 26, 2022 at 16:50 UTC
- **Last Updated**: May 21, 2025 at 15:13 UTC
- **Reserved Date**: September 22, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8.
### Weakness Classification (CWE)
- CWE-130: Security Weakness
### Affected Products
**ikus060 - ikus060/rdiffweb**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3)
2. [](https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23083
- **State**: PUBLISHED
- **Published Date**: January 18, 2022 at 16:52 UTC
- **Last Updated**: August 03, 2024 at 03:28 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: ca
### Vulnerability Description
NetMaster 12.2 Network Management for TCP/IP and NetMaster File Transfer Management contain a XSS (Cross-Site Scripting) vulnerability in ReportCenter UI due to insufficient input validation that could potentially allow an attacker to execute code on the affected machine.
### Affected Products
**n/a - NetMaster Network Management for TCP/IP and NetMaster File Transfer Management**
Affected versions:
- 12.2 (Status: affected)
### References
1. [](https://support.broadcom.com/external/content/security-advisories/NetMaster-12.2-ReportCenter-Vulnerability-CVE-2022-23083/20049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6312
- **State**: PUBLISHED
- **Published Date**: November 27, 2023 at 02:31 UTC
- **Last Updated**: October 10, 2024 at 20:26 UTC
- **Reserved Date**: November 26, 2023 at 15:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Loan Management System 1.0. It has been classified as critical. Affected is the function delete_user of the file deleteUser.php of the component Users Page. The manipulation of the argument user_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246138 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Loan Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.246138)
2. [](https://vuldb.com/?ctiid.246138)
3. [](https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md)
### Credits
- joinia (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2230, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2230
- **State**: PUBLISHED
- **Published Date**: October 23, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:06 UTC
- **Reserved Date**: February 26, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.tetraph.com/blog/cves/cve-2014-2230-openx-open-redirect-vulnerability-2)
2. [openx-cve20142230-open-redirect(97621)](https://exchange.xforce.ibmcloud.com/vulnerabilities/97621)
3. [20141016 CVE-2014-2230 - OpenX Open Redirect Vulnerability](http://seclists.org/fulldisclosure/2014/Oct/72)
4. [](http://packetstormsecurity.com/files/128718/OpenX-2.8.10-Open-Redirect.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17738
- **State**: PUBLISHED
- **Published Date**: December 18, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) allows renaming and modifying files via /tools.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cve.html)
2. [43364](https://www.exploit-db.com/exploits/43364/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28094
- **State**: PUBLISHED
- **Published Date**: December 28, 2020 at 06:23 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, the default settings for the router speed test contain links to download malware named elive or CNKI E-Learning.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cecada/Tenda-AC6-Root-Acces/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8668
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:49 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Volume Manager Extension Driver in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2 allows an attacker to run a specially crafted application and obtain kernel information, aka "Volume Manager Extension Driver Information Disclosure Vulnerability".
### Affected Products
**Microsoft Corporation - Volume Manager Driver**
Affected versions:
- Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2 (Status: affected)
### References
1. [100092](http://www.securityfocus.com/bid/100092)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8668)
3. [1039108](http://www.securitytracker.com/id/1039108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41577
- **State**: PUBLISHED
- **Published Date**: August 09, 2024 at 00:00 UTC
- **Last Updated**: November 05, 2024 at 22:06 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the Ueditor component of productinfoquick v1.0 allows attackers to execute arbitrary code via uploading a crafted PNG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SENVIEL/learun-upload_file/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24746
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 22:25 UTC
- **Last Updated**: April 23, 2025 at 18:56 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**shopware - platform**
Affected versions:
- < 6.4.8.1 (Status: affected)
### References
1. [](https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc)
2. [](https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6)
3. [](https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0098
- **State**: PUBLISHED
- **Published Date**: March 22, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: February 02, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS00-006](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0495
- **State**: PUBLISHED
- **Published Date**: April 16, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager component in Oracle Commerce Platform 3.x and 11.x allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Workbench.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3984
- **State**: PUBLISHED
- **Published Date**: October 24, 2011 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 05, 2011 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in KENT-WEB WEB FORUM 5.1 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to "web form entries."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVNDB-2011-000082](http://jvndb.jvn.jp/jvndb/JVNDB-2011-000082)
2. [76403](http://osvdb.org/76403)
3. [webforum-unspecified-xss(70468)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70468)
4. [JVN#80971236](http://jvn.jp/en/jp/JVN80971236/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36021
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 13:08 UTC
- **Last Updated**: September 13, 2024 at 15:48 UTC
- **Reserved Date**: June 30, 2021 at 18:34 UTC
- **Assigned By**: adobe
### Vulnerability Description
Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an Improper input validation vulnerability within the CMS page scheduled update feature. An authenticated attacker with administrative privilege could leverage this vulnerability to achieve remote code execution on the system.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Adobe - Adobe Commerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb21-64.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40506
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:11 UTC
- **Last Updated**: September 18, 2024 at 18:29 UTC
- **Reserved Date**: August 14, 2023 at 21:06 UTC
- **Assigned By**: zdi
### Vulnerability Description
LG Simple Editor copyContent XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the copyContent command. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM.
. Was ZDI-CAN-20005.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**LG - Simple Editor**
Affected versions:
- LG Simple Editor 3.21.0 (Status: affected)
### References
1. [ZDI-23-1210](https://www.zerodayinitiative.com/advisories/ZDI-23-1210/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0600
- **State**: PUBLISHED
- **Published Date**: July 27, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: July 27, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lotus Domino R5 prior to 5.0.7 allows a remote attacker to create a denial of service via repeated URL requests with the same HTTP headers, such as (1) Accept, (2) Accept-Charset, (3) Accept-Encoding, (4) Accept-Language, and (5) Content-Type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lotus-domino-header-dos(6347)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6347)
2. [20010411 def-2001-20: Lotus Domino Multiple DoS](http://archives.neohapsis.com/archives/bugtraq/2001-04/0174.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15705
- **State**: PUBLISHED
- **Published Date**: September 17, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 23:15 UTC
- **Reserved Date**: October 21, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed. Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.
### Affected Products
**Apache Software Foundation - Apache SpamAssassin**
Affected versions:
- all modern versions before 3.4.2 (Status: affected)
### References
1. [USN-3811-2](https://usn.ubuntu.com/3811-2/)
2. [USN-3811-1](https://usn.ubuntu.com/3811-1/)
3. [GLSA-201812-07](https://security.gentoo.org/glsa/201812-07)
4. [[announce] 20180916 [SECURITY] Apache SpamAssassin 3.4.2 resolves CVE-2017-15705, CVE-2016-1238, CVE-2018-11780 & CVE-2018-11781](https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E)
5. [RHSA-2018:2916](https://access.redhat.com/errata/RHSA-2018:2916)
6. [105347](http://www.securityfocus.com/bid/105347)
7. [[debian-lts-announce] 20181113 [SECURITY] [DLA 1578-1] spamassassin security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html)
8. [openSUSE-SU-2019:1831](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6347
- **State**: PUBLISHED
- **Published Date**: September 09, 2020 at 12:53 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated HDR file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Viewer**
Affected versions:
- < 9 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2960815)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1164/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2265
- **State**: PUBLISHED
- **Published Date**: July 14, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 13:48 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.1.0.4.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**Tomoki Fuke - FileCapsule Deluxe Portable**
Affected versions:
- Ver.1.0.4.1 and earlier (Status: affected)
### References
1. [](http://resumenext.blog.fc2.com/blog-entry-30.html)
2. [JVN#42031953](https://jvn.jp/en/jp/JVN42031953/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7305
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27361
- **State**: PUBLISHED
- **Published Date**: July 01, 2021 at 15:57 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue exists within Akkadian Provisioning Manager 4.50.02 which allows attackers to view sensitive information within the /pme subdirectories.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.blacklanternsecurity.com/2021-07-01-Akkadian-CVE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16956
- **State**: PUBLISHED
- **Published Date**: January 04, 2021 at 07:56 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SolarWinds Web Help Desk 12.7.0 allows XSS via the Request Type parameter of a ticket.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.solarwinds.com/SuccessCenter/s/)
2. [](https://www.solarwinds.com/free-tools/free-help-desk-software)
3. [](https://www.esecforte.com/cross-site-scripting-vulnerability-india-responsible-vulnerability-disclosure/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1482
- **State**: PUBLISHED
- **Published Date**: September 11, 2020 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
<p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.</p>
<p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p>
<p>The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.</p>
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation 2010 Service Pack 2**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1482) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2993
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 19:31 UTC
- **Last Updated**: August 21, 2024 at 13:47 UTC
- **Reserved Date**: March 27, 2024 at 07:04 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda FH1203 2.0.1.6. It has been classified as critical. Affected is the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - FH1203**
Affected versions:
- 2.0.1.6 (Status: affected)
### References
1. [VDB-258162 | Tenda FH1203 QuickIndex formQuickIndex stack-based overflow](https://vuldb.com/?id.258162)
2. [VDB-258162 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.258162)
3. [Submit #301372 | Tenda FH1203 V2.0.1.6 buffer overflow](https://vuldb.com/?submit.301372)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formQuickIndex.md)
### Credits
- wxhwxhwxh_tu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34477
- **State**: PUBLISHED
- **Published Date**: May 27, 2024 at 14:00 UTC
- **Last Updated**: February 13, 2025 at 15:53 UTC
- **Reserved Date**: May 04, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
configureNFS in lib/common/functions.sh in FOG through 1.5.10 allows local users to gain privileges by mounting a crafted NFS share (because of no_root_squash and insecure). In order to exploit the vulnerability, someone needs to mount an NFS share in order to add an executable file as root. In addition, the SUID bit must be added to this file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/lib/common/functions.sh#L1360)
2. [](https://forums.fogproject.org/topic/17486/fog-1-5-10-and-earlier-nfs-privilege-escalation-vulnerability)
3. [](https://blog.hackvens.fr/advisories/CVE-2024-34477-Fogproject.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20537
- **State**: PUBLISHED
- **Published Date**: March 24, 2020 at 17:47 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: March 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with P(9.0) (TEEGRIS and Qualcomm chipsets). There is arbitrary memory overwrite in the SEM Trustlet, leading to arbitrary code execution. The Samsung IDs are SVE-2019-14651, SVE-2019-14666 (November 2019).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0655
- **State**: PUBLISHED
- **Published Date**: July 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: July 02, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, does not properly handle ASCII representations of integers on 64 bit platforms, which could allow attackers to cause a denial of service and possibly execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDKSA-2002:046](http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php)
2. [CSSA-2002-033.0](ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt)
3. [CA-2002-23](http://www.cert.org/advisories/CA-2002-23.html)
4. [CSSA-2002-033.1](ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt)
5. [CLA-2002:513](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513)
6. [FreeBSD-SA-02:33](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc)
7. [VU#308891](http://www.kb.cert.org/vuls/id/308891)
8. [5364](http://www.securityfocus.com/bid/5364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1366
- **State**: PUBLISHED
- **Published Date**: March 17, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 17, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0702](http://www.vupen.com/english/advisories/2008/0702)
2. [28020](http://www.securityfocus.com/bid/28020)
3. [1019522](http://www.securitytracker.com/id?1019522)
4. [](http://aluigi.altervista.org/adv/officescaz-adv.txt)
5. [29124](http://secunia.com/advisories/29124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0258
- **State**: PUBLISHED
- **Published Date**: May 12, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0175, CVE-2017-0220, and CVE-2017-0259.
### Affected Products
**Microsoft Corporation - Microsoft Windows**
Affected versions:
- Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0258)
2. [42006](https://www.exploit-db.com/exploits/42006/)
3. [1038446](http://www.securitytracker.com/id/1038446)
4. [98112](http://www.securityfocus.com/bid/98112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49147
- **State**: PUBLISHED
- **Published Date**: December 12, 2024 at 19:07 UTC
- **Last Updated**: May 13, 2025 at 15:25 UTC
- **Reserved Date**: October 11, 2024 at 20:57 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Deserialization of untrusted data in Microsoft Update Catalog allows an unauthorized attacker to elevate privileges on the website’s webserver.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Microsoft - Microsoft Update Catalog**
Affected versions:
- N/A (Status: affected)
### References
1. [Microsoft Update Catalog Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4206
- **State**: PUBLISHED
- **Published Date**: December 04, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: December 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin.link.modify.php in Million Dollar Text Links 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8830](http://www.exploit-db.com/exploits/8830)
2. [milliondollar-id-sql-injection(50864)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50864)
3. [34994](http://secunia.com/advisories/34994) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5338
- **State**: PUBLISHED
- **Published Date**: June 14, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 01:00 UTC
- **Reserved Date**: June 08, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed39f1aec)
2. [USN-3047-1](http://www.ubuntu.com/usn/USN-3047-1)
3. [[qemu-devel] 20160606 [Qemu-devel] [PATCH v3] scsi: esp: check TI buffer index before read/write](https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.html)
4. [[oss-security] 20160608 Re: CVE Request Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO](http://www.openwall.com/lists/oss-security/2016/06/08/14)
5. [GLSA-201609-01](https://security.gentoo.org/glsa/201609-01)
6. [USN-3047-2](http://www.ubuntu.com/usn/USN-3047-2)
7. [91079](http://www.securityfocus.com/bid/91079)
8. [[oss-security] 20160607 CVE Request Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO](http://www.openwall.com/lists/oss-security/2016/06/07/3)
9. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15679
- **State**: PUBLISHED
- **Published Date**: October 29, 2019 at 16:45 UTC
- **Last Updated**: August 05, 2024 at 00:56 UTC
- **Reserved Date**: August 27, 2019 at 00:00 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Kaspersky - TightVNC**
Affected versions:
- 1.3.10 (Status: affected)
### References
1. [[oss-security] 20181210 libvnc and tightvnc vulnerabilities](https://www.openwall.com/lists/oss-security/2018/12/10/5)
2. [[debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update](https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf)
4. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3681
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:57 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 11, 2024 at 20:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Interactive World Maps plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search (s) parameter in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**cmoreira - Interactive World Maps**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c9295b82-27c1-4f35-b40c-1ac40ebe5d5e?source=cve)
2. [](https://codecanyon.net/item/interactive-world-maps/2874264)
### Credits
- Usama Arshad |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57159
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 13:40 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/add.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/1091101/yang.xian/tree/main/6/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22432, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22432
- **State**: PUBLISHED
- **Published Date**: February 25, 2022 at 18:11 UTC
- **Last Updated**: August 03, 2024 at 18:44 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.
### Affected Products
**Huawei - EMUI**
Affected versions:
- 11.0.0 (Status: affected)
- 10.1.1 (Status: affected)
- 10.1.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.1 (Status: affected)
- 3.1.0 (Status: affected)
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2021/6/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6290
- **State**: PUBLISHED
- **Published Date**: January 15, 2019 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 16:38 UTC
- **Reserved Date**: January 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An infinite recursion issue was discovered in eval.c in Netwide Assembler (NASM) through 2.14.02. There is a stack exhaustion problem resulting from infinite recursion in the functions expr, rexp, bexpr and cexpr in certain scenarios involving lots of '{' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted asm file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392548) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30355
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 19:09 UTC
- **Reserved Date**: May 09, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30355) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29425
- **State**: PUBLISHED
- **Published Date**: November 12, 2023 at 21:16 UTC
- **Last Updated**: September 03, 2024 at 13:33 UTC
- **Reserved Date**: April 06, 2023 at 08:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in plainware.Com ShiftController Employee Shift Scheduling plugin <= 4.9.23 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**plainware.com - ShiftController Employee Shift Scheduling**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/shiftcontroller/wordpress-shiftcontroller-employee-shift-scheduling-plugin-4-9-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Elliot (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1947
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:43 UTC
- **Reserved Date**: June 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Webmin 0.21 through 1.0 uses the same built-in SSL key for all installations, which allows remote attackers to eavesdrop or highjack the SSL session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [webmin-identical-ssl-keys(10381)](http://www.iss.net/security_center/static/10381.php)
2. [5936](http://www.securityfocus.com/bid/5936)
3. [FreeBSD-SA-02:06](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A06.asc)
4. [](http://www.webmin.com/changes.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10012
- **State**: PUBLISHED
- **Published Date**: December 08, 2020 at 20:03 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An access issue was addressed with improved access restrictions. This issue is fixed in macOS Big Sur 11.0.1. Processing a maliciously crafted document may lead to a cross site scripting attack.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT211931)
2. [](https://support.apple.com/kb/HT212011)
3. [20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1](http://seclists.org/fulldisclosure/2020/Dec/32)
4. [20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave](http://seclists.org/fulldisclosure/2020/Dec/26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6179
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 01:53 UTC
- **Last Updated**: August 01, 2024 at 21:33 UTC
- **Reserved Date**: June 19, 2024 at 23:30 UTC
- **Assigned By**: LGE
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LG Electronics SuperSign CMS allows Reflected XSS. This issue affects SuperSign CMS: from 4.1.3 before < 4.3.1.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**LG Electronics - SuperSign CMS**
Affected versions:
- 4.1.3 (Status: affected)
### References
1. [](https://lgsecurity.lge.com/bulletins/idproducts#updateDetails) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3568
- **State**: PUBLISHED
- **Published Date**: May 14, 2019 at 19:52 UTC
- **Last Updated**: February 07, 2025 at 12:56 UTC
- **Reserved Date**: January 02, 2019 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Facebook - WhatsApp for Android**
Affected versions:
- 2.19.134 (Status: affected)
- unspecified (Status: affected)
**Facebook - WhatsApp Business for Android**
Affected versions:
- 2.19.44 (Status: affected)
- unspecified (Status: affected)
**Facebook - WhatsApp for iOS**
Affected versions:
- 2.19.51 (Status: affected)
- unspecified (Status: affected)
**Facebook - WhatsApp Business for iOS**
Affected versions:
- 2.19.51 (Status: affected)
- unspecified (Status: affected)
**Facebook - WhatsApp for Windows Phone**
Affected versions:
- 2.18.348 (Status: affected)
- unspecified (Status: affected)
**Facebook - WhatsApp for Tizen**
Affected versions:
- 2.18.15 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.facebook.com/security/advisories/cve-2019-3568)
2. [108329](http://www.securityfocus.com/bid/108329) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3019
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 06:49 UTC
- **Last Updated**: March 31, 2025 at 12:45 UTC
- **Reserved Date**: March 31, 2025 at 06:24 UTC
- **Assigned By**: KNIME
### Vulnerability Description
KNIME Business Hub is affected by several cross-site scripting vulnerabilities in its web pages. If a user clicks on a malicious link or opens a malicious web page, arbitrary Java Script may be executed with this user's permissions. This can lead to information loss and/or modification of existing data.
The issues are caused by a bug https://github.com/Baroshem/nuxt-security/issues/610 in the widely used nuxt-security module.
There are no viable workarounds therefore we strongly recommend to update to one of the following versions of KNIME Business Hub:
* 1.13.3 or later
* 1.12.4 or later
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**KNIME - KNIME Business Hub**
Affected versions:
- 1.13.0 (Status: affected)
- 1.12.0 (Status: affected)
### References
1. [](https://www.knime.com/security/advisories#CVE-2025-3019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000827
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:35 UTC
- **Reserved Date**: December 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ubilling version <= 0.9.2 contains a Other/Unknown vulnerability in user-controlled parameter that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://0dd.zone/2018/10/28/ubilling-Object-Injection/)
2. [](https://github.com/nightflyza/Ubilling/issues/330) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10181
- **State**: PUBLISHED
- **Published Date**: July 31, 2019 at 21:56 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 27, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**IcedTea - icedtea-web**
Affected versions:
- affects up to and including 1.7.2 and 1.8.2 (Status: affected)
### References
1. [](https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344)
2. [](https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10181)
4. [openSUSE-SU-2019:1911](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html)
5. [[debian-lts-announce] 20190909 [SECURITY] [DLA 1914-1] icedtea-web security update](https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html)
6. [20191007 CVE-2019-10181, CVE-2019-10182, CVE-2019-10185: IcedTea-Web vulnerabilities leading to RCE](https://seclists.org/bugtraq/2019/Oct/5)
7. [](http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html)
8. [GLSA-202107-51](https://security.gentoo.org/glsa/202107-51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6408
- **State**: PUBLISHED
- **Published Date**: January 30, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 16:18 UTC
- **Reserved Date**: January 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. CSRF exists in hy-cgi/user.cgi, as demonstrated by changing an administrator password or adding a new administrator account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31324
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:50 UTC
- **Last Updated**: May 02, 2025 at 17:13 UTC
- **Reserved Date**: March 27, 2025 at 23:02 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SAP_SE - SAP NetWeaver (Visual Composer development server)**
Affected versions:
- VCFRAMEWORK 7.50 (Status: affected)
### References
1. [](https://me.sap.com/notes/3594142)
2. [](https://url.sap/sapsecuritypatchday) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4144
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 05:33 UTC
- **Last Updated**: August 01, 2024 at 20:33 UTC
- **Reserved Date**: April 24, 2024 at 20:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Simple Basic Contact Form plugin for WordPress for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 20240502. This allows unauthenticated attackers to execute arbitrary shortcodes. The severity and exploitability depends on the functionality of other plugins installed in the environment.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Affected Products
**wpkube - Simple Basic Contact Form**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ded1944f-662d-4d25-8277-4b1dc63b2144?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/simple-basic-contact-form/trunk/simple-basic-contact-form.php#L543)
3. [](https://plugins.trac.wordpress.org/changeset/3085036/)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0066
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 27, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1555
- **State**: REJECTED
- **Published Date**: September 10, 2020 at 13:49 UTC
- **Last Updated**: September 10, 2020 at 14:50 UTC
- **Reserved Date**: November 28, 2018 at 00:00 UTC
- **Assigned By**: openssl
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1024
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 08:34 UTC
- **Last Updated**: February 19, 2025 at 19:40 UTC
- **Reserved Date**: February 04, 2025 at 10:31 UTC
- **Assigned By**: Gridware
### Vulnerability Description
A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**ChurchCRM - ChurchCRM**
Affected versions:
- ChurchCRM 5.13.0 and prior (Status: affected)
### References
1. [](https://github.com/ChurchCRM/CRM/issues/7250)
### Credits
- Michael McInerney |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5106
- **State**: PUBLISHED
- **Published Date**: June 20, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: September 24, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in FreeFloat FTP Server 1.0 allows remote authenticated users to execute arbitrary code via a long string in a PUT command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [88358](http://www.osvdb.org/88358)
2. [freefloat-put-bo(79810)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79810)
3. [22351](http://www.exploit-db.com/exploits/22351)
4. [](http://infosec42.blogspot.com/2012/09/freefloatftp-10-put-buffer-overflow.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4435
- **State**: PUBLISHED
- **Published Date**: April 03, 2019 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 05:11 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved restrictions. This issue affected versions prior to iOS 12.1.1, macOS Mojave 10.14.2, tvOS 12.1.1, watchOS 5.1.2.
### Affected Products
**n/a - iOS, macOS, tvOS, watchOS**
Affected versions:
- Versions prior to: iOS 12.1.1, macOS Mojave 10.14.2, tvOS 12.1.1, watchOS 5.1.2 (Status: affected)
### References
1. [](https://support.apple.com/kb/HT209343)
2. [](https://support.apple.com/kb/HT209342)
3. [](https://support.apple.com/kb/HT209340)
4. [](https://support.apple.com/kb/HT209341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17644
- **State**: PUBLISHED
- **Published Date**: March 04, 2020 at 21:54 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Centreon before 2.8-30, 18.10-8, 19.04-5, and 19.10-2.. It provides sensitive information via an unauthenticated direct request for include/configuration/configObject/host/refreshMacroAjax.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10/index.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.