System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2841
- **State**: PUBLISHED
- **Published Date**: June 24, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29696](http://www.securityfocus.com/bid/29696)
2. [](http://forum.xchat.org/viewtopic.php?t=4218)
3. [xchat-ircs-command-execution(43065)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43065)
4. [5795](https://www.exploit-db.com/exploits/5795)
5. [30695](http://secunia.com/advisories/30695) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37098
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:04 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateIpv6Params.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2406
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 02:32 UTC
- **Reserved Date**: June 21, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Siebel Core - Highly Interactive Client component in Oracle Siebel Suite 7.7.2.12, 7.8.2.14, 8.0.0.10, and 8.1.1.3 allows remote authenticated users to affect confidentiality via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28437
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 19:33 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 15, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Installer Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28437) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5835
- **State**: PUBLISHED
- **Published Date**: October 28, 2023 at 13:31 UTC
- **Last Updated**: August 02, 2024 at 08:14 UTC
- **Reserved Date**: October 27, 2023 at 21:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in hu60t hu60wap6. Affected by this vulnerability is the function markdown of the file src/class/ubbparser.php. The manipulation leads to cross site scripting. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named a1cd9f12d7687243bfcb7ce295665acb83b9174e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243775.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**hu60t - hu60wap6**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.243775)
2. [](https://vuldb.com/?ctiid.243775)
3. [](https://github.com/hu60t/hu60wap6/commit/a1cd9f12d7687243bfcb7ce295665acb83b9174e)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0955
- **State**: PUBLISHED
- **Published Date**: March 24, 2022 at 14:45 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/data-hub prior to 1.2.4.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**pimcore - pimcore/data-hub**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df)
2. [](https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4877
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4878.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20151026 Secunia Research: Oracle Outside In Two Buffer Overflow Vulnerabilities](http://www.securityfocus.com/archive/1/536762/100/0/threaded)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
3. [38788](https://www.exploit-db.com/exploits/38788/)
4. [1033898](http://www.securitytracker.com/id/1033898)
5. [](http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html)
6. [77130](http://www.securityfocus.com/bid/77130) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47660
- **State**: PUBLISHED
- **Published Date**: January 05, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 14:24 UTC
- **Reserved Date**: December 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/2357)
2. [DSA-5411](https://www.debian.org/security/2023/dsa-5411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1000134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1000134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1000134
- **State**: PUBLISHED
- **Published Date**: October 10, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: July 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Reflected XSS in wordpress plugin hdw-tube v1.2
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/hdw-tube)
2. [](http://www.vapidlabs.com/wp/wp_advisory.php?v=530)
3. [93868](http://www.securityfocus.com/bid/93868) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20043
- **State**: PUBLISHED
- **Published Date**: June 13, 2022 at 06:50 UTC
- **Last Updated**: April 15, 2025 at 14:25 UTC
- **Reserved Date**: June 06, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Navetti PricePoint 4.6.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**Navetti - PricePoint**
Affected versions:
- 4.6.0.0 (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Mar/24)
2. [](https://vuldb.com/?id.97862)
### Credits
- W. Schober |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42198
- **State**: PUBLISHED
- **Published Date**: October 20, 2022 at 00:00 UTC
- **Last Updated**: May 08, 2025 at 15:36 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Simple Exam Reviewer Management System v1.0 the User List function suffers from insecure file upload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/php/15160/simple-exam-reviewer-management-system-phpoop-free-source-code.html)
2. [](https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE/blob/main/CVE-2022-42198.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25394
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 00:00 UTC
- **Last Updated**: November 20, 2024 at 16:02 UTC
- **Reserved Date**: February 07, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow occurs in utilities/ymodem/ry_sy.c in RT-Thread through 5.0.2 because of an incorrect sprintf call or a missing '\0' character.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/RT-Thread/rt-thread/issues/8291)
2. [](https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt)
3. [](https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/)
4. [](https://seclists.org/fulldisclosure/2024/Mar/28)
5. [[oss-security] 20240305 HNS-2024-05 - HN Security Advisory - Multiple vulnerabilities in RT-Thread RTOS](http://www.openwall.com/lists/oss-security/2024/03/05/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23420
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 16:55 UTC
- **Last Updated**: January 01, 2025 at 00:48 UTC
- **Reserved Date**: January 11, 2023 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kernel Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Kernel Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2693
- **State**: PUBLISHED
- **Published Date**: October 06, 2007 at 20:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: October 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HP-UX B.11.00 and B.11.11 with B6848AB GTK+ Support Libraries installed uses insecure directory permissions, which allows local users to gain privileges via files in /opt/gnome/src/GLib/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:6105](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6105)
2. [11615](http://secunia.com/advisories/11615)
3. [6120](http://www.osvdb.org/6120)
4. [SSRT3613](http://marc.info/?l=bugtraq&m=108455531606056&w=2)
5. [HPSBUX01034](http://www.hp.com/products1/unix/java/mozilla/HPSBUX01034.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46611
- **State**: PUBLISHED
- **Published Date**: May 12, 2025 at 00:00 UTC
- **Last Updated**: May 12, 2025 at 22:07 UTC
- **Reserved Date**: April 25, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in ARTEC EMA Mail v6.92 allows an attacker to execute arbitrary code via a crafted script.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.artec-it.com/en-us/ema.html)
2. [](https://www.syss.de/pentest-blog/csrf-und-xss-schwachstelle-in-ema-mail-von-artec-it-solutions-syss-2025-020/-021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0036
- **State**: PUBLISHED
- **Published Date**: April 28, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:57 UTC
- **Reserved Date**: January 07, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The DNS implementation in DeleGate 8.10.2 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13729](http://www.securityfocus.com/bid/13729)
2. [](http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en)
3. [25291](http://www.osvdb.org/25291)
4. [](http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34414
- **State**: PUBLISHED
- **Published Date**: September 27, 2021 at 13:56 UTC
- **Last Updated**: August 04, 2024 at 00:12 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: Zoom
### Vulnerability Description
The network proxy page on the web portal for the Zoom on-premise Meeting Connector Controller before version 4.6.348.20201217, Zoom on-premise Meeting Connector MMR before version 4.6.348.20201217, Zoom on-premise Recording Connector before version 3.8.42.20200905, Zoom on-premise Virtual Room Connector before version 4.4.6620.20201110, and Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 fails to validate input sent in requests to update the network proxy configuration, which could lead to remote command injection on the on-premise image by a web portal administrator.
### Affected Products
**n/a - Zoom on-premise Meeting Connector Controller, Zoom on-premise Meeting Connector MMR, Zoom on-premise Recording Connector, Zoom on-premise Virtual Room Connector, Zoom on-premise Virtual Room Connector Load Balancer**
Affected versions:
- Zoom on-premise Meeting Connector Controller before version 4.6.348.20201217, Zoom on-premise Meeting Connector MMR before version 4.6.348.20201217, Zoom on-premise Recording Connector before version 3.8.42.20200905, Zoom on-premise Virtual Room Connector before version 4.4.6620.20201110, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 (Status: affected)
### References
1. [](https://explore.zoom.us/en/trust/security/security-bulletin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8260
- **State**: PUBLISHED
- **Published Date**: August 18, 2017 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 19:30 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Qualcomm products with Android releases from CAF using the Linux kernel, due to a type downcast, a value may improperly pass validation and cause an out of bounds write later.
### Affected Products
**Qualcomm, Inc. - All Qualcomm products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-07-01)
2. [99465](http://www.securityfocus.com/bid/99465)
3. [](https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/blob/master/CVE-2017-8260.c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26373
- **State**: PUBLISHED
- **Published Date**: August 18, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:22 UTC
- **Reserved Date**: May 11, 2022 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
### Affected Products
**n/a - Intel(R) Processors**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html)
2. [[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package](https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html)
3. [[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html)
4. [](https://security.netapp.com/advisory/ntap-20221007-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7758
- **State**: PUBLISHED
- **Published Date**: January 08, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 08, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756432)
2. [openSUSE-SU-2015:2369](http://lists.opensuse.org/opensuse-updates/2015-12/msg00117.html)
3. [FEDORA-2016-e21be93421](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178582.html)
4. [openSUSE-SU-2016:0574](http://lists.opensuse.org/opensuse-updates/2016-02/msg00150.html)
5. [FEDORA-2016-94b0b50351](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178642.html)
6. [[oss-security] 20151008 Re: CVE request: Gummi](http://www.openwall.com/lists/oss-security/2015/10/08/5)
7. [[oss-security] 20151008 CVE request: Gummi](http://www.openwall.com/lists/oss-security/2015/10/08/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2638
- **State**: PUBLISHED
- **Published Date**: October 10, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: March 24, 2014 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2344.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT101587](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04454636)
2. [HPSBMU03110](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04454636) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17330
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei AR3200 V200R005C32; V200R006C10; V200R006C11; V200R007C00; V200R007C01; V200R007C02; V200R008C00; V200R008C10; V200R008C20; V200R008C30; NGFW Module V500R001C00; V500R001C20; V500R002C00 have a memory leak vulnerability. The software does not release allocated memory properly when parse XML element data. An authenticated attacker could upload a crafted XML file, successful exploit could cause the system service abnormal since run out of memory.
### Affected Products
**Huawei Technologies Co., Ltd. - AR3200; NGFW Module**
Affected versions:
- AR3200 V200R005C32 (Status: affected)
- V200R006C10 (Status: affected)
- V200R006C11 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C00 (Status: affected)
- V200R008C10 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
- NGFW Module V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R002C00 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-04-xml-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42133
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 12:01 UTC
- **Last Updated**: October 11, 2024 at 14:42 UTC
- **Reserved Date**: September 07, 2023 at 13:17 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
PAX Android based POS devices allow for escalation of privilege via improperly configured scripts.
An attacker must have shell access with system account privileges in order to exploit this vulnerability.
A patch addressing this issue was included in firmware version PayDroid_8.1.0_Sagittarius_V11.1.61_20240226.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**PAX - POS terminals**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://ppn.paxengine.com/release/development?)
2. [](https://blog.stmcyber.com/pax-pos-cves-2023/)
3. [](https://cert.pl/en/posts/2024/10/CVE-2023-42133)
4. [](https://cert.pl/posts/2024/10/CVE-2023-42133) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5765
- **State**: PUBLISHED
- **Published Date**: September 18, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The user interface in Safari in Apple iOS before 9 allows remote attackers to spoof URLs via unspecified vectors, a different vulnerability than CVE-2015-5764 and CVE-2015-5767.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033609](http://www.securitytracker.com/id/1033609)
2. [](https://support.apple.com/HT205212)
3. [76764](http://www.securityfocus.com/bid/76764)
4. [](https://support.apple.com/HT205265)
5. [APPLE-SA-2015-09-30-2](http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html)
6. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1647
- **State**: PUBLISHED
- **Published Date**: June 06, 2022 at 08:51 UTC
- **Last Updated**: August 03, 2024 at 00:10 UTC
- **Reserved Date**: May 10, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The FormCraft WordPress plugin before 1.2.6 does not sanitise and escape Field Labels, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - FormCraft – Contact Form Builder for WordPress**
Affected versions:
- 1.2.6 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/8e8f6b08-90ab-466a-9828-dca0c0da2c9c)
### Credits
- Chiragh Arora |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8996
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 16:45 UTC
- **Last Updated**: September 26, 2024 at 16:23 UTC
- **Reserved Date**: September 19, 2024 at 09:56 UTC
- **Assigned By**: GRAFANA
### Vulnerability Description
Unquoted Search Path or Element vulnerability in Grafana Agent (Flow mode) on Windows allows Privilege Escalation from Local User to SYSTEM
This issue affects Agent Flow: before 0.43.2
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
### Affected Products
**Grafana - Agent Flow**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://grafana.com/security/security-advisories/cve-2024-8996/)
2. [](https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996/)
3. [](https://github.com/grafana/agent/releases/tag/v0.43.3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0605
- **State**: PUBLISHED
- **Published Date**: February 06, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: December 28, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the rftpcom.dll ActiveX control in Attachmate Reflection FTP Client before 14.1.429 allows remote attackers to execute arbitrary code via unspecified vectors to the SaveSettings method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.attachmate.com/techdocs/2501.html)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-14-290/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1522
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in htmlparse.pike in Roxen Web Server 1.3.11 and earlier, possibly related to recursive parsing and referer tags in RXML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19991007 Roxen security alert](http://marc.info/?l=bugtraq&m=93942579008408&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4727
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 19:30 UTC
- **Last Updated**: December 06, 2024 at 14:50 UTC
- **Reserved Date**: September 01, 2023 at 20:44 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-305: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Certificate System 10.4 EUS for RHEL-8**
Affected versions:
- 8060020240529205458.07fb4edf (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 7**
Affected versions:
- 0:10.5.18-32.el7_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 8100020240614102443.82f485b7 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support**
Affected versions:
- 8040020240329193548.17df0a3f (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Telecommunications Update Service**
Affected versions:
- 8040020240329193548.17df0a3f (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions**
Affected versions:
- 8040020240329193548.17df0a3f (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support**
Affected versions:
- 8060020240329182634.60523a7b (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Telecommunications Update Service**
Affected versions:
- 8060020240329182634.60523a7b (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions**
Affected versions:
- 8060020240329182634.60523a7b (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support**
Affected versions:
- 8080020240329143735.693a3987 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:11.5.0-2.el9_4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions**
Affected versions:
- 0:11.0.6-3.el9_0 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:11.3.0-2.el9_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
### References
1. [RHSA-2024:4051](https://access.redhat.com/errata/RHSA-2024:4051)
2. [RHSA-2024:4070](https://access.redhat.com/errata/RHSA-2024:4070)
3. [RHSA-2024:4164](https://access.redhat.com/errata/RHSA-2024:4164)
4. [RHSA-2024:4165](https://access.redhat.com/errata/RHSA-2024:4165)
5. [RHSA-2024:4179](https://access.redhat.com/errata/RHSA-2024:4179)
6. [RHSA-2024:4222](https://access.redhat.com/errata/RHSA-2024:4222)
7. [RHSA-2024:4367](https://access.redhat.com/errata/RHSA-2024:4367)
8. [RHSA-2024:4403](https://access.redhat.com/errata/RHSA-2024:4403)
9. [RHSA-2024:4413](https://access.redhat.com/errata/RHSA-2024:4413)
10. [](https://access.redhat.com/security/cve/CVE-2023-4727)
11. [RHBZ#2232218](https://bugzilla.redhat.com/show_bug.cgi?id=2232218)
### Credits
- Red Hat would like to thank Pham Van Khanh (Calif) for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27302
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:48 UTC
- **Last Updated**: April 17, 2025 at 18:20 UTC
- **Reserved Date**: February 21, 2025 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Claudio Adrian Marrero CHATLIVE allows SQL Injection. This issue affects CHATLIVE: from n/a through 2.0.1.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Claudio Adrian Marrero - CHATLIVE**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/chatlive/vulnerability/wordpress-chatlive-plugin-2-0-1-sql-injection-vulnerability?_s_id=cve)
### Credits
- Phan Trong Quan - VNPT Cyber Immunity (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0208
- **State**: PUBLISHED
- **Published Date**: March 09, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MicroFocus Cobol 4.1, with the AppTrack feature enabled, installs the mfaslmf directory and the nolicense file with insecure permissions, which allows local users to gain privileges by modifying files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2359](http://www.securityfocus.com/bid/2359)
2. [20010211 Security Hole in Microfocus Cobol](http://archives.neohapsis.com/archives/bugtraq/2001-02/0205.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18112
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43142
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:17 UTC
- **Last Updated**: November 04, 2024 at 14:05 UTC
- **Reserved Date**: August 07, 2024 at 09:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Themeum Tutor LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through 2.7.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Themeum - Tutor LMS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-7-3-broken-access-control-vulnerability?_s_id=cve)
### Credits
- justakazh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0490
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: July 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the NetWin DSMTP 2.7q in the NetWin dmail package allows remote attackers to execute arbitrary commands via a long ETRN request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dmail-etrn-dos(4579)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4579)
2. [1297](http://www.securityfocus.com/bid/1297)
3. [](http://netwinsite.com/dmail/security.htm)
4. [20000601 Netwin's Dmail package](http://archives.neohapsis.com/archives/bugtraq/2000-05/0407.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1380
- **State**: PUBLISHED
- **Published Date**: June 17, 2010 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 04:14 UTC
- **Reserved Date**: April 15, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Integer overflow in the cgtexttops CUPS filter in Printing in Apple Mac OS X 10.6 before 10.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page sizes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2010-06-15-1](http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html)
2. [ADV-2010-1481](http://www.vupen.com/english/advisories/2010/1481)
3. [40871](http://www.securityfocus.com/bid/40871)
4. [1024103](http://securitytracker.com/id?1024103)
5. [](http://support.apple.com/kb/HT4188)
6. [40220](http://secunia.com/advisories/40220) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7969
- **State**: REJECTED
- **Published Date**: February 11, 2020 at 17:56 UTC
- **Last Updated**: February 11, 2020 at 17:56 UTC
- **Reserved Date**: October 08, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19602
- **State**: PUBLISHED
- **Published Date**: December 05, 2019 at 13:21 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c4bd853abcea95eccc167a7d7fd5f1a5f47b98)
2. [](https://github.com/torvalds/linux/commit/59c4bd853abcea95eccc167a7d7fd5f1a5f47b98)
3. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2)
4. [](https://github.com/golang/go/issues/35777#issuecomment-561935388)
5. [](https://bugzilla.kernel.org/show_bug.cgi?id=205663)
6. [](https://security.netapp.com/advisory/ntap-20200103-0001/)
7. [USN-4284-1](https://usn.ubuntu.com/4284-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2809
- **State**: PUBLISHED
- **Published Date**: April 01, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: March 31, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kb.cert.org/vuls/id/BLUU-9TLSHD)
2. [73683](http://www.securityfocus.com/bid/73683)
3. [VU#550620](http://www.kb.cert.org/vuls/id/550620) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1518
- **State**: PUBLISHED
- **Published Date**: April 18, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 24, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) 2.4.x before 2.4.10 and 3.x before 3.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SR:2011:009](http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html)
2. [44029](http://secunia.com/advisories/44029)
3. [47323](http://www.securityfocus.com/bid/47323)
4. [](http://otrs.org/advisory/OSA-2011-01-en/)
5. [ADV-2011-1186](http://www.vupen.com/english/advisories/2011/1186)
6. [71790](http://www.osvdb.org/71790)
7. [DSA-2231](http://www.debian.org/security/2011/dsa-2231)
8. [otrs-multiple-unspecified-xss(66698)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66698)
9. [44479](http://secunia.com/advisories/44479) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1115
- **State**: PUBLISHED
- **Published Date**: December 01, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: November 30, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The init scripts in Search for Extraterrestrial Intelligence (SETI) project 3.08-r3 and earlier execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-200411-26](http://www.gentoo.org/security/en/glsa/glsa-200411-26.xml)
2. [seti@home-gain-privileges(18149)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4478
- **State**: PUBLISHED
- **Published Date**: December 06, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5)
2. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673)
3. [oval:org.mitre.oval:def:12338](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12338)
4. [](http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h)
5. [](https://github.com/seb-m/jpake)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=659297)
7. [](http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4075
- **State**: PUBLISHED
- **Published Date**: December 08, 2005 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in index.cfm in CF_Nuke 4.6 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) topic and (2) newsid parameter in the news sector, and (3) cat parameter in the links sector.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17939](http://secunia.com/advisories/17939)
2. [21507](http://www.osvdb.org/21507)
3. [15778](http://www.securityfocus.com/bid/15778)
4. [cfnuke-index-xss(23540)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23540)
5. [ADV-2005-2795](http://www.vupen.com/english/advisories/2005/2795)
6. [](http://pridels0.blogspot.com/2005/12/cfnuke-v46-multiple-vuln.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1876
- **State**: REJECTED
- **Last Updated**: April 10, 2023 at 00:00 UTC
- **Reserved Date**: April 05, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5954
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The State Bank Anywhere (aka com.sbi.SBIFreedomPlus) application 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#970577](http://www.kb.cert.org/vuls/id/970577)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4916
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 23:26 UTC
- **Last Updated**: February 13, 2025 at 16:38 UTC
- **Reserved Date**: February 12, 2023 at 21:29 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Media in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 103.0.5060.53 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html)
2. [](https://crbug.com/1317714)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0834
- **State**: PUBLISHED
- **Published Date**: February 25, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [72743](http://www.securityfocus.com/bid/72743)
2. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
3. [openSUSE-SU-2015:0404](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html)
4. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
5. [](http://www.mozilla.org/security/announce/2015/mfsa2015-15.html)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1098314)
7. [1031791](http://www.securitytracker.com/id/1031791)
8. [openSUSE-SU-2015:0570](http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html)
9. [USN-2505-1](http://www.ubuntu.com/usn/USN-2505-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43623
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 14, 2025 at 16:17 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of SetWebFilterSetting requests to the web management portal. When parsing the WebFilterURLs element, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16140.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**D-Link - DIR-1935**
Affected versions:
- 1.03 (Status: affected)
### References
1. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10310)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1492/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3525
- **State**: PUBLISHED
- **Published Date**: October 18, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Application Express component in Oracle Database Server 3.2 and 4.0 allows remote authenticated users to affect confidentiality, integrity, and availability, related to APEX developer user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html)
2. [50197](http://www.securityfocus.com/bid/50197)
3. [odbs-appex-apex-unspecified(70799)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70799)
4. [76516](http://osvdb.org/76516) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10873
- **State**: PUBLISHED
- **Published Date**: November 23, 2024 at 04:32 UTC
- **Last Updated**: November 26, 2024 at 19:28 UTC
- **Reserved Date**: November 05, 2024 at 15:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.2 via the _load_template function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**choijun - LA-Studio Element Kit for Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/59415c36-e48a-4c05-ad22-8d55a9e13bcd?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/includes/extensions/albums/widget-templates/player/global/index.php)
3. [](https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/includes/extensions/albums/widget-templates/player/global/index.php#L26)
4. [](https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/includes/base/class-widget-base.php#L118)
5. [](https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/includes/base/class-widget-base.php#L141)
6. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3194361%40lastudio-element-kit&new=3194361%40lastudio-element-kit&sfp_email=&sfph_mail=)
### Credits
- Gregory Stewart
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27463
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 09:32 UTC
- **Last Updated**: February 27, 2025 at 18:59 UTC
- **Reserved Date**: March 01, 2023 at 17:29 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.3). The audit log form of affected applications is vulnerable to SQL injection. This could allow authenticated remote attackers to execute arbitrary SQL queries on the server database.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Siemens - RUGGEDCOM CROSSBOW**
Affected versions:
- All versions < V5.3 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-320629.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37392
- **State**: PUBLISHED
- **Published Date**: July 26, 2021 at 17:03 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ralap-z/RPCMS/)
2. [](https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42931
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 15:23 UTC
- **Reserved Date**: October 14, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk. Instead, the username (not password) was saved by the Form Manager to an unencrypted file on disk. This vulnerability affects Firefox < 106.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1780571)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-44/)
### Credits
- Sergey Galich |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1726
- **State**: PUBLISHED
- **Published Date**: June 10, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38269](https://www.exploit-db.com/exploits/38269/)
2. [1032525](http://www.securitytracker.com/id/1032525)
3. [MS15-061](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4646
- **State**: PUBLISHED
- **Published Date**: July 07, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 25, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the FPDFBookmark_GetTitle method in Foxit PDF SDK DLL before 3.1.1.5005 allows context-dependent attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-14-214)
2. [59494](http://secunia.com/advisories/59494)
3. [](http://www.foxitsoftware.com/support/security_bulletins.php#FRD-20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0764
- **State**: PUBLISHED
- **Published Date**: April 17, 2023 at 12:17 UTC
- **Last Updated**: February 06, 2025 at 16:43 UTC
- **Reserved Date**: February 09, 2023 at 16:53 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not perform proper sanitization of gallery information, leading to a Stored Cross-Site Scription vulnerability. The attacker must have at least the privileges of the Author role.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Gallery by BestWebSoft**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/d48c6c50-3734-4191-9833-0d9b09b1bd8a)
### Credits
- dc11
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0299
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in FreeBSD lpd through long DNS hostnames.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6093](http://www.osvdb.org/6093) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11761
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 08:47 UTC
- **Last Updated**: November 28, 2024 at 12:25 UTC
- **Reserved Date**: November 26, 2024 at 15:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LegalWeb Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'legalweb-popup' shortcode in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**legalweb - LegalWeb Cloud**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/034d3d52-cb77-40dd-85a1-81ca3bfd1f23?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3198065/legalweb-cloud/trunk/includes/shortcodes/class-legalweb-cloud-cookie-popup-shortcode.php)
### Credits
- SOPROBRO |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3183
- **State**: PUBLISHED
- **Published Date**: September 28, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 03, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap-based buffer overflow in the logi_dj_ll_raw_request function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that specifies a large report size for an LED report.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2)
2. [[oss-security] 20140911 Multiple Linux USB driver CVE assignment](http://www.openwall.com/lists/oss-security/2014/09/11/21)
3. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51217e69697fba92a06e07e16f55c9a52d8e8945)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1141344)
5. [](https://github.com/torvalds/linux/commit/51217e69697fba92a06e07e16f55c9a52d8e8945)
6. [](https://code.google.com/p/google-security-research/issues/detail?id=90) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22330
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 20:45 UTC
- **Last Updated**: September 16, 2024 at 16:54 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Control Desk 7.6.1 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 219126.
### Affected Products
**IBM - Control Desk**
Affected versions:
- 7.6.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6619739)
2. [ibm-controldesk-cve202222330-info-disc (219126)](https://exchange.xforce.ibmcloud.com/vulnerabilities/219126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9343
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 16, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service.
### Affected Products
**n/a - Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00**
Affected versions:
- Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-343-05)
2. [95304](http://www.securityfocus.com/bid/95304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30457
- **State**: PUBLISHED
- **Published Date**: April 07, 2021 at 21:19 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in remove_set upon a panic in a Drop impl.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2021-0052.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46170
- **State**: PUBLISHED
- **Published Date**: March 07, 2024 at 20:31 UTC
- **Last Updated**: September 27, 2024 at 16:06 UTC
- **Reserved Date**: October 17, 2023 at 22:30 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DS8900F HMC 89.21.19.0, 89.21.31.0, 89.30.68.0, 89.32.40.0, and 89.33.48.0 could allow an authenticated user to arbitrarily read files after enumerating file names.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-204: Improper Input Validation
### Affected Products
**IBM - DS8900F**
Affected versions:
- 89.21.19.0, 89.21.31.0, 89.30.68.0, 89.32.40.0, 89.33.48.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7130084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18910
- **State**: PUBLISHED
- **Published Date**: November 22, 2019 at 21:23 UTC
- **Last Updated**: August 05, 2024 at 02:02 UTC
- **Reserved Date**: November 12, 2019 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
The Citrix Receiver wrapper function does not safely handle user supplied input, which may be leveraged by an attacker to inject commands that will execute with local user privileges.
### Affected Products
**HP - ThinPro Linux**
Affected versions:
- 6.2 (Status: affected)
- 6.2.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1 (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/c06509350)
2. [20200324 HP ThinPro - Privileged command injection](http://seclists.org/fulldisclosure/2020/Mar/40)
3. [](http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2759
- **State**: PUBLISHED
- **Published Date**: July 17, 2023 at 06:14 UTC
- **Last Updated**: October 30, 2024 at 14:55 UTC
- **Reserved Date**: May 17, 2023 at 14:21 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
A hidden API exists in TapHome's core platform before version 2023.2 that allows an authenticated, low privileged user to change passwords of other users without any prior knowledge. The attacker may gain full access to the device by using this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**TAPHOME - Core Platform**
Affected versions:
- 0.0 (Status: affected)
### References
1. [](https://claroty.com/team82/disclosure-dashboard/cve-2023-2759)
### Credits
- Noam Moshe of Claroty Research |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45557
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:50 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TUP before 1.0.5.3, GS710TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS724TPP before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS752TPv2 before 6.0.8.2, GS752TPP before 6.0.8.2, GS750E before 1.0.1.10, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:H/C:L/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064164/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Switches-PSV-2021-0167) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36788
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 16:58 UTC
- **Last Updated**: January 01, 2025 at 02:04 UTC
- **Reserved Date**: June 27, 2023 at 15:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
.NET Framework Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- 3.0.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8.1**
Affected versions:
- 4.8.1 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 and 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 2.0 Service Pack 2**
Affected versions:
- 2.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.0 Service Pack 2**
Affected versions:
- 3.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5**
Affected versions:
- 3.5.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5.1**
Affected versions:
- 3.5.0 (Status: affected)
### References
1. [.NET Framework Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36788) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22893
- **State**: PUBLISHED
- **Published Date**: April 23, 2021 at 16:29 UTC
- **Last Updated**: February 04, 2025 at 19:12 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**n/a - Pulse Connect Secure**
Affected versions:
- PCS 9.0R3 or above, PCS 9.1R1 and above (Status: affected)
### References
1. [](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/)
2. [](https://blog.pulsesecure.net/pulse-connect-secure-security-update/)
3. [](https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html)
4. [](https://kb.cert.org/vuls/id/213092) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4613
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0731
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 21:23 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0691, CVE-2020-0719, CVE-2020-0720, CVE-2020-0721, CVE-2020-0722, CVE-2020-0723, CVE-2020-0724, CVE-2020-0725, CVE-2020-0726.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0731) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1773
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The code-signing subsystem in Apple OS X before 10.11.4 does not properly verify file ownership, which allows local users to determine the existence of arbitrary files via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html)
2. [](https://support.apple.com/HT206167)
3. [1035363](http://www.securitytracker.com/id/1035363) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33070
- **State**: PUBLISHED
- **Published Date**: December 05, 2023 at 03:04 UTC
- **Last Updated**: May 29, 2025 at 13:31 UTC
- **Reserved Date**: May 17, 2023 at 09:28 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Transient DOS in Automotive OS due to improper authentication to the secure IO calls.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- C-V2X 9150 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FastConnect 6200 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8775P (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6430 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCM6125 (Status: affected)
- QCN9074 (Status: affected)
- QCS410 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS8155 (Status: affected)
- Qualcomm 205 Mobile Platform (Status: affected)
- Qualcomm 215 Mobile Platform (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SD 675 (Status: affected)
- SD660 (Status: affected)
- SD675 (Status: affected)
- SD730 (Status: affected)
- SD855 (Status: affected)
- SDM429W (Status: affected)
- SDX55 (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 210 Processor (Status: affected)
- Snapdragon 212 Mobile Platform (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 660 Mobile Platform (Status: affected)
- Snapdragon 665 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected)
- Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected)
- Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon Auto 4G Modem (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680 (Status: affected)
- WCN3680B (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3990 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2194
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:53 UTC
- **Last Updated**: September 26, 2024 at 15:28 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.33 and prior (Status: affected)
- 8.0.23 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
2. [FEDORA-2021-01189f6361](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/)
3. [FEDORA-2021-5b6c69a73a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/)
4. [FEDORA-2021-b8b7829a83](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/)
5. [](https://security.netapp.com/advisory/ntap-20210513-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9316
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 14:48 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: August 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-fastest-cache plugin before 0.8.4.9 for WordPress has SQL injection in wp-admin/admin-ajax.php?action=wpfc_wppolls_ajax_request via the poll_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-fastest-cache/#developers)
2. [](https://www.exploit-db.com/exploits/38678) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42292
- **State**: PUBLISHED
- **Published Date**: November 10, 2021 at 00:47 UTC
- **Last Updated**: February 04, 2025 at 19:14 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42292) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4894
- **State**: PUBLISHED
- **Published Date**: February 27, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the XPS font processing. A successful attack can lead to sensitive data exposure.
### Affected Products
**n/a - Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions**
Affected versions:
- Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions (Status: affected)
### References
1. [102996](http://www.securityfocus.com/bid/102996)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-02.html)
3. [1040364](http://www.securitytracker.com/id/1040364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32001
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 22:25 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 08, 2024 at 13:48 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. As a workaround, avoid using LookupSubjects for negative authorization decisions and/or avoid using the broken schema.
### CVSS Metrics
- **CVSS Base Score**: 2.2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**authzed - spicedb**
Affected versions:
- < 1.30.1 (Status: affected)
### References
1. [https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2](https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2)
2. [https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b](https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b)
3. [https://github.com/authzed/spicedb/releases/tag/v1.30.1](https://github.com/authzed/spicedb/releases/tag/v1.30.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49285
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 22:56 UTC
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: November 24, 2023 at 16:45 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**squid-cache - squid**
Affected versions:
- >= 2.2, < 6.5 (Status: affected)
### References
1. [https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9](https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9)
2. [https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b](https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b)
3. [https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470](https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470)
4. [http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch](http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch)
5. [http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch](http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/)
7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/)
8. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html)
9. [](https://security.netapp.com/advisory/ntap-20240119-0004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11299
- **State**: PUBLISHED
- **Published Date**: September 18, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 18, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, when WLAN FW has not filled the vdev id correctly in stats events then WLAN host driver tries to access interface array without proper bound check which can lead to invalid memory access and as a side effect kernel panic or page fault.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=409d269c3464a84d9274bc0831031b2216b1060)
2. [](https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin)
3. [107770](http://www.securityfocus.com/bid/107770) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2670
- **State**: PUBLISHED
- **Published Date**: August 05, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:8022](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8022)
2. [RHSA-2009:1200](https://rhn.redhat.com/errata/RHSA-2009-1200.html)
3. [RHSA-2009:1199](https://rhn.redhat.com/errata/RHSA-2009-1199.html)
4. [36162](http://secunia.com/advisories/36162)
5. [ADV-2009-2543](http://www.vupen.com/english/advisories/2009/2543)
6. [37460](http://secunia.com/advisories/37460)
7. [GLSA-200911-02](http://security.gentoo.org/glsa/glsa-200911-02.xml)
8. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html)
9. [HPSBUX02476](http://marc.info/?l=bugtraq&m=125787273209737&w=2)
10. [263408](http://sunsolve.sun.com/search/document.do?assetkey=1-66-263408-1)
11. [36199](http://secunia.com/advisories/36199)
12. [36248](http://secunia.com/advisories/36248)
13. [MDVSA-2009:209](http://www.mandriva.com/security/advisories?name=MDVSA-2009:209)
14. [FEDORA-2009-8329](https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html)
15. [56788](http://osvdb.org/56788)
16. [SSRT090250](http://marc.info/?l=bugtraq&m=125787273209737&w=2)
17. [1022658](http://www.securitytracker.com/id?1022658)
18. [](http://java.sun.com/javase/6/webnotes/6u15.html)
19. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded)
20. [TA09-294A](http://www.us-cert.gov/cas/techalerts/TA09-294A.html)
21. [36180](http://secunia.com/advisories/36180)
22. [](http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html)
23. [](http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1)
24. [36176](http://secunia.com/advisories/36176)
25. [FEDORA-2009-8337](https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html)
26. [oval:org.mitre.oval:def:11326](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11326)
27. [SUSE-SR:2009:016](http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html)
28. [37300](http://secunia.com/advisories/37300)
29. [APPLE-SA-2009-09-03-1](http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html)
30. [SUSE-SA:2009:053](http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html)
31. [RHSA-2009:1201](https://rhn.redhat.com/errata/RHSA-2009-1201.html)
32. [SUSE-SA:2009:043](http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html)
33. [37386](http://secunia.com/advisories/37386)
34. [jre-jdk-audiosystem-priv-escalation(52306)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52306)
35. [](http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20)
36. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316)
37. [35939](http://www.securityfocus.com/bid/35939) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5786
- **State**: PUBLISHED
- **Published Date**: January 19, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 05:47 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Long Range Zip (aka lrzip) 0.631, there is an infinite loop and application hang in the get_fileinfo function (lrzip.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted lrz file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ckolivas/lrzip/issues/91)
2. [[debian-lts-announce] 20210801 [SECURITY] [DLA 2725-1] lrzip security update](https://lists.debian.org/debian-lts-announce/2021/08/msg00001.html)
3. [[debian-lts-announce] 20220413 [SECURITY] [DLA 2981-1] lrzip security update](https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html)
4. [DSA-5145](https://www.debian.org/security/2022/dsa-5145) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0397
- **State**: PUBLISHED
- **Published Date**: January 12, 2025 at 12:31 UTC
- **Last Updated**: January 13, 2025 at 15:16 UTC
- **Reserved Date**: January 11, 2025 at 19:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**reckcn - SPPanAdmin**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-291270 | reckcn SPPanAdmin edit cross site scripting](https://vuldb.com/?id.291270)
2. [VDB-291270 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.291270)
3. [Submit #473287 | reckcn SPPanAdmin 1.0 storage type XSS](https://vuldb.com/?submit.473287)
4. [](https://github.com/LvZCh/SPPanAdmin/issues/3)
5. [](https://github.com/LvZCh/SPPanAdmin/issues/3#issue-2765450314)
### Credits
- LVZC (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24044
- **State**: PUBLISHED
- **Published Date**: January 15, 2022 at 00:35 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Facebook - Hermes**
Affected versions:
- 0.10.0 (Status: unaffected)
- unspecified (Status: affected)
### References
1. [](https://www.facebook.com/security/advisories/cve-2021-24044) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3962
- **State**: PUBLISHED
- **Published Date**: November 17, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 06:45 UTC
- **Reserved Date**: November 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The management interface on the 2wire Gateway 1700HG, 1701HG, 1800HW, 2071, 2700HG, and 2701HG-T with software before 5.29.52 allows remote attackers to cause a denial of service (reboot) via a %0d%0a sequence in the page parameter to the xslt program on TCP port 50001, a related issue to CVE-2006-4523.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20091029 2wire Remote Denial of Service](http://www.securityfocus.com/archive/1/507587/100/0/threaded)
2. [](http://webvuln.com/advisories/2wire.remote.denial.of.service.txt)
3. [1023116](http://www.securitytracker.com/id?1023116)
4. [ADV-2009-3110](http://www.vupen.com/english/advisories/2009/3110) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6802
- **State**: PUBLISHED
- **Published Date**: May 07, 2009 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 16:13 UTC
- **Reserved Date**: May 07, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in index.php in phPhotoGallery 0.92 allow remote attackers to execute arbitrary SQL commands via the (1) Username and (2) Password fields. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securityfocus.com/bid/31850/exploit)
2. [31850](http://www.securityfocus.com/bid/31850) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52563
- **State**: PUBLISHED
- **Published Date**: March 02, 2024 at 21:59 UTC
- **Last Updated**: May 04, 2025 at 07:38 UTC
- **Reserved Date**: March 02, 2024 at 21:55 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/meson: fix memory leak on ->hpd_notify callback
The EDID returned by drm_bridge_get_edid() needs to be freed.
### Affected Products
**Linux - Linux**
Affected versions:
- e098989a9219f4456047f9b0e8c44f03e29a843e (Status: affected)
- 0af5e0b41110e2da872030395231ab19c45be931 (Status: affected)
- 0af5e0b41110e2da872030395231ab19c45be931 (Status: affected)
- 0af5e0b41110e2da872030395231ab19c45be931 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.17 (Status: affected)
- 0 (Status: unaffected)
- 5.15.134 (Status: unaffected)
- 6.1.56 (Status: unaffected)
- 6.5.6 (Status: unaffected)
- 6.6 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/66cb6d74f5a1b6eafe3370b56bf2cb575a91acbc)
2. [](https://git.kernel.org/stable/c/ee335e0094add7fc2c7034e0534e1920d61d2078)
3. [](https://git.kernel.org/stable/c/43b63e088887a8b82750e16762f77100ffa76cba)
4. [](https://git.kernel.org/stable/c/099f0af9d98231bb74956ce92508e87cbcb896be) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4020
- **State**: PUBLISHED
- **Published Date**: August 08, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 08, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1016984](http://securitytracker.com/id?1016984)
2. [](http://www.plain-text.info/sscanf_bug.txt)
3. [](http://www.php.net/release_5_1_5.php)
4. [19415](http://www.securityfocus.com/bid/19415)
5. [21768](http://secunia.com/advisories/21768)
6. [21403](http://secunia.com/advisories/21403)
7. [RHSA-2006:0669](http://www.redhat.com/support/errata/RHSA-2006-0669.html)
8. [MDKSA-2006:144](http://www.mandriva.com/security/advisories?name=MDKSA-2006:144)
9. [oval:org.mitre.oval:def:11062](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11062)
10. [21847](http://secunia.com/advisories/21847)
11. [SUSE-SR:2006:020](http://www.novell.com/linux/security/advisories/2006_20_sr.html)
12. [22487](http://secunia.com/advisories/22487)
13. [USN-342-1](http://www.ubuntu.com/usn/usn-342-1)
14. [](http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm)
15. [22039](http://secunia.com/advisories/22039)
16. [RHSA-2006:0688](http://rhn.redhat.com/errata/RHSA-2006-0688.html)
17. [](http://bugs.php.net/bug.php?id=38322)
18. [21683](http://secunia.com/advisories/21683)
19. [23247](http://secunia.com/advisories/23247)
20. [21467](http://secunia.com/advisories/21467)
21. [SUSE-SR:2006:019](http://www.novell.com/linux/security/advisories/2006_19_sr.html)
22. [22004](http://secunia.com/advisories/22004)
23. [](http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm)
24. [22538](http://secunia.com/advisories/22538)
25. [RHSA-2006:0682](http://www.redhat.com/support/errata/RHSA-2006-0682.html)
26. [21546](http://secunia.com/advisories/21546)
27. [21608](http://secunia.com/advisories/21608)
28. [22440](http://secunia.com/advisories/22440)
29. [22069](http://secunia.com/advisories/22069)
30. [20060804 php local buffer underflow could lead to arbitary code execution](http://www.securityfocus.com/archive/1/442438/30/0/threaded)
31. [](http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm)
32. [SUSE-SR:2006:022](http://www.novell.com/linux/security/advisories/2006_22_sr.html)
33. [ADV-2006-3193](http://www.vupen.com/english/advisories/2006/3193)
34. [](http://www.php.net/ChangeLog-5.php#5.1.5)
35. [20061001-01-P](ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc)
36. [GLSA-200608-28](http://security.gentoo.org/glsa/glsa-200608-28.xml)
37. [1341](http://securityreason.com/securityalert/1341)
38. [RHSA-2006:0736](http://rhn.redhat.com/errata/RHSA-2006-0736.html)
39. [SUSE-SA:2006:052](http://www.novell.com/linux/security/advisories/2006_52_php.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1140
- **State**: PUBLISHED
- **Published Date**: February 27, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 27, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in edit.php in pheap allows remote attackers to read and modify arbitrary files via a .. (dot dot) in the filename parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33140](http://osvdb.org/33140)
2. [2354](http://securityreason.com/securityalert/2354)
3. [22670](http://www.securityfocus.com/bid/22670)
4. [20070222 pheap [edit LFI] vulnerability](http://www.securityfocus.com/archive/1/460920/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0861
- **State**: PUBLISHED
- **Published Date**: February 05, 2016 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 17, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to execute arbitrary commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://apps.geindustrial.com/publibrary/checkout/Application%20and%20Technical%7CGEIS_SNMP%7CPDF&filename=GEIS_SNMP.pdf)
2. [](http://packetstormsecurity.com/files/135586/GE-Industrial-Solutions-UPS-SNMP-Adapter-Command-Injection.html)
3. [20160203 GE Industrial Solutions - UPS SNMP Adapter Command Injection and Clear-text Sensitive Info Vulnerabilities](http://seclists.org/fulldisclosure/2016/Feb/21)
4. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-033-02)
5. [39408](https://www.exploit-db.com/exploits/39408/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14459
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 13:15 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Mattermost Server before 5.19.0. Attackers can rename a channel and cause a collision with a direct message, aka MMSA-2020-0002.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mattermost.com/security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1823
- **State**: PUBLISHED
- **Published Date**: December 28, 2024 at 06:29 UTC
- **Last Updated**: December 28, 2024 at 16:33 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There are multiple out of bounds (OOB) read vulnerabilities in the implementation of the Common Open Policy Service (COPS) protocol of some Huawei products. The specific decoding function may occur out-of-bounds read when processes an incoming data packet. Successful exploit of these vulnerabilities may disrupt service on the affected device. (Vulnerability ID: HWPSIRT-2018-12275,HWPSIRT-2018-12276,HWPSIRT-2018-12277,HWPSIRT-2018-12278,HWPSIRT-2018-12279,HWPSIRT-2018-12280 and HWPSIRT-2018-12289)
The seven vulnerabilities have been assigned seven Common Vulnerabilities and Exposures (CVE) IDs: CVE-2020-1818, CVE-2020-1819, CVE-2020-1820, CVE-2020-1821, CVE-2020-1822, CVE-2020-1823 and CVE-2020-1824.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Huawei - IPS Module**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NGFW Module**
Affected versions:
- V500R002C00 (Status: affected)
- V500R002C20 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NIP6300**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NIP6600**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - NIP6800**
Affected versions:
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6300**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6500**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - Secospace USG6600**
Affected versions:
- V500R001C30 (Status: affected)
- V500R005C00 (Status: affected)
**Huawei - USG6000V**
Affected versions:
- V500R003C00 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20191218-01-cops-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37752
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 12:55 UTC
- **Last Updated**: May 26, 2025 at 05:20 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net_sched: sch_sfq: move the limit validation
It is not sufficient to directly validate the limit on the data that
the user passes as it can be updated based on how the other parameters
are changed.
Move the check at the end of the configuration update process to also
catch scenarios where the limit is indirectly updated, for example
with the following configurations:
tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1
tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1
This fixes the following syzkaller reported crash:
------------[ cut here ]------------
UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6
index 65535 is out of range for type 'struct sfq_head[128]'
CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120
ubsan_epilogue lib/ubsan.c:231 [inline]
__ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429
sfq_link net/sched/sch_sfq.c:203 [inline]
sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231
sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493
sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518
qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035
tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339
qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035
dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311
netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]
dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375
### Affected Products
**Linux - Linux**
Affected versions:
- 35d0137305ae2f97260a9047f445bd4434bd6cc7 (Status: affected)
- 833e9a1c27b82024db7ff5038a51651f48f05e5e (Status: affected)
- 7d8947f2153ee9c5ab4cb17861a11cc45f30e8c4 (Status: affected)
- 7fefc294204f10a3405f175f4ac2be16d63f135e (Status: affected)
- 10685681bafce6febb39770f3387621bf5d67d0b (Status: affected)
- 10685681bafce6febb39770f3387621bf5d67d0b (Status: affected)
**Linux - Linux**
Affected versions:
- 6.14 (Status: affected)
- 0 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1348214fa042a71406964097e743c87a42c85a49)
2. [](https://git.kernel.org/stable/c/d2718324f9e329b10ddc091fba5a0ba2b9d4d96a)
3. [](https://git.kernel.org/stable/c/f86293adce0c201cfabb283ef9d6f21292089bb8)
4. [](https://git.kernel.org/stable/c/5e5e1fcc1b8ed57f902c424c5d9b328a3a19073d)
5. [](https://git.kernel.org/stable/c/b36a68192037d1614317a09b0d78c7814e2eecf9)
6. [](https://git.kernel.org/stable/c/b3bf8f63e6179076b57c9de660c9f80b5abefe70) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5901
- **State**: PUBLISHED
- **Published Date**: May 05, 2017 at 07:04 UTC
- **Last Updated**: August 05, 2024 at 15:11 UTC
- **Reserved Date**: February 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The State Bank of India State Bank Anywhere app 5.1.0 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40chronic_9612/follow-up-76-popular-apps-confirmed-vulnerable-to-silent-interception-of-tls-protected-data-64185035029f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6410
- **State**: PUBLISHED
- **Published Date**: December 07, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 17:39 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64002](http://www.securityfocus.com/bid/64002)
2. [USN-2676-1](http://www.ubuntu.com/usn/USN-2676-1)
3. [[oss-security] 20131129 Re: CVE request: incorrect parsing of access control file in nbd-server](http://www.openwall.com/lists/oss-security/2013/11/29/4)
4. [[nbd-general] 20131201 [Nbd] 3.5 released](http://sourceforge.net/mailarchive/forum.php?thread_name=529BAA58.2080401%40uter.be&forum_name=nbd-general)
5. [DSA-2806](http://www.debian.org/security/2013/dsa-2806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7123
- **State**: PUBLISHED
- **Published Date**: May 23, 2019 at 17:15 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-17.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2532
- **State**: PUBLISHED
- **Published Date**: March 16, 2024 at 22:00 UTC
- **Last Updated**: August 12, 2024 at 16:23 UTC
- **Reserved Date**: March 15, 2024 at 16:28 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/update-users.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256969 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**MAGESH-K21 - Online-College-Event-Hall-Reservation-System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-256969 | MAGESH-K21 Online-College-Event-Hall-Reservation-System update-users.php sql injection](https://vuldb.com/?id.256969)
2. [VDB-256969 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256969)
3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md)
### Credits
- Joshua Lictan
- nochizplz (VulDB User)
- nochizplz (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3570
- **State**: PUBLISHED
- **Published Date**: July 25, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2012:1006](http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html)
2. [MDVSA-2012:115](http://www.mandriva.com/security/advisories?name=MDVSA-2012:115)
3. [GLSA-201301-06](http://security.gentoo.org/glsa/glsa-201301-06.xml)
4. [](https://kb.isc.org/article/AA-00714)
5. [54665](http://www.securityfocus.com/bid/54665) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2043
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11232
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 16:50 UTC
- **Last Updated**: August 04, 2024 at 22:48 UTC
- **Reserved Date**: April 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EXCELLENT INFOTEK BiYan v1.57 ~ v2.8 allows an attacker to leak user information (Password) without being authenticated, by sending an EMP_NO element to the kws_login/asp/query_user.asp URI, and then reading the PWD element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/keniver/dd27ba44d0aef4318551e647d927242f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6288
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6685
- **State**: PUBLISHED
- **Published Date**: January 17, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: January 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Publish XP module Menalto Gallery before 2.2.4 allows attackers to create albums and upload files via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://gallery.menalto.com/gallery_2.2.4_released)
2. [GLSA-200802-04](http://security.gentoo.org/glsa/glsa-200802-04.xml)
3. [28898](http://secunia.com/advisories/28898)
4. [41675](http://osvdb.org/41675)
5. [](http://bugs.gentoo.org/show_bug.cgi?id=203217) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.