System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45342 - **State**: PUBLISHED - **Published Date**: November 02, 2023 at 13:47 UTC - **Last Updated**: August 02, 2024 at 20:21 UTC - **Reserved Date**: October 06, 2023 at 21:35 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/register-router.php resource does not validate the characters received and they are sent unfiltered to the database. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Projectworlds Pvt. Limited - Online Food Ordering System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/hann) 2. [](https://projectworlds.in/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5449 - **State**: PUBLISHED - **Published Date**: October 20, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 11:48 UTC - **Reserved Date**: August 25, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zarafa WebAccess 4.1 and WebApp uses world-readable permissions for the files in their tmp directory, which allows local users to obtain sensitive information by reading temporary session data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20140824 CVE request: Multiple incorrect default permissions in Zarafa](http://seclists.org/oss-sec/2014/q3/444) 2. [webaccess-webapp-information-disc(95453)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95453) 3. [](http://advisories.mageia.org/MGASA-2014-0380.html) 4. [69369](http://www.securityfocus.com/bid/69369) 5. [MDVSA-2014:182](http://www.mandriva.com/security/advisories?name=MDVSA-2014:182) 6. [[oss-security] 20140825 Re: CVE request: Multiple incorrect default permissions in Zarafa](http://seclists.org/oss-sec/2014/q3/445)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10141, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10141 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10141 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 18:59 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data. CVSS 3.0 Base Score 8.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.3.0 (Status: affected) ### References 1. [99785](http://www.securityfocus.com/bid/99785) 2. [1038940](http://www.securitytracker.com/id/1038940) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0529 - **State**: PUBLISHED - **Published Date**: April 05, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 04:10 UTC - **Reserved Date**: December 17, 2014 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC PowerPath Virtual Appliance (aka vApp) before 2.0 has default passwords for the (1) emcupdate and (2) svcuser accounts, which makes it easier for remote attackers to obtain potentially sensitive information via a login session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/131250/EMC-PowerPath-Virtual-Appliance-Undocumented-User-Accounts.html) 2. [20150401 ESA-2015-056: EMC PowerPath Virtual Appliance Undocumented User Accounts Vulnerability](http://seclists.org/bugtraq/2015/Apr/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38672, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38672 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38672 - **State**: PUBLISHED - **Published Date**: July 26, 2023 at 11:04 UTC - **Last Updated**: October 23, 2024 at 14:17 UTC - **Reserved Date**: July 24, 2023 at 07:55 UTC - **Assigned By**: Baidu ### Vulnerability Description FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-369: Security Weakness ### Affected Products **PaddlePaddle - PaddlePaddle** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0124 - **State**: PUBLISHED - **Published Date**: February 08, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: February 08, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description surfCONTROL SuperScout does not properly asign a category to web sites with a . (dot) at the end, which may allow users to bypass web access restrictions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [965](http://www.securityfocus.com/bid/965)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32977 - **State**: PUBLISHED - **Published Date**: April 04, 2022 at 19:45 UTC - **Last Updated**: April 16, 2025 at 17:57 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description AVEVA System Platform versions 2017 through 2020 R2 P01 does not verify, or incorrectly verifies, the cryptographic signature for data. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-347: Security Weakness ### Affected Products **AVEVA - AVEVA System Platform** Affected versions: - 2017 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-05) 2. [](https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-002.pdf) ### Credits - Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28183 - **State**: PUBLISHED - **Published Date**: April 06, 2021 at 05:02 UTC - **Last Updated**: September 17, 2024 at 03:48 UTC - **Reserved Date**: March 12, 2021 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description The specific function in ASUS BMC’s firmware Web management page (Web License configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **ASUS - BMC firmware for Z10PR-D16** Affected versions: - 1.14.51 (Status: affected) **ASUS - BMC firmware for ASMB8-iKVM** Affected versions: - 1.14.51 (Status: affected) **ASUS - BMC firmware for Z10PE-D16 WS** Affected versions: - 1.14.2 (Status: affected) ### References 1. [](https://www.asus.com/content/ASUS-Product-Security-Advisory/) 2. [](https://www.asus.com/tw/support/callus/) 3. [](https://www.twcert.org.tw/tw/cp-132-4553-06ae2-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39960, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39960 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39960 - **State**: PUBLISHED - **Published Date**: October 13, 2023 at 12:07 UTC - **Last Updated**: September 17, 2024 at 20:32 UTC - **Reserved Date**: August 07, 2023 at 16:27 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **nextcloud - security-advisories** Affected versions: - >= 22.0.0, < 22.2.10.14 (Status: affected) - >= 23.0.0, < 23.0.12.9 (Status: affected) - >= 24.0.0, < 24.0.12.5 (Status: affected) - >= 25.0.0, < 25.0.9 (Status: affected) - >= 26.0.0, < 26.0.4 (Status: affected) ### References 1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9) 2. [https://github.com/nextcloud/server/pull/38046](https://github.com/nextcloud/server/pull/38046) 3. [https://hackerone.com/reports/1924212](https://hackerone.com/reports/1924212)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25620, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25620 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25620 - **State**: PUBLISHED - **Published Date**: February 14, 2024 at 23:24 UTC - **Last Updated**: August 26, 2024 at 14:49 UTC - **Reserved Date**: February 08, 2024 at 22:26 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. When either the Helm client or SDK is used to save a chart whose name within the `Chart.yaml` file includes a relative path change, the chart would be saved outside its expected directory based on the changes in the relative path. The validation and linting did not detect the path changes in the name. This issue has been resolved in Helm v3.14.1. Users unable to upgrade should check all charts used by Helm for path changes in their name as found in the `Chart.yaml` file. This includes dependencies. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **helm - helm** Affected versions: - < 3.14.1 (Status: affected) ### References 1. [https://github.com/helm/helm/security/advisories/GHSA-v53g-5gjp-272r](https://github.com/helm/helm/security/advisories/GHSA-v53g-5gjp-272r) 2. [https://github.com/helm/helm/commit/0d0f91d1ce277b2c8766cdc4c7aa04dbafbf2503](https://github.com/helm/helm/commit/0d0f91d1ce277b2c8766cdc4c7aa04dbafbf2503)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2327 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vizer Web Server 1.9.1 allows remote attackers to cause a denial of service (crash) via multiple malformed requests including (1) requests without GET, (2) GET requests without HTTP, (3) or long GET requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9678](http://www.securityfocus.com/bid/9678) 2. [20040217 Denial Of Service in Vizer Web Server 1.9.1](http://www.securityfocus.com/archive/1/354156) 3. [vizer-long-string-dos(15239)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15239)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0717 - **State**: PUBLISHED - **Published Date**: February 25, 2011 at 18:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: January 31, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Session fixation vulnerability in Red Hat Network (RHN) Satellite Server 5.4 allows remote attackers to hijack web sessions via unspecified vectors related to Spacewalk. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [46528](http://www.securityfocus.com/bid/46528) 2. [ADV-2011-0491](http://www.vupen.com/english/advisories/2011/0491) 3. [RHSA-2011:0300](http://www.redhat.com/support/errata/RHSA-2011-0300.html) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=672159) 5. [1025116](http://www.securitytracker.com/id?1025116) 6. [rhnss-session-hijacking(65658)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65658) 7. [43487](http://secunia.com/advisories/43487)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24651 - **State**: PUBLISHED - **Published Date**: February 27, 2023 at 00:00 UTC - **Last Updated**: March 10, 2025 at 17:28 UTC - **Reserved Date**: January 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html) 2. [](https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip) 3. [](https://github.com/y0gesh-verma/CVE/blob/main/CVE-2023-24651/CVE-2023-24651.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0582 - **State**: PUBLISHED - **Published Date**: March 02, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:21 UTC - **Reserved Date**: February 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Computer Associates (CA) License Client 0.1.0.15 allows remote attackers to execute arbitrary code via a long filename in a PUTOLF request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050302 License Patches Are Now Available To Address Buffer Overflows](http://marc.info/?l=bugtraq&m=110979326828704&w=2) 2. [20050302 Computer Associates License Client PUTOLF Buffer Overflow](http://www.idefense.com/application/poi/display?id=211&type=vulnerabilities) 3. [](http://supportconnectw.ca.com/public/ca_common_docs/security_notice.asp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16996, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16996 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16996 - **State**: PUBLISHED - **Published Date**: December 22, 2017 at 10:00 UTC - **Last Updated**: August 05, 2024 at 20:43 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling. ### Affected Products **n/a - Linux kernel through 4.14.8** Affected versions: - Linux kernel through 4.14.8 (Status: affected) ### References 1. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=1454) 2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958) 3. [](https://github.com/torvalds/linux/commit/0c17d1d2c61936401f4702e1846e2c19b200f958) 4. [102267](http://www.securityfocus.com/bid/102267) 5. [](http://openwall.com/lists/oss-security/2017/12/21/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36136, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36136 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36136 - **State**: PUBLISHED - **Published Date**: August 11, 2023 at 00:00 UTC - **Last Updated**: October 09, 2024 at 17:52 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability in cskaza cszcms version 1.2.9, allows attackers to gain sensitive information via pm_sendmail parameter in csz_model.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cskaza/cszcms/issues/26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27276 - **State**: PUBLISHED - **Published Date**: March 29, 2021 at 20:55 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 16, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **NETGEAR - ProSAFE Network Management System** Affected versions: - 1.6.0.26 (Status: affected) ### References 1. [](https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-359/) ### Credits - rgod
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48021 - **State**: PUBLISHED - **Published Date**: February 03, 2023 at 00:00 UTC - **Last Updated**: March 26, 2025 at 18:32 UTC - **Reserved Date**: December 29, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in Zammad v5.3.0 allows attackers to execute arbitrary code or escalate privileges via a crafted message sent to the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://zammad.com/de/advisories/zaa-2022-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16841 - **State**: PUBLISHED - **Published Date**: November 28, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 11, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **[UNKNOWN] - samba** Affected versions: - 4.7.12 (Status: affected) - 4.8.7 (Status: affected) - 4.9.3 (Status: affected) ### References 1. [106023](http://www.securityfocus.com/bid/106023) 2. [USN-3827-2](https://usn.ubuntu.com/3827-2/) 3. [USN-3827-1](https://usn.ubuntu.com/3827-1/) 4. [](https://security.netapp.com/advisory/ntap-20181127-0001/) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841) 6. [DSA-4345](https://www.debian.org/security/2018/dsa-4345) 7. [](https://www.samba.org/samba/security/CVE-2018-16841.html) 8. [GLSA-202003-52](https://security.gentoo.org/glsa/202003-52)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15656 - **State**: PUBLISHED - **Published Date**: August 10, 2020 at 17:43 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 10, 2020 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. ### Affected Products **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2020-30/) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-32/) 3. [](https://www.mozilla.org/security/advisories/mfsa2020-33/) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1647293) 5. [openSUSE-SU-2020:1189](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html) 6. [USN-4443-1](https://usn.ubuntu.com/4443-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2372 - **State**: PUBLISHED - **Published Date**: April 30, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 13:33 UTC - **Reserved Date**: April 30, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description admin/send_mod.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and earlier prints a Location header but does not exit when administrative credentials are missing, which allows remote attackers to compose an e-mail message via a post with the subject, message, format, and list_id fields; and send the message via a direct request for the MsgId value under admin/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23342](http://www.securityfocus.com/bid/23342) 2. [3671](https://www.exploit-db.com/exploits/3671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51751 - **State**: PUBLISHED - **Published Date**: January 11, 2024 at 00:00 UTC - **Last Updated**: November 06, 2024 at 19:03 UTC - **Reserved Date**: December 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ScaleFusion 10.5.2 does not properly limit users to the Edge application because Alt-F4 can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59) 2. [](https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6) 3. [](https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7212 - **State**: PUBLISHED - **Published Date**: June 29, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 20:57 UTC - **Reserved Date**: June 29, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in Firebird 1.5, one of which affects WNET, have unknown impact and attack vectors. NOTE: this issue might overlap CVE-2006-1240. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.firebirdsql.org/rlsnotes/Firebird-2.0-ReleaseNotes.pdf) 2. [28474](http://www.securityfocus.com/bid/28474) 3. [29501](http://secunia.com/advisories/29501) 4. [DSA-1529](http://www.debian.org/security/2008/dsa-1529)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20420 - **State**: PUBLISHED - **Published Date**: December 24, 2018 at 03:00 UTC - **Last Updated**: September 17, 2024 at 04:24 UTC - **Reserved Date**: December 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In webERP 4.15, Z_CreateCompanyTemplateFile.php has Incorrect Access Control, leading to the overwrite of an existing .sql file on the target web site by creating a template and then using ../ directory traversal in the TemplateName parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/eddietcc/CVEnotes/blob/master/webERP_4.15_Z_CreateCompanyTemplateFile/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0742 - **State**: PUBLISHED - **Published Date**: April 09, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 17, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Tivoli Event Pump 4.2.2, when the LOG_REQUESTS and VALIDATE_SOAP_USERS options are enabled, places credentials into the AOPSCLOG (aka AOPLOG) data set, which allows local users to obtain sensitive information by reading the data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [tep-aopsclog-info-disclosure(74641)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74641) 2. [OA38586](http://www-01.ibm.com/support/docview.wss?uid=swg1OA38586)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1271 - **State**: PUBLISHED - **Published Date**: April 06, 2018 at 13:00 UTC - **Last Updated**: September 16, 2024 at 23:16 UTC - **Reserved Date**: December 06, 2017 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Spring by Pivotal - Spring Framework** Affected versions: - Versions prior to 5.0.5 and 4.3.15 (Status: affected) ### References 1. [103699](http://www.securityfocus.com/bid/103699) 2. [RHSA-2018:2669](https://access.redhat.com/errata/RHSA-2018:2669) 3. [RHSA-2018:2939](https://access.redhat.com/errata/RHSA-2018:2939) 4. [RHSA-2018:1320](https://access.redhat.com/errata/RHSA-2018:1320) 5. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) 6. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html) 7. [](https://www.oracle.com/security-alerts/cpujul2020.html) 8. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 9. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 10. [](https://pivotal.io/security/cve-2018-1271) 11. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4660 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 17:34 UTC - **Last Updated**: May 13, 2025 at 18:35 UTC - **Reserved Date**: May 13, 2025 at 17:34 UTC - **Assigned By**: Forescout ### Vulnerability Description A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent.  This does not impact Linux or OSX Secure Connector. ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **Forescout - SecureConnector** Affected versions: - 11.1.02.1019 (Status: affected) - 11.3.7 (Status: unaffected) ### References 1. [](https://forescout.my.site.com/support/s/article/) ### Credits - Pen Test Partners
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5622 - **State**: REJECTED - **Published Date**: September 17, 2013 at 10:00 UTC - **Last Updated**: September 16, 2024 at 20:43 UTC - **Reserved Date**: August 26, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4311 - **State**: PUBLISHED - **Published Date**: October 28, 2019 at 23:36 UTC - **Last Updated**: September 17, 2024 at 02:32 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Guardium Big Data Intelligence (SonarG) 4.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161037. ### Affected Products **IBM - Security Guardium Big Data Intelligence** Affected versions: - 4 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/1098069) 2. [ibm-guardium-cve20194311-info-disc (161037)](https://exchange.xforce.ibmcloud.com/vulnerabilities/161037)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1700, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1700 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1700 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 15:31 UTC - **Last Updated**: August 08, 2024 at 19:45 UTC - **Reserved Date**: February 21, 2024 at 10:29 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in keerti1924 PHP-MYSQL-User-Login-System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument username with the input <script>alert("xss")</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **keerti1924 - PHP-MYSQL-User-Login-System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-254388 | keerti1924 PHP-MYSQL-User-Login-System signup.php cross site scripting](https://vuldb.com/?id.254388) 2. [VDB-254388 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.254388) 3. [](https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS) ### Credits - omarexala (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9893 - **State**: PUBLISHED - **Published Date**: August 06, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 14:02 UTC - **Reserved Date**: June 24, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description drivers/video/msm/mdss/mdss_mdp_pp.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices does not properly determine the size of Gamut LUT data, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28747914 and Qualcomm internal bug CR542223. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-08-01.html) 2. [92222](http://www.securityfocus.com/bid/92222) 3. [](https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=bfc6eee5e30a0c20bc37495233506f4f0cc4991d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12000 - **State**: PUBLISHED - **Published Date**: July 17, 2020 at 21:12 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 13, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide. ### Affected Products **HPE - HPE MSE Msg Gw application E-LTU** Affected versions: - prior to version 3.2 (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03979en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4589 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:42 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1198 - **State**: PUBLISHED - **Published Date**: February 13, 2025 at 00:55 UTC - **Last Updated**: February 13, 2025 at 14:57 UTC - **Reserved Date**: February 10, 2025 at 16:02 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue discovered in GitLab CE/EE affecting all versions from 16.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 meant that long-lived connections in ActionCable potentially allowed revoked Personal Access Tokens access to streaming results. ### CVSS Metrics - **CVSS Base Score**: 4.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **GitLab - GitLab** Affected versions: - 16.11 (Status: affected) - 17.7 (Status: affected) - 17.8 (Status: affected) ### References 1. [GitLab Issue #511477](https://gitlab.com/gitlab-org/gitlab/-/issues/511477) ### Credits - This vulnerability has been discovered internally by a GitLab team member [Dylan Griffith](https://gitlab.com/DylanGriffith).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0812 - **State**: PUBLISHED - **Published Date**: January 23, 2024 at 23:52 UTC - **Last Updated**: May 30, 2025 at 14:18 UTC - **Reserved Date**: January 23, 2024 at 00:47 UTC - **Assigned By**: Chrome ### Vulnerability Description Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 121.0.6167.85 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html) 2. [](https://crbug.com/1484394) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4930 - **State**: PUBLISHED - **Published Date**: July 29, 2013 at 19:00 UTC - **Last Updated**: August 06, 2024 at 16:59 UTC - **Reserved Date**: July 26, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [54371](http://secunia.com/advisories/54371) 2. [openSUSE-SU-2013:1300](http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html) 3. [](https://www.wireshark.org/security/wnpa-sec-2013-48.html) 4. [54178](http://secunia.com/advisories/54178) 5. [54425](http://secunia.com/advisories/54425) 6. [DSA-2734](http://www.debian.org/security/2013/dsa-2734) 7. [](http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html) 8. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml) 9. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8916) 10. [oval:org.mitre.oval:def:16929](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16929) 11. [openSUSE-SU-2013:1295](http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html) 12. [54296](http://secunia.com/advisories/54296) 13. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=50474) 14. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474&r2=50473&pathrev=50474) 15. [](http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29532 - **State**: PUBLISHED - **Published Date**: April 20, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 20, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MISP/MISP/compare/v2.4.157...v2.4.158) 2. [](https://github.com/MISP/MISP/commit/60c85b80e3ab05c3ef015bca5630e95eddbb1436) 3. [](https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/) 4. [](https://zigrin.com/advisories/misp-xss-in-the-cerebrate-view/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46765 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 19:01 UTC - **Last Updated**: January 27, 2025 at 17:27 UTC - **Reserved Date**: March 31, 2022 at 16:50 UTC - **Assigned By**: AMD ### Vulnerability Description Insufficient input validation in ASP may allow an attacker with a compromised SMM to induce out-of-bounds memory reads within the ASP, potentially leading to a denial of service. ### Affected Products **AMD - Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4** Affected versions: - various (Status: affected) **AMD - Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” ** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 6000 Series Mobile Processors "Rembrandt"** Affected versions: - various (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5972 - **State**: PUBLISHED - **Published Date**: June 10, 2025 at 18:31 UTC - **Last Updated**: June 10, 2025 at 18:54 UTC - **Reserved Date**: June 10, 2025 at 11:40 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/manage-subadmins.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **PHPGurukul - Restaurant Table Booking System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-311850 | PHPGurukul Restaurant Table Booking System manage-subadmins.php cross site scripting](https://vuldb.com/?id.311850) 2. [VDB-311850 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311850) 3. [Submit #592340 | PHPGurukul Restaurant Table Booking System V1.0 Cross Site Scripting](https://vuldb.com/?submit.592340) 4. [](https://github.com/kakalalaww/CVE/issues/5) 5. [](https://phpgurukul.com/) ### Credits - Jww0KA (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1850, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1850 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1850 - **State**: PUBLISHED - **Published Date**: August 15, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 22, 2012 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle RAP responses, which allows remote attackers to cause a denial of service (service hang) via crafted RAP packets, aka "Remote Administration Protocol Denial of Service Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:15669](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15669) 2. [TA12-227A](http://www.us-cert.gov/cas/techalerts/TA12-227A.html) 3. [MS12-054](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-054)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2541 - **State**: PUBLISHED - **Published Date**: February 07, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 23, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted MP2 file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://wiki.audacityteam.org/wiki/Release_Notes_2.1.2) 2. [](https://fortiguard.com/zeroday/FG-VD-15-118)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7421 - **State**: PUBLISHED - **Published Date**: August 21, 2017 at 15:00 UTC - **Last Updated**: September 16, 2024 at 22:34 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description Reflected and stored Cross-Site Scripting (XSS, CWE-79) vulnerabilities in Directory Server (aka Enterprise Server Administration web UI) and ESMAC (aka Enterprise Server Monitor and Control) in Micro Focus Enterprise Developer and Enterprise Server 2.3 and earlier, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allow remote authenticated attackers to bypass protection mechanisms (CWE-693) and other security features. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Micro Focus - Micro Focus Enterprise Developer, Micro Focus Enterprise Server** Affected versions: - All versions before 2.3 Update 1, 2.3 Update 1 before Hotfix 8, 2.3 Update 2 before Hotfix 9 (Status: affected) ### References 1. [](https://community.microfocus.com/microfocus/mainframe_solutions/enterprise_server/w/knowledge_base/29131/enterprise-server-security-fixes-july-2017)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3503 - **State**: PUBLISHED - **Published Date**: September 24, 2020 at 17:51 UTC - **Last Updated**: November 13, 2024 at 17:59 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the file system permissions of Cisco IOS XE Software could allow an authenticated, local attacker to obtain read and write access to critical configuration or system files. The vulnerability is due to insufficient file system permissions on an affected device. An attacker could exploit this vulnerability by connecting to an affected device's guest shell, and accessing or modifying restricted files. A successful exploit could allow the attacker to view or modify restricted information or configurations that are normally not accessible to system administrators. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Cisco - Cisco IOS XE Software** Affected versions: - n/a (Status: affected) ### References 1. [20200924 Cisco IOS XE Software Guest Shell Unauthorized File System Access Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unauth-file-access-eBTWkKVW)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16979 - **State**: PUBLISHED - **Published Date**: November 11, 2020 at 06:47 UTC - **Last Updated**: September 10, 2024 at 15:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft SharePoint Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft SharePoint Enterprise Server 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SharePoint Server 2019** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SharePoint Foundation 2013 Service Pack 1** Affected versions: - 15.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16979)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10096 - **State**: PUBLISHED - **Published Date**: April 13, 2018 at 16:00 UTC - **Last Updated**: September 17, 2024 at 03:23 UTC - **Reserved Date**: April 13, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description joyplus-cms 1.6.0 has XSS via the device_name parameter in a manager/admin_ajax.php?action=save flag=add request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/joyplus/joyplus-cms/issues/424)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8119 - **State**: REJECTED - **Published Date**: March 05, 2019 at 20:00 UTC - **Last Updated**: March 05, 2019 at 19:57 UTC - **Reserved Date**: November 11, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30242 - **State**: PUBLISHED - **Published Date**: May 05, 2023 at 00:00 UTC - **Last Updated**: January 29, 2025 at 17:02 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NS-ASG v6.3 was discovered to contain a SQL injection vulnerability via the component /admin/add_ikev2.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://ns-asg.com) 2. [](https://www.netentsec.com/) 3. [](https://gist.github.com/nsvizp/ccbc51253a47d79d2bc1ea72e01bdaf6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18571 - **State**: PUBLISHED - **Published Date**: August 22, 2019 at 12:19 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: August 21, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The search-everything plugin before 8.1.7 for WordPress has SQL injection related to WordPress 4.7.x, a different vulnerability than CVE-2014-2316. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/search-everything/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51832 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:31 UTC - **Last Updated**: November 20, 2024 at 14:26 UTC - **Reserved Date**: November 04, 2024 at 09:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plenigo Plenigo allows Stored XSS.This issue affects Plenigo: from n/a through 1.12.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Plenigo - Plenigo** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/plenigo/wordpress-plenigo-plugin-1-12-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5284 - **State**: PUBLISHED - **Published Date**: September 22, 2016 at 22:00 UTC - **Last Updated**: August 06, 2024 at 00:53 UTC - **Reserved Date**: June 03, 2016 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html) 2. [](http://www.mozilla.org/security/announce/2016/mfsa2016-85.html) 3. [](https://www.mozilla.org/security/advisories/mfsa2016-86/) 4. [](https://blog.mozilla.org/security/2016/09/16/update-on-add-on-pinning-vulnerability/) 5. [](https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95) 6. [DSA-3674](http://www.debian.org/security/2016/dsa-3674) 7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1303127) 8. [[dailydave] 20160915 Deep down the certificate pinning rabbit hole of "Tor Browser Exposed"](http://seclists.org/dailydave/2016/q3/51) 9. [GLSA-201701-15](https://security.gentoo.org/glsa/201701-15) 10. [RHSA-2016:1912](http://rhn.redhat.com/errata/RHSA-2016-1912.html) 11. [](https://www.mozilla.org/security/advisories/mfsa2016-88/) 12. [93049](http://www.securityfocus.com/bid/93049) 13. [1036852](http://www.securitytracker.com/id/1036852)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50843 - **State**: PUBLISHED - **Published Date**: December 28, 2023 at 18:30 UTC - **Last Updated**: August 02, 2024 at 22:23 UTC - **Reserved Date**: December 14, 2023 at 17:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Clockwork Clockwork SMS Notfications.This issue affects Clockwork SMS Notfications: from n/a through 3.0.4. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Clockwork - Clockwork SMS Notfications** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/mediaburst-email-to-sms/wordpress-clockwork-sms-notfications-plugin-3-0-4-sql-injection-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31233 - **State**: PUBLISHED - **Published Date**: April 07, 2024 at 18:05 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 29, 2024 at 16:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sizam Rehub.This issue affects Rehub: from n/a through 19.6.1. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Sizam - Rehub** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/rehub-theme/wordpress-rehub-theme-19-6-1-sql-injection-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44758 - **State**: PUBLISHED - **Published Date**: December 26, 2022 at 00:00 UTC - **Last Updated**: April 14, 2025 at 15:57 UTC - **Reserved Date**: December 08, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv) 2. [](https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580) 3. [](https://security.gentoo.org/glsa/202310-06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0171 - **State**: PUBLISHED - **Published Date**: April 15, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: March 28, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [A041003-1](http://www.atstake.com/research/advisories/2003/a041003-1.txt) 2. [](http://lists.apple.com/mhonarc/security-announce/msg00028.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1442 - **State**: PUBLISHED - **Published Date**: May 07, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 05:13 UTC - **Reserved Date**: April 27, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple integer overflows in Skia, as used in Google Chrome 1.x before 1.0.154.64 and 2.x, and possibly Android, might allow remote attackers to execute arbitrary code in the renderer process via a crafted (1) image or (2) canvas. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://code.google.com/p/chromium/issues/detail?id=10736) 2. [ADV-2009-1266](http://www.vupen.com/english/advisories/2009/1266) 3. [](http://googlechromereleases.blogspot.com/2009/05/stable-update-security-fix.html) 4. [35014](http://secunia.com/advisories/35014) 5. [54248](http://osvdb.org/54248) 6. [1022175](http://www.securitytracker.com/id?1022175) 7. [34859](http://www.securityfocus.com/bid/34859) 8. [](http://code.google.com/p/skia/source/detail?r=159)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39268 - **State**: PUBLISHED - **Published Date**: August 18, 2021 at 00:29 UTC - **Last Updated**: August 04, 2024 at 02:06 UTC - **Reserved Date**: August 18, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via malicious SVG files. This occurs because the clean_file_output protection mechanism can be bypassed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/salesagility/SuiteCRM) 2. [](https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19) 3. [](https://thanhlocpanda.wordpress.com/2021/07/31/stored-xss-via-svg-on-suitecrm/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4522 - **State**: PUBLISHED - **Published Date**: October 09, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: October 09, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in JMweb MP3 Music Audio Search and Download Script allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the src parameter to (1) listen.php and (2) download.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [jmweb-mp3-src-file-include(45672)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45672) 2. [4386](http://securityreason.com/securityalert/4386) 3. [6669](https://www.exploit-db.com/exploits/6669) 4. [31573](http://www.securityfocus.com/bid/31573) 5. [32141](http://secunia.com/advisories/32141)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14944 - **State**: PUBLISHED - **Published Date**: June 22, 2020 at 21:48 UTC - **Last Updated**: August 04, 2024 at 13:00 UTC - **Reserved Date**: June 21, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Global RADAR BSA Radar 1.6.7234.24750 and earlier lacks valid authorization controls in multiple functions. This can allow for manipulation and takeover of user accounts if successfully exploited. The following vulnerable functions are exposed: ChangePassword, SaveUserProfile, and GetUser. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities) 2. [](https://github.com/wsummerhill/BSA-Radar_CVE-Vulnerabilities/blob/master/CVE-2020-14944%20-%20Access%20Control%20Vulnerabilities.md) 3. [](http://packetstormsecurity.com/files/158372/BSA-Radar-1.6.7234.24750-Cross-Site-Request-Forgery.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3697, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3697 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3697 - **State**: PUBLISHED - **Published Date**: April 12, 2024 at 16:31 UTC - **Last Updated**: August 01, 2024 at 20:20 UTC - **Reserved Date**: April 12, 2024 at 08:43 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes House Rental Management System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_tenant.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260484. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Campcodes - House Rental Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-260484 | Campcodes House Rental Management System manage_tenant.php sql injection](https://vuldb.com/?id.260484) 2. [VDB-260484 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.260484) 3. [Submit #314203 | campcodes House Rental Management System ≤1.0 SQL injection](https://vuldb.com/?submit.314203) 4. [](https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%203.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22424, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22424 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22424 - **State**: PUBLISHED - **Published Date**: August 03, 2021 at 17:17 UTC - **Last Updated**: August 03, 2024 at 18:44 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6286, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6286 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6286 - **State**: PUBLISHED - **Published Date**: January 14, 2019 at 22:00 UTC - **Last Updated**: August 04, 2024 at 20:16 UTC - **Reserved Date**: January 14, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/sass/libsass/issues/2815) 2. [openSUSE-SU-2019:1791](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html) 3. [openSUSE-SU-2019:1800](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html) 4. [openSUSE-SU-2019:1883](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29433, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29433 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29433 - **State**: PUBLISHED - **Published Date**: December 09, 2024 at 11:31 UTC - **Last Updated**: December 09, 2024 at 18:45 UTC - **Reserved Date**: April 06, 2023 at 09:42 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in 腾讯云 tencentcloud-cos allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects tencentcloud-cos: from n/a through 1.0.7. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **腾讯云 - tencentcloud-cos** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/tencentcloud-cos/vulnerability/wordpress-tencentcloud-cos-plugin-1-0-7-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1951 - **State**: PUBLISHED - **Published Date**: June 28, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:43 UTC - **Reserved Date**: June 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in GoAhead WebServer 2.1 allows remote attackers to execute arbitrary code via a long HTTP GET request with a large number of subdirectories. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [81099](http://osvdb.org/81099) 2. [](http://freecode.com/projects/embedthis-goahead-webserver/releases/343539) 3. [](http://www.securiteam.com/securitynews/5MP0C1580W.html) 4. [5464](http://www.securityfocus.com/bid/5464) 5. [goahead-long-url-bo(9884)](http://www.iss.net/security_center/static/9884.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10004 - **State**: PUBLISHED - **Published Date**: December 08, 2020 at 20:02 UTC - **Last Updated**: August 04, 2024 at 10:50 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/kb/HT211930) 2. [](https://support.apple.com/en-us/HT211931) 3. [](https://support.apple.com/en-us/HT211929) 4. [](https://support.apple.com/kb/HT212011) 5. [20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1](http://seclists.org/fulldisclosure/2020/Dec/32) 6. [20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave](http://seclists.org/fulldisclosure/2020/Dec/26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2440 - **State**: PUBLISHED - **Published Date**: May 18, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:51 UTC - **Reserved Date**: May 17, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in the libMagick component of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:9481](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9481) 2. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345595) 3. [DSA-1168](http://www.debian.org/security/2006/dsa-1168) 4. [24284](http://secunia.com/advisories/24284) 5. [21719](http://secunia.com/advisories/21719) 6. [RHSA-2007:0015](http://www.redhat.com/support/errata/RHSA-2007-0015.html) 7. [24186](http://secunia.com/advisories/24186) 8. [20070201-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000831, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000831 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000831 - **State**: PUBLISHED - **Published Date**: December 20, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 22:56 UTC - **Reserved Date**: December 20, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description K9Mail version <= v5.600 contains a XML External Entity (XXE) vulnerability in WebDAV response parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via malicious WebDAV server or intercept the reponse of a valid WebDAV server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k9mail/k-9/issues/3681) 2. [](https://0dd.zone/2018/10/28/k9mail-XXE-MitM/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10197 - **State**: PUBLISHED - **Published Date**: September 03, 2019 at 14:50 UTC - **Last Updated**: August 04, 2024 at 22:17 UTC - **Reserved Date**: March 27, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **SAMBA - samba** Affected versions: - samba 4.9.x up to 4.9.13 (Status: affected) - samba 4.10.x up to 4.10.8 (Status: affected) - samba 4.11.x up to 4.11.0rc3 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197) 2. [](https://www.samba.org/samba/security/CVE-2019-10197.html) 3. [](https://security.netapp.com/advisory/ntap-20190903-0001/) 4. [USN-4121-1](https://usn.ubuntu.com/4121-1/) 5. [20190904 [SECURITY] [DSA 4513-1] samba security update](https://seclists.org/bugtraq/2019/Sep/4) 6. [DSA-4513](https://www.debian.org/security/2019/dsa-4513) 7. [openSUSE-SU-2019:2142](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html) 8. [FEDORA-2019-e3e521e5b3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/) 9. [FEDORA-2019-eb1e982800](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/) 10. [FEDORA-2019-41c7fa478a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/) 11. [](https://support.f5.com/csp/article/K69511801) 12. [](https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS) 13. [RHSA-2019:3253](https://access.redhat.com/errata/RHSA-2019:3253) 14. [RHSA-2019:4023](https://access.redhat.com/errata/RHSA-2019:4023) 15. [GLSA-202003-52](https://security.gentoo.org/glsa/202003-52)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31332 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 07:15 UTC - **Last Updated**: April 08, 2025 at 14:50 UTC - **Reserved Date**: March 27, 2025 at 23:02 UTC - **Assigned By**: sap ### Vulnerability Description Due to insecure file permissions in SAP BusinessObjects Business Intelligence Platform, an attacker who has local access to the system could modify files potentially disrupting operations or cause service downtime hence leading to a high impact on integrity and availability. However, this vulnerability does not disclose any sensitive data. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-277: Security Weakness ### Affected Products **SAP_SE - SAP BusinessObjects Business Intelligence Platform** Affected versions: - ENTERPRISE 430 (Status: affected) ### References 1. [](https://me.sap.com/notes/3565751) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12039 - **State**: PUBLISHED - **Published Date**: June 29, 2020 at 13:45 UTC - **Last Updated**: August 04, 2024 at 11:48 UTC - **Reserved Date**: April 21, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Baxter Sigma Spectrum Infusion Pumps Sigma Spectrum Infusion System v's6.x model 35700BAX & Baxter Spectrum Infusion System v's8.x model 35700BAX2 contain hardcoded passwords when physically entered on the keypad provide access to biomedical menus including device settings, view calibration values, network configuration of Sigma Spectrum WBM if installed. ### Weakness Classification (CWE) - CWE-259: Security Weakness ### Affected Products **n/a - Baxter Sigma Spectrum Infusion Pumps** Affected versions: - Sigma Spectrum v6.x model 35700BAX,Spectrum v8.x model 35700BAX2,Sigma Spectrum v6.x with Wireless Battery Module (WBM) v9,v11,v13,v14,v15,v16,v20D29,v20D30,v20D31,v22D24, Spectrum v8.x w/WBM v17,v20D29,v20D30,v20D31,v22D24,Spectrum WBM v17,v20D29,v20D30,v20D31,v22D24,Spectrum LVP v8.x with WBM v17, v20D29,v20D30,v20D31,and v22D24 (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsma-20-170-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4152 - **State**: REJECTED - **Last Updated**: June 07, 2024 at 16:55 UTC - **Reserved Date**: April 24, 2024 at 22:16 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0070 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 27, 2012 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1543 - **State**: PUBLISHED - **Published Date**: March 06, 2019 at 21:00 UTC - **Last Updated**: September 16, 2024 at 17:43 UTC - **Reserved Date**: November 28, 2018 at 00:00 UTC - **Assigned By**: openssl ### Vulnerability Description ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j). ### Affected Products **OpenSSL - OpenSSL** Affected versions: - Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b) (Status: affected) - Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j) (Status: affected) ### References 1. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f426625b6ae9a7831010750490a5f0ad689c5ba3) 2. [](https://www.openssl.org/news/secadv/20190306.txt) 3. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ee22257b1418438ebaf54df98af4e24f494d1809) 4. [20190701 [SECURITY] [DSA 4475-1] openssl security update](https://seclists.org/bugtraq/2019/Jul/3) 5. [DSA-4475](https://www.debian.org/security/2019/dsa-4475) 6. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 7. [openSUSE-SU-2019:1814](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html) 8. [FEDORA-2019-00c25b9379](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/) 9. [FEDORA-2019-9a0a7c0986](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/) 10. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) 11. [RHSA-2019:3700](https://access.redhat.com/errata/RHSA-2019:3700) 12. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 13. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10365) ### Credits - Joran Dirk Greef of Ronomon
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5110 - **State**: PUBLISHED - **Published Date**: October 09, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:58 UTC - **Reserved Date**: September 24, 2012 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description The compositor in Google Chrome before 22.0.1229.92 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:14901](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14901) 2. [](http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html) 3. [](https://code.google.com/p/chromium/issues/detail?id=151449)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4423, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4423 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4423 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:11 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.1. ### Affected Products **n/a - macOS** Affected versions: - Versions prior to: macOS Mojave 10.14.1 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT209193)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17652 - **State**: PUBLISHED - **Published Date**: February 06, 2020 at 15:23 UTC - **Last Updated**: October 25, 2024 at 14:03 UTC - **Reserved Date**: October 16, 2019 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized. ### Affected Products **Fortinet - Fortinet FortiClientLinux** Affected versions: - FortiClientLinux 6.2.1 and below (Status: affected) ### References 1. [](https://fortiguard.com/psirt/FG-IR-19-238) 2. [](https://danishcyberdefence.dk/blog/forticlient_linux)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9939 - **State**: PUBLISHED - **Published Date**: March 21, 2017 at 06:21 UTC - **Last Updated**: August 06, 2024 at 14:02 UTC - **Reserved Date**: March 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e27a9d5f22f9f7ead11738b1546d0b5c737266b) 2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=18750) 3. [](http://www.openwall.com/lists/oss-security/2015/07/31/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5385, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5385 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5385 - **State**: PUBLISHED - **Published Date**: October 18, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 19:48 UTC - **Reserved Date**: October 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in admin/admin_spam.php in the SpamOborona 1.0b and earlier phpBB module allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20515](http://www.securityfocus.com/bid/20515) 2. [2547](https://www.exploit-db.com/exploits/2547) 3. [spamoborona-admin-file-include(29568)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29568) 4. [22438](http://secunia.com/advisories/22438) 5. [1741](http://securityreason.com/securityalert/1741) 6. [20061012 SpamOborona PHPBB Plugin Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/448633/100/0/threaded) 7. [ADV-2006-4039](http://www.vupen.com/english/advisories/2006/4039)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5788 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2013:1440](http://rhn.redhat.com/errata/RHSA-2013-1440.html) 2. [SUSE-SU-2013:1677](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html) 3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655201) 4. [oval:org.mitre.oval:def:18607](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18607) 5. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) 6. [RHSA-2013:1507](http://rhn.redhat.com/errata/RHSA-2013-1507.html) 7. [56338](http://secunia.com/advisories/56338)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20419, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20419 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20419 - **State**: PUBLISHED - **Published Date**: May 24, 2021 at 13:55 UTC - **Last Updated**: September 16, 2024 at 17:49 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Guardium 11.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196280. ### Affected Products **IBM - Security Guardium** Affected versions: - 11.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6455281) 2. [ibm-guardium-cve202120419-info-disc (196280)](https://exchange.xforce.ibmcloud.com/vulnerabilities/196280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28442 - **State**: PUBLISHED - **Published Date**: March 26, 2024 at 00:00 UTC - **Last Updated**: August 05, 2024 at 16:31 UTC - **Reserved Date**: March 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.yealink.com/en/product-detail/ip-phone-vp59) 2. [](https://medium.com/%40deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43137 - **State**: PUBLISHED - **Published Date**: December 01, 2021 at 19:14 UTC - **Last Updated**: August 04, 2024 at 03:47 UTC - **Reserved Date**: November 01, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/50461)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51998 - **State**: PUBLISHED - **Published Date**: November 07, 2024 at 23:34 UTC - **Last Updated**: November 08, 2024 at 15:24 UTC - **Reserved Date**: November 04, 2024 at 17:46 UTC - **Assigned By**: GitHub_M ### Vulnerability Description changedetection.io is a free open source web page change detection tool. The validation for the file URI scheme falls short, and results in an attacker being able to read any file on the system. This issue only affects instances with a webdriver enabled, and `ALLOW_FILE_URI` false or not defined. The check used for URL protocol, `is_safe_url`, allows `file:` as a URL scheme. It later checks if local files are permitted, but one of the preconditions for the check is that the URL starts with `file://`. The issue comes with the fact that the file URI scheme is not required to have double slashes. This issue has been addressed in version 0.47.06 and all users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **dgtlmoon - changedetection.io** Affected versions: - < 0.47.06 (Status: affected) ### References 1. [https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-6jrf-rcjf-245r](https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-6jrf-rcjf-245r) 2. [https://github.com/dgtlmoon/changedetection.io/commit/49bc982c697169c98b79698889fb9d26f6b3317f](https://github.com/dgtlmoon/changedetection.io/commit/49bc982c697169c98b79698889fb9d26f6b3317f) 3. [https://github.com/dgtlmoon/changedetection.io/blob/e0abf0b50507a8a3d0c1d8522ab23519b3e4cdf4/changedetectionio/model/Watch.py#L11-L13](https://github.com/dgtlmoon/changedetection.io/blob/e0abf0b50507a8a3d0c1d8522ab23519b3e4cdf4/changedetectionio/model/Watch.py#L11-L13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6351, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6351 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6351 - **State**: PUBLISHED - **Published Date**: September 09, 2020 at 12:53 UTC - **Last Updated**: August 04, 2024 at 09:02 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated FBX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. ### Affected Products **SAP SE - SAP 3D Visual Enterprise Viewer** Affected versions: - < 9 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/2960815) 2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1147/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2273 - **State**: PUBLISHED - **Published Date**: July 22, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 13:48 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in WMR-433 firmware Ver.1.02 and earlier, WMR-433W firmware Ver.1.40 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. ### Affected Products **BUFFALO INC. - WMR-433** Affected versions: - firmware Ver.1.02 and earlier (Status: affected) **BUFFALO INC. - WMR-433W** Affected versions: - firmware Ver.1.40 and earlier (Status: affected) ### References 1. [](http://buffalo.jp/support_s/s20170606.html) 2. [JVN#48413726](https://jvn.jp/en/jp/JVN48413726/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7313, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7313 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7313 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27377 - **State**: PUBLISHED - **Published Date**: June 01, 2021 at 14:57 UTC - **Last Updated**: August 04, 2024 at 16:11 UTC - **Reserved Date**: October 21, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability was discovered in the Administrator panel on the 'Setting News' module on CMS Made Simple 2.2.14 which allows an attacker to execute arbitrary web scripts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://dev.cmsmadesimple.org/bug/view/12317)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29498 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 04:26 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 19, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ankane/blazer/issues/392)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1494 - **State**: PUBLISHED - **Published Date**: August 17, 2020 at 19:13 UTC - **Last Updated**: August 04, 2024 at 06:39 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory. ### Affected Products **Microsoft - Microsoft Office 2019** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Excel 2016** Affected versions: - 16.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft Excel 2010 Service Pack 2** Affected versions: - 13.0.0.0 (Status: affected) **Microsoft - Microsoft Excel 2013 Service Pack 1** Affected versions: - 15.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2010 Service Pack 2** Affected versions: - 13.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2013 Service Pack 1** Affected versions: - 15.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1494)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4488 - **State**: PUBLISHED - **Published Date**: October 08, 2008 at 01:00 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: October 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in ap-pages.php in Atarone CMS 1.2.0 allows remote attackers to inject arbitrary web script or HTML via the (1) name and (2) id parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31610](http://www.securityfocus.com/bid/31610) 2. [atarone-appages-xss(45706)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45706) 3. [32100](http://secunia.com/advisories/32100)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12101 - **State**: PUBLISHED - **Published Date**: August 15, 2019 at 16:47 UTC - **Last Updated**: August 05, 2024 at 08:24 UTC - **Reserved Date**: June 11, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ClipperCMS/ClipperCMS/issues/487) 2. [](https://github.com/ClipperCMS/ClipperCMS/issues/488) 3. [](https://github.com/ClipperCMS/ClipperCMS/issues/496)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2985, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2985 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2985 - **State**: PUBLISHED - **Published Date**: March 27, 2024 at 16:31 UTC - **Last Updated**: August 29, 2024 at 17:46 UTC - **Reserved Date**: March 27, 2024 at 07:04 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258154 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - FH1202** Affected versions: - 1.2.0.14(408) (Status: affected) ### References 1. [VDB-258154 | Tenda FH1202 QuickIndex formQuickIndex stack-based overflow](https://vuldb.com/?id.258154) 2. [VDB-258154 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.258154) 3. [Submit #301276 | Tenda FH1202 V1.2.0.14(408) buffer overflow](https://vuldb.com/?submit.301276) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md) ### Credits - wxhwxhwxh_tutu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31399 - **State**: PUBLISHED - **Published Date**: June 11, 2024 at 05:34 UTC - **Last Updated**: March 20, 2025 at 18:56 UTC - **Reserved Date**: April 03, 2024 at 09:14 UTC - **Assigned By**: jpcert ### Vulnerability Description Excessive platform resource consumption within a loop issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, processing a crafted mail may cause a denial-of-service (DoS) condition. ### Affected Products **Cybozu, Inc. - Cybozu Garoon** Affected versions: - 5.0.0 to 5.15.2 (Status: affected) ### References 1. [](https://cs.cybozu.co.jp/2024/007901.html) 2. [](https://jvn.jp/en/jp/JVN28869536/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34461 - **State**: PUBLISHED - **Published Date**: May 04, 2024 at 00:00 UTC - **Last Updated**: March 28, 2025 at 23:30 UTC - **Reserved Date**: May 04, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zenario before 9.5.60437 uses Twig filters insecurely in the Twig Snippet plugin, and in the site-wide HEAD and BODY elements, enabling code execution by a designer or an administrator. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://zenar.io/zenario-9/blog/zenario-9560437-patch-released)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20521, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20521 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20521 - **State**: PUBLISHED - **Published Date**: March 19, 2020 at 17:52 UTC - **Last Updated**: August 05, 2024 at 02:46 UTC - **Reserved Date**: March 18, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.netsparker.com/web-applications-advisories/ns-19-017-cross-site-scripting-in-erpnext/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0643 - **State**: PUBLISHED - **Published Date**: July 12, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:56 UTC - **Reserved Date**: June 28, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The installation of Microsoft Data Engine 1.0 (MSDE 1.0), and Microsoft SQL Server 2000 creates setup.iss files with insecure permissions and does not delete them after installation, which allows local users to obtain sensitive data, including weakly encrypted passwords, to gain privileges, aka "SQL Server Installation Process May Leave Passwords on System." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020711 SQL Server 7 & 2000 Installation process and Service Packs write encoded passwords to a file](http://marc.info/?l=bugtraq&m=102640092826731&w=2) 2. [MS02-035](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-035) 3. [20020711 SQL Server 7 & 2000 Installation process and Service Packs write encoded passwords to a file](http://marc.info/?l=vuln-dev&m=102640394131103&w=2) 4. [VU#338195](http://www.kb.cert.org/vuls/id/338195) 5. [5203](http://www.securityfocus.com/bid/5203)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1370 - **State**: PUBLISHED - **Published Date**: March 18, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:17 UTC - **Reserved Date**: March 18, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in wildmary Yap Blog 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [yapblog-index-file-include(41049)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41049) 2. [28120](http://www.securityfocus.com/bid/28120)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4210 - **State**: PUBLISHED - **Published Date**: December 13, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 06:54 UTC - **Reserved Date**: December 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted media content. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [955759](http://support.microsoft.com/kb/955759) 2. [oval:org.mitre.oval:def:11677](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11677) 3. [ms-ie-indeo-code-execution(54644)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54644) 4. [1023302](http://securitytracker.com/id?1023302) 5. [37251](http://www.securityfocus.com/bid/37251) 6. [20091208 Fortinet Advisory: Fortinet Discovers Vulnerability in Indeo Codec](http://www.securityfocus.com/archive/1/508323/100/0/threaded) 7. [60857](http://www.osvdb.org/60857) 8. [](http://www.microsoft.com/technet/security/advisory/954157.mspx) 9. [976138](http://support.microsoft.com/kb/976138) 10. [ADV-2009-3440](http://www.vupen.com/english/advisories/2009/3440) 11. [954157](http://support.microsoft.com/kb/954157) 12. [](http://www.fortiguard.com/advisory/FGA-2009-45.html) 13. [ms-ie-content-code-execution(54645)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54645) 14. [37592](http://secunia.com/advisories/37592)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39861 - **State**: PUBLISHED - **Published Date**: October 07, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 12:07 UTC - **Reserved Date**: September 05, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Unprotected Receiver in AtBroadcastReceiver in FactoryCamera prior to version 3.5.51 allows attackers to record video without camera privilege. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Samsung Mobile - FactoryCamera** Affected versions: - unspecified (Status: affected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44299 - **State**: PUBLISHED - **Published Date**: December 11, 2024 at 22:59 UTC - **Last Updated**: December 12, 2024 at 20:56 UTC - **Reserved Date**: August 20, 2024 at 21:45 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to cause unexpected system termination or arbitrary code execution in DCP firmware. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121563)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7346, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7346 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7346 - **State**: PUBLISHED - **Published Date**: June 07, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 07:43 UTC - **Reserved Date**: September 24, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in ZCMS 1.1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://hyp3rlinx.altervista.org/advisories/AS-ZCMS0612.txt) 2. [](http://packetstormsecurity.com/files/132286/ZCMS-1.1-Cross-Site-Scripting-SQL-Injection.html) 3. [37272](https://www.exploit-db.com/exploits/37272/)