System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21459
- **State**: PUBLISHED
- **Published Date**: April 19, 2022 at 20:37 UTC
- **Last Updated**: September 24, 2024 at 20:09 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.28 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
2. [](https://security.netapp.com/advisory/ntap-20220429-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46655
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 19:51 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in Ellevo 6.2.0.38160 allows attackers to execute arbitrary code in the context of a user's browser via a crafted payload or URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ellevo.com/)
2. [](https://csflabs.github.io/cve/2024/09/24/cve-2024-46655-Cross-Site-Scripting-%28XSS%29-%28Reflected%29-in-Ellevo-application.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10035
- **State**: PUBLISHED
- **Published Date**: November 04, 2024 at 11:48 UTC
- **Last Updated**: November 04, 2024 at 15:16 UTC
- **Reserved Date**: October 16, 2024 at 14:04 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Control of Generation of Code ('Code Injection') vulnerability in BG-TEK Informatics Security Technologies CoslatV3 allows Command Injection.This issue affects CoslatV3: through 3.1069.
NOTE: The vendor was contacted and it was learned that the product is not supported.
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**BG-TEK Informatics Security Technologies - CoslatV3**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-1814)
### Credits
- Efe OZEL
- Cemil Sefa OZCAN
- Omer YILMAZ
- Fordefence Inc. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39358
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 14:21 UTC
- **Last Updated**: January 15, 2025 at 21:04 UTC
- **Reserved Date**: June 28, 2024 at 16:07 UTC
- **Assigned By**: talos
### Vulnerability Description
A buffer overflow vulnerability exists in the adm.cgi set_wzap() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Wavlink - Wavlink AC3000**
Affected versions:
- M33A8.V5030.210505 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2027](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2027)
### Credits
- Discovered by Lilith >_> of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3695
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 15:45 UTC
- **Last Updated**: February 07, 2025 at 15:53 UTC
- **Reserved Date**: October 26, 2022 at 12:51 UTC
- **Assigned By**: HITVAN
### Vulnerability Description
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.3.0.0, 9.2.0.4 and 8.3.0.27 allow a malicious URL to inject content into a dashboard when the CDE plugin is present.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Hitachi Vantara - Pentaho Business Analytics Server**
Affected versions:
- 1.0 (Status: affected)
- 9.0.0.0 (Status: affected)
### References
1. [](https://support.pentaho.com/hc/en-us/articles/14739451011981)
### Credits
- Hitachi Group Member |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23464
- **State**: PUBLISHED
- **Published Date**: September 24, 2022 at 04:40 UTC
- **Last Updated**: April 22, 2025 at 17:20 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information Disclosure. There is no patch available for this issue at time of publication. There are no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Nepxion - Discovery**
Affected versions:
- 6.16.2 (Status: affected)
### References
1. [](https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-20007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-20007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-20007
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 23:26 UTC
- **Last Updated**: August 06, 2024 at 03:47 UTC
- **Reserved Date**: December 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The REST/JSON project 7.x-1.x for Drupal allows session name guessing, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2744889) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12008
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 07:05 UTC
- **Last Updated**: January 14, 2025 at 14:47 UTC
- **Reserved Date**: December 01, 2024 at 20:51 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The W3 Total Cache plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 through the publicly exposed debug log file. This makes it possible for unauthenticated attackers to view potentially sensitive information in the exposed log file. For example, the log file may contain nonce values that can be used in further CSRF attacks.
Note: the debug feature must be enabled for this to be a concern, and it is disabled by default.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**boldgrid - W3 Total Cache**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8292f23c-fb17-4082-9788-f643d1bb097e?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Util_Environment.php#L430)
3. [](https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Util_Debug.php#L29)
### Credits
- Villu Orav |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9455
- **State**: PUBLISHED
- **Published Date**: March 06, 2020 at 18:49 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: February 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The RegistrationMagic plugin through 4.6.0.3 for WordPress allows remote authenticated users (with minimal privileges) to send arbitrary emails on behalf of the site via class_rm_user_services.php send_email_user_view.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/custom-registration-form-builder-with-submission-manager/#developers)
2. [](https://wpvulndb.com/vulnerabilities/10116)
3. [](https://www.wordfence.com/blog/2020/03/multiple-vulnerabilities-patched-in-registrationmagic-plugin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8417
- **State**: PUBLISHED
- **Published Date**: March 08, 2017 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 02:20 UTC
- **Reserved Date**: October 05, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32342399. References: QC-CR#1088824.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-03-01)
2. [1037968](http://www.securitytracker.com/id/1037968)
3. [](https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=01dcc0a7cc23f23a89adf72393d5a27c6d576cd0)
4. [96832](http://www.securityfocus.com/bid/96832) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1953
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
phProfession 2.5 allows remote attackers to gain sensitive information via a direct HTTP request to upload.php, which reveals the path in a PHP error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5623](http://www.osvdb.org/5623)
2. [20040421 [waraxe-2004-SA#021 - Multiple vulnerabilities in phprofession 2.5 module for PostNuke]](http://marc.info/?l=bugtraq&m=108258931430060&w=2)
3. [](http://www.waraxe.us/index.php?modname=sa&id=21)
4. [phprofession-upload-path-disclosure(15930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15930)
5. [11465](http://secunia.com/advisories/11465)
6. [10190](http://www.securityfocus.com/bid/10190) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28473
- **State**: PUBLISHED
- **Published Date**: January 18, 2021 at 11:15 UTC
- **Last Updated**: September 16, 2024 at 20:41 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**n/a - bottle**
Affected versions:
- 0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108)
2. [](https://github.com/bottlepy/bottle)
3. [](https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/)
4. [[debian-lts-announce] 20210124 [SECURITY] [DLA 2531-1] python-bottle security update](https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html)
### Credits
- Snyk Security Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47624
- **State**: PUBLISHED
- **Published Date**: December 13, 2023 at 21:09 UTC
- **Last Updated**: August 02, 2024 at 21:16 UTC
- **Reserved Date**: November 07, 2023 at 16:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Audiobookshelf is a self-hosted audiobook and podcast server. In versions 2.4.3 and prior, any user (regardless of their permissions) may be able to read files from the local file system due to a path traversal in the `/hls` endpoint. This issue may lead to Information Disclosure. As of time of publication, no patches are available.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**advplyr - audiobookshelf**
Affected versions:
- <= 2.4.3 (Status: affected)
### References
1. [https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/](https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/)
2. [https://github.com/advplyr/audiobookshelf/blob/d7b2476473ef1934eedec41425837cddf2d4b13e/server/routers/HlsRouter.js#L32](https://github.com/advplyr/audiobookshelf/blob/d7b2476473ef1934eedec41425837cddf2d4b13e/server/routers/HlsRouter.js#L32) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4833
- **State**: PUBLISHED
- **Published Date**: March 20, 2007 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: March 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM WebSphere Application Server (WAS) 6.0 before 20050201, when serving pages in an Application WAR or an Extended Document Root, allows remote attackers to obtain the JSP source code and other sensitive information via "a specific JSP URL," related to lack of normalization of the URL format.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0970](http://www.vupen.com/english/advisories/2007/0970)
2. [24478](http://secunia.com/advisories/24478)
3. [](http://www-1.ibm.com/support/docview.wss?uid=swg21243541)
4. [34177](http://osvdb.org/34177)
5. [22991](http://www.securityfocus.com/bid/22991)
6. [PK00091](http://www-1.ibm.com/support/docview.wss?uid=swg24008815) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12427
- **State**: PUBLISHED
- **Published Date**: August 04, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 18:36 UTC
- **Reserved Date**: August 04, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07)
2. [](https://github.com/ImageMagick/ImageMagick/issues/636)
3. [](https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7965
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 19:31 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44203
- **State**: PUBLISHED
- **Published Date**: November 29, 2021 at 18:19 UTC
- **Last Updated**: September 16, 2024 at 22:45 UTC
- **Reserved Date**: November 24, 2021 at 00:00 UTC
- **Assigned By**: Acronis
### Vulnerability Description
Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Acronis - Acronis Cyber Protect 15**
Affected versions:
- unspecified (Status: affected)
**Acronis - Acronis Cyber Protect 15**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security-advisory.acronis.com/advisories/SEC-3294)
### Credits
- @frankiexote (https://hackerone.com/frankiexote) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2805
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:17 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension). Supported versions that are affected are 5.6.39 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.6.39 and prior (Status: affected)
### References
1. [1040698](http://www.securitytracker.com/id/1040698)
2. [RHSA-2018:1254](https://access.redhat.com/errata/RHSA-2018:1254)
3. [](https://security.netapp.com/advisory/ntap-20180419-0002/)
4. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
5. [103831](http://www.securityfocus.com/bid/103831) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0027
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4105
- **State**: PUBLISHED
- **Published Date**: February 24, 2023 at 11:09 UTC
- **Last Updated**: March 11, 2025 at 15:46 UTC
- **Reserved Date**: December 13, 2021 at 12:15 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Handling of Parameters vulnerability in BG-TEK COSLAT Firewall allows Remote Code Inclusion.This issue affects COSLAT Firewall: from 5.24.0.R.20180630 before 5.24.0.R.20210727.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**BG-TEK - COSLAT Firewall**
Affected versions:
- 5.24.0.r.20180630 (Status: affected)
### References
1. [](http://blog.coslat.com/2021/07/onemli-kritik-guncelleme-2021-07-27.html)
2. [](https://www.usom.gov.tr/bildirim/tr-23-0108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1119
- **State**: PUBLISHED
- **Published Date**: April 15, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: March 25, 2009 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Multiple heap-based buffer overflows in EMC RepliStor 6.2 before SP5 and 6.3 before SP2 allow remote attackers to execute arbitrary code via a crafted message to (1) ctrlservice.exe or (2) rep_srv.exe, possibly related to an integer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.fortiguardcenter.com/advisory/FGA-2009-13.html)
2. [34449](http://www.securityfocus.com/bid/34449)
3. [ADV-2009-1018](http://www.vupen.com/english/advisories/2009/1018)
4. [1022026](http://www.securitytracker.com/id?1022026)
5. [20090409 FGA-2009-003:EMC RepliStor Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/502575/100/0/threaded)
6. [34699](http://secunia.com/advisories/34699) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39733
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:03 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In amcs_cdev_unlocked_ioctl of audiometrics.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206128522References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5147
- **State**: PUBLISHED
- **Published Date**: September 09, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 03, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Uncontrolled Search Path Element issue was discovered in AzeoTech DAQFactory versions prior to 17.1. An uncontrolled search path element vulnerability has been identified, which may execute malicious DLL files that have been placed within the search path.
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - AzeoTech DAQFactory**
Affected versions:
- AzeoTech DAQFactory (Status: affected)
### References
1. [100522](http://www.securityfocus.com/bid/100522)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-241-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1065
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 22:52 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.
### Affected Products
**Microsoft - ChakraCore**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2019**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4079
- **State**: PUBLISHED
- **Published Date**: September 15, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Movable Type (MT) 4.x through 4.20, and 3.36 and earlier; Movable Type Enterprise 4.x through 4.20, and 1.54 and earlier; and Movable Type Community Solution allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#30385652](http://jvn.jp/en/jp/JVN30385652/index.html)
2. [31073](http://www.securityfocus.com/bid/31073)
3. [](http://www.sixapart.jp/movabletype/news/2008/08/07-1445.html)
4. [](http://www.sixapart.jp/movabletype/news/2008/08/28-1500.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1781
- **State**: REJECTED
- **Published Date**: April 15, 2008 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 19:20 UTC
- **Reserved Date**: April 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17208
- **State**: PUBLISHED
- **Published Date**: September 19, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 02:47 UTC
- **Reserved Date**: September 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell metacharacters in the query string are mishandled by ShellExecute, as demonstrated by the zbtest.cgi?cmd=level&level= substring. This can also be exploited via CSRF.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://langkjaer.com/velop.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34090
- **State**: PUBLISHED
- **Published Date**: May 06, 2024 at 00:00 UTC
- **Last Updated**: November 01, 2024 at 19:42 UTC
- **Reserved Date**: April 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Archer Platform 6 before 2024.04. There is a stored cross-site scripting (XSS) vulnerability. The login banner in the Archer Control Panel (ACP) did not previously escape content appropriately. 6.14 P3 (6.14.0.3) is also a fixed release.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:H/I:H/PR:L/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://archerirm.com)
2. [](https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32724
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 06:14 UTC
- **Last Updated**: September 17, 2024 at 13:53 UTC
- **Reserved Date**: May 11, 2023 at 21:25 UTC
- **Assigned By**: Zabbix
### Vulnerability Description
Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**Zabbix - Zabbix**
Affected versions:
- 5.0.0 (Status: affected)
- 6.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 7.0.0alpha1 (Status: affected)
### References
1. [](https://support.zabbix.com/browse/ZBX-23391)
### Credits
- This vulnerability is found by Pavel Voit (pavelvoit) from HackerOne community. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28018
- **State**: PUBLISHED
- **Published Date**: April 23, 2025 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:53 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://locrian-lightning-dc7.notion.site/BufferOverflow2-1948e5e2b1a28070a8d1d1ba725febff) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2682
- **State**: PUBLISHED
- **Published Date**: February 27, 2017 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote attacker to perform a Cross-Site Request Forgery (CSRF) attack, potentially allowing an attacker to execute administrative operations, provided the targeted user has an active session and is induced to trigger a malicious request.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**n/a - RUGGEDCOM NMS All versions < V2.1 (Windows and Linux)**
Affected versions:
- RUGGEDCOM NMS All versions < V2.1 (Windows and Linux) (Status: affected)
### References
1. [](http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-363881.pdf)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-059-01)
3. [1037958](http://www.securitytracker.com/id/1037958)
4. [96458](http://www.securityfocus.com/bid/96458) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30719
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 03:12 UTC
- **Last Updated**: September 26, 2024 at 15:25 UTC
- **Reserved Date**: April 14, 2023 at 01:59 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Exposure of Sensitive Information vulnerability in InboundSmsHandler prior to SMR Sep-2023 Release 1 allows local attackers to access certain message data.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Sep-2023 Release in Android 11, 12, 13 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8442
- **State**: PUBLISHED
- **Published Date**: December 10, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 02, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zerodayinitiative.com/advisories/ZDI-15-607)
2. [openSUSE-SU-2015:2239](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html)
3. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680)
4. [](https://helpx.adobe.com/security/products/flash-player/apsb15-32.html)
5. [78715](http://www.securityfocus.com/bid/78715)
6. [SUSE-SU-2015:2236](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html)
7. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722)
8. [SUSE-SU-2015:2247](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html)
9. [1034318](http://www.securitytracker.com/id/1034318)
10. [GLSA-201601-03](https://security.gentoo.org/glsa/201601-03)
11. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24802
- **State**: PUBLISHED
- **Published Date**: November 17, 2021 at 10:15 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Colorful Categories WordPress plugin before 2.0.15 does not enforce nonce checks which could allow attackers to make a logged in admin or editor change taxonomy colors via a CSRF attack
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Colorful Categories**
Affected versions:
- 2.0.15 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/d92db61f-341c-4f3f-b962-326194ddbd1e)
### Credits
- apple502j |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4866
- **State**: PUBLISHED
- **Published Date**: September 19, 2006 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 18:43 UTC
- **Reserved Date**: September 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in kextload in Apple OS X, as used by TDIXSupport in Roxio Toast Titanium and possibly other products, allows local users to execute arbitrary code via a long extension argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20034](http://www.securityfocus.com/bid/20034)
2. [](http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt)
3. [20060913 [NETRAGARD-20060822 SECURITY ADVISORY] [ APPLE COMPUTER CORPORATION KEXTLOAD VULNERABILITY + ROXIO TOAST TITANUM 7 HELPER APP - LOCAL ROOT COMROMISE]](http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049452.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5958
- **State**: PUBLISHED
- **Published Date**: May 17, 2019 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in Electronic reception and examination of application for radio licenses Offline 1.0.9.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**Ministry of Internal Affairs and Communications - Electronic reception and examination of application for radio licenses Offline**
Affected versions:
- 1.0.9.0 and earlier (Status: affected)
### References
1. [](https://www.denpa.soumu.go.jp/public/prog/offlineInstaller_download.html)
2. [](http://jvn.jp/en/jp/JVN69903953/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1906
- **State**: PUBLISHED
- **Published Date**: April 10, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in richedit/keyboard.php in eCardMAX HotEditor (Hot Editor) 4.0, and the HotEditor plugin for MyBB, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the first parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-1315](http://www.vupen.com/english/advisories/2007/1315)
2. [23377](http://www.securityfocus.com/bid/23377)
3. [24825](http://secunia.com/advisories/24825)
4. [34776](http://osvdb.org/34776)
5. [](http://www.expw0rm.com/hot-editor-v40-local-file-inclusion_no113.html)
6. [20070409 Mybb Hot Editor Plugin Local File Inclusion](http://www.securityfocus.com/archive/1/465092/100/0/threaded)
7. [](http://www.expw0rm.com/mybb-hot-editor-plugin-local-file-inclusion_no114.html)
8. [20070409 Hot Editor v4.0 Local File Inclusion](http://www.securityfocus.com/archive/1/465094/100/0/threaded)
9. [hoteditor-keyboard-file-include(33521)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33521)
10. [2533](http://securityreason.com/securityalert/2533) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0838
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 17:02 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
### Affected Products
**Microsoft Corporation - Microsoft Edge, ChakraCore**
Affected versions:
- Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016. (Status: affected)
### References
1. [102877](http://www.securityfocus.com/bid/102877)
2. [44080](https://www.exploit-db.com/exploits/44080/)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0838)
4. [1040372](http://www.securitytracker.com/id/1040372) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3124
- **State**: PUBLISHED
- **Published Date**: September 09, 2009 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 02:15 UTC
- **Reserved Date**: September 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in get_message.cgi in QuarkMail allows remote attackers to read arbitrary files via a .. (dot dot) in the tf parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-2460](http://www.vupen.com/english/advisories/2009/2460)
2. [](http://packetstormsecurity.org/0908-exploits/quarkmail-lfi.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27786
- **State**: PUBLISHED
- **Published Date**: December 11, 2020 at 04:05 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.7-rc6 (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d)
2. [[oss-security] 20201203 Re: Linux Kernel: ALSA: use-after-free Write in snd_rawmidi_kernel_write1](http://www.openwall.com/lists/oss-security/2020/12/03/1)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1900933)
4. [](https://security.netapp.com/advisory/ntap-20210122-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6044
- **State**: PUBLISHED
- **Published Date**: February 03, 2009 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: February 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in advanced_search_result.php in xt:Commerce 3.0.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the keywords parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.majorsecurity.de/index_2.php?major_rls=major_rls54)
2. [20080922 [MajorSecurity Advisory #54]xt:Commerce - Cross Site Scripting and Session Fixation Issues](http://www.securityfocus.com/archive/1/496583/100/0/threaded)
3. [31313](http://www.securityfocus.com/bid/31313)
4. [xtcommerce-keywords-xss(45340)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45340) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0481
- **State**: PUBLISHED
- **Published Date**: July 03, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21640830)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21627986)
3. [sterling-b2b-ui-info-disclosure(81546)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81546) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37077
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:03 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the pppoeUser parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3990
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26894
- **State**: PUBLISHED
- **Published Date**: October 08, 2020 at 20:04 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 08, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LiveCode v9.6.1 on Windows allows local, low-privileged users to gain privileges by creating a malicious "cmd.exe" in the folder of the vulnerable LiveCode application. If the application is using LiveCode's "shell()" function, it will attempt to search for "cmd.exe" in the folder of the current application and run the malicious "cmd.exe".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://john-woodman.com/posts/LiveCode-Privilege-Escalation-Vulnerability/)
2. [](https://quality.livecode.com/show_bug.cgi?id=22942)
3. [](https://github.com/livecode/livecode/pull/7454) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0219
- **State**: PUBLISHED
- **Published Date**: June 21, 2012 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 18:16 UTC
- **Reserved Date**: December 14, 2011 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49746](http://secunia.com/advisories/49746)
2. [1027064](http://www.securitytracker.com/id?1027064)
3. [FEDORA-2012-8328](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html)
4. [GLSA-201208-01](http://security.gentoo.org/glsa/glsa-201208-01.xml)
5. [](http://www.dest-unreach.org/socat/contrib/socat-secadv3.html)
6. [FEDORA-2012-8274](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html)
7. [openSUSE-SU-2012:0809](http://www.lwn.net/Articles/504742/)
8. [53510](http://www.securityfocus.com/bid/53510)
9. [MDVSA-2013:169](http://www.mandriva.com/security/advisories?name=MDVSA-2013:169)
10. [81969](http://www.osvdb.org/81969)
11. [49105](http://secunia.com/advisories/49105)
12. [[oss-security] 20120514 socat security advisory](http://www.openwall.com/lists/oss-security/2012/05/14/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32847
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 01:54 UTC
- **Last Updated**: November 19, 2024 at 04:56 UTC
- **Reserved Date**: April 19, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
### Affected Products
**Ivanti - EPM**
Affected versions:
- 2024 November Security Update (Status: affected)
- 2022 SU6 November Security Update (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0614
- **State**: PUBLISHED
- **Published Date**: January 31, 2007 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: January 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (persistent application crash) via a crafted phsh hash attribute in a TXT key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2007-02-15](http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html)
2. [24198](http://secunia.com/advisories/24198)
3. [23945](http://secunia.com/advisories/23945)
4. [1017661](http://www.securitytracker.com/id?1017661)
5. [](http://projects.info-pull.com/moab/MOAB-29-01-2007.html)
6. [32713](http://www.osvdb.org/32713)
7. [](http://docs.info.apple.com/article.html?artnum=305102)
8. [22304](http://www.securityfocus.com/bid/22304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5379
- **State**: PUBLISHED
- **Published Date**: November 13, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:06 UTC
- **Reserved Date**: August 22, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.x before 7.0.0.2 CF25 and 8.x before 8.0.0.1 CF8 allows remote authenticated users to inject arbitrary web script or HTML by leveraging improper tagging functionality.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655635)
2. [was-portal-cve20135379-xss(86930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86930)
3. [PM96047](http://www-01.ibm.com/support/docview.wss?uid=swg1PM96047) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5774
- **State**: PUBLISHED
- **Published Date**: November 06, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Hyper NIKKI System before 2.19.9 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4363](http://www.vupen.com/english/advisories/2006/4363)
2. [hns-unspecified-xss(30040)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30040)
3. [](http://www.h14m.org/dist/)
4. [20949](http://www.securityfocus.com/bid/20949)
5. [22697](http://secunia.com/advisories/22697)
6. [JVN#88325166](http://jvn.jp/jp/JVN%2388325166/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2224
- **State**: PUBLISHED
- **Published Date**: April 11, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 11, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xunlei Thunder before 7.2.6 allows remote attackers to execute arbitrary code via a crafted file, related to a "DLL injection vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://safe.xunlei.com/announce/xl20120306.html)
2. [xunlei-dll-code-execution(74811)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74811)
3. [](http://blog.vulnhunt.com/index.php/2012/03/06/cal-2012-0006xunlei-dll-injection-vulnerability/)
4. [53191](http://www.securityfocus.com/bid/53191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3717
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 16:52 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
connect node module before 2.14.0 suffers from a Cross-Site Scripting (XSS) vulnerability due to a lack of validation of file in directory.js middleware.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**HackerOne - connect node module**
Affected versions:
- Versions before 2.14.0 (Status: affected)
### References
1. [](https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b)
2. [](https://hackerone.com/reports/309641)
3. [](https://hackerone.com/reports/309394) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2629
- **State**: PUBLISHED
- **Published Date**: May 11, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bradford CampusManager Network Control Application Server 3.1(6) allows remote attackers to obtain sensitive information (backup, log, and configuration files) via direct request for certain files in (1) /runTime/ or (2) /remediationReports/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2698](http://securityreason.com/securityalert/2698)
2. [20070502 Bradford CampusManager v3.1(6) Sensitive Data Disclosure](http://www.securityfocus.com/archive/1/467490/100/0/threaded)
3. [35820](http://osvdb.org/35820)
4. [campusmanager-directory-info-disclosure(34042)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34042)
5. [](http://www.john-martinelli.com/work/campusmanager.txt)
6. [25138](http://secunia.com/advisories/25138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7344
- **State**: PUBLISHED
- **Published Date**: March 23, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: March 23, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in core/settings.php in ownCloud before 4.0.12 and 4.5.x before 4.5.6 allows remote authenticated users to execute arbitrary PHP code via unknown vectors. NOTE: this issue was SPLIT from CVE-2013-0303 due to different affected versions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://owncloud.org/about/security/advisories/oC-SA-2013-006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6677
- **State**: PUBLISHED
- **Published Date**: December 23, 2019 at 16:50 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, under certain conditions when using custom TCP congestion control settings in a TCP profile, TMM stops processing traffic when processed by an iRule.
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 15.0.0-15.0.1 (Status: affected)
- 14.1.0-14.1.2 (Status: affected)
- 14.0.0-14.0.1 (Status: affected)
- 13.1.0-13.1.3.1 (Status: affected)
- 12.1.0-12.1.5 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K06747393) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3266
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:58 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 03, 2024 at 16:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL attribute of widgets in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**boldthemes - Bold Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/21fed5a3-1bb2-4581-95b4-badff98bed42?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder)
### Credits
- wesley |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10566
- **State**: PUBLISHED
- **Published Date**: November 21, 2019 at 14:38 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer overflow can occur in wlan module if supported rates or extended rates element length is greater than max rate set length in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8996AU, Nicobar, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS405, QCS605, SDA845, SDM670, SDM710, SDM845, SDX20, SM6150, SM8150, SM8250, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music**
Affected versions:
- APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8996AU, Nicobar, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS405, QCS605, SDA845, SDM670, SDM710, SDM845, SDX20, SM6150, SM8150, SM8250, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33836
- **State**: PUBLISHED
- **Published Date**: October 16, 2023 at 00:26 UTC
- **Last Updated**: September 16, 2024 at 19:14 UTC
- **Reserved Date**: May 23, 2023 at 00:31 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify Governance 10.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 256016.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**IBM - Security Verify Governance**
Affected versions:
- 10.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7047640)
2. [](https://https://exchange.xforce.ibmcloud.com/vulnerabilities/256016) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0893
- **State**: PUBLISHED
- **Published Date**: April 16, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 21, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2008-3220](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00386.html)
2. [rhds-cgiscripts-security-bypass(41843)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41843)
3. [1019857](http://www.securitytracker.com/id?1019857)
4. [28802](http://www.securityfocus.com/bid/28802)
5. [RHSA-2008:0201](http://www.redhat.com/support/errata/RHSA-2008-0201.html)
6. [FEDORA-2008-3214](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html)
7. [29761](http://secunia.com/advisories/29761)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=437320)
9. [29826](http://secunia.com/advisories/29826) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41451
- **State**: PUBLISHED
- **Published Date**: December 17, 2021 at 14:32 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tp-link.com)
2. [](http://ax10v1.com)
3. [](https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26995
- **State**: PUBLISHED
- **Published Date**: June 11, 2021 at 13:12 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 09, 2021 at 00:00 UTC
- **Assigned By**: netapp
### Vulnerability Description
E-Series SANtricity OS Controller Software 11.x versions prior to 11.70.1 are susceptible to a vulnerability which when successfully exploited could allow privileged attackers to execute arbitrary code.
### Affected Products
**n/a - E-Series SANtricity OS Controller Software 11.x**
Affected versions:
- Prior to 11.70.1 (Status: affected)
### References
1. [](https://security.netapp.com/advisory/NTAP-20210610-0002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0318
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FreeRADIUS RADIUS server allows remote attackers to cause a denial of service (CPU consumption) via a flood of Access-Request packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020221 DoS Attack against many RADIUS servers](http://marc.info/?l=bugtraq&m=101440113410083&w=2)
2. [freeradius-access-request-dos(9968)](http://www.iss.net/security_center/static/9968.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0715
- **State**: PUBLISHED
- **Published Date**: August 09, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 03:53 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36998372.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
### References
1. [100204](http://www.securityfocus.com/bid/100204)
2. [](https://source.android.com/security/bulletin/2017-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32946
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 12:58 UTC
- **Last Updated**: April 15, 2025 at 14:11 UTC
- **Reserved Date**: April 14, 2025 at 21:01 UTC
- **Assigned By**: JFROG
### Vulnerability Description
This vulnerability allows any attacker to add playlists to a different user’s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-282: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1)
2. [](https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-activitypub/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1757
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 17:53 UTC
- **Last Updated**: August 03, 2024 at 16:18 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212147)
2. [](https://support.apple.com/en-us/HT212146)
3. [](https://support.apple.com/en-us/HT212148)
4. [](https://support.apple.com/en-us/HT212149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5675
- **State**: PUBLISHED
- **Published Date**: August 31, 2016 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 01:07 UTC
- **Reserved Date**: June 16, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
handle_daylightsaving.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.0.0 through 3.0.0, NUUO Crystal 2.2.1 through 3.2.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the NTPServer parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#856152](http://www.kb.cert.org/vuls/id/856152)
2. [92318](http://www.securityfocus.com/bid/92318)
3. [40200](https://www.exploit-db.com/exploits/40200/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0580
- **State**: PUBLISHED
- **Published Date**: July 17, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:58 UTC
- **Reserved Date**: July 16, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in uvadmsh in IBM U2 UniVerse 10.0.0.9 and earlier allows the uvadm user to execute arbitrary code via a long -uv.install command line argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030716 SRT2003-07-08-1223 - IBM U2 UniVerse uvadm can take root via buffer overflows](http://marc.info/?l=bugtraq&m=105839042603476&w=2)
2. [20030716 SRT2003-07-08-1223 - IBM U2 UniVerse uvadm can take root via buffer overflows](http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25611
- **State**: PUBLISHED
- **Published Date**: December 18, 2020 at 07:11 UTC
- **Last Updated**: August 04, 2024 at 15:33 UTC
- **Reserved Date**: September 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The AWV portal of Mitel MiCollab before 9.2 could allow an attacker to gain access to conference information by sending arbitrary code due to improper input validation, aka XSS. Successful exploitation could allow an attacker to view user conference information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mitel.com/support/security-advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3891
- **State**: PUBLISHED
- **Published Date**: August 14, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 19, 2007 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Unspecified vulnerability in Windows Vista Weather Gadgets in Windows Vista allows remote attackers to execute arbitrary code via crafted HTML attributes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:2071](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2071)
2. [26439](http://secunia.com/advisories/26439)
3. [TA07-226A](http://www.us-cert.gov/cas/techalerts/TA07-226A.html)
4. [ADV-2007-2872](http://www.vupen.com/english/advisories/2007/2872)
5. [1018566](http://www.securitytracker.com/id?1018566)
6. [VU#542808](http://www.kb.cert.org/vuls/id/542808)
7. [MS07-048](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-048)
8. [25306](http://www.securityfocus.com/bid/25306) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33937
- **State**: PUBLISHED
- **Published Date**: October 12, 2022 at 19:25 UTC
- **Last Updated**: May 16, 2025 at 13:45 UTC
- **Reserved Date**: June 17, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell GeoDrive, Versions 1.0 - 2.2, contain a Path Traversal Vulnerability in the reporting function. A local, low privileged attacker could potentially exploit this vulnerability, to gain unauthorized delete access to the files stored on the server filesystem, with the privileges of the GeoDrive service: NT AUTHORITY\SYSTEM.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**Dell - GeoDrive**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000203632) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8370, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8370 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8370
- **State**: PUBLISHED
- **Published Date**: January 29, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 21, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#88252465](http://jvn.jp/en/jp/JVN88252465/index.html)
2. [1031642](http://www.securitytracker.com/id/1031642)
3. [JVNDB-2015-000007](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007)
4. [](http://www.vmware.com/security/advisories/VMSA-2015-0001.html)
5. [62605](http://secunia.com/advisories/62605)
6. [72338](http://www.securityfocus.com/bid/72338)
7. [vmware-cve20148370-priv-esc(100933)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100933)
8. [62551](http://secunia.com/advisories/62551)
9. [1031643](http://www.securitytracker.com/id/1031643)
10. [62669](http://secunia.com/advisories/62669) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46394
- **State**: PUBLISHED
- **Published Date**: March 04, 2022 at 13:05 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v13 variable is directly retrieved from the http request parameter startIp. Then v13 will be splice to stack by function sscanf without any security check, which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36107
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 18:50 UTC
- **Last Updated**: September 03, 2024 at 15:28 UTC
- **Reserved Date**: May 20, 2024 at 21:07 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. `If-Modified-Since` and `If-Unmodified-Since` headers when used with anonymous requests by sending a random object name requests can be used to determine if an object exists or not on the server on a specific bucket and also gain access to some amount of
information such as `Last-Modified (of the latest version)`, `Etag (of the latest version)`, `x-amz-version-id (of the latest version)`, `Expires (metadata value of the latest version)`, `Cache-Control (metadata value of the latest version)`. This conditional check was being honored before validating if the anonymous access is indeed allowed on the metadata of an object. This issue has been addressed in commit `e0fe7cc3917`. Users must upgrade to RELEASE.2024-05-27T19-17-46Z for the fix. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**minio - minio**
Affected versions:
- < RELEASE.2024-05-27T19-17-46Z (Status: affected)
### References
1. [https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9](https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9)
2. [https://github.com/minio/minio/pull/19810](https://github.com/minio/minio/pull/19810)
3. [https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272](https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272)
4. [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since)
5. [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2325
- **State**: PUBLISHED
- **Published Date**: October 26, 2007 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:58 UTC
- **Reserved Date**: October 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The c-client library in Internet Message Access Protocol (IMAP) dated before 2002 RC2, as used by Pine 4.20 through 4.44, allows remote attackers to cause a denial of service (client crash) via a MIME-encoded email with Content-Type header containing an empty boundary field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [pine-blank-boundary-dos(9668)](http://www.iss.net/security_center/static/9668.php)
2. [20020724 Denial of Service bug in Pine 4.44](http://online.securityfocus.com/archive/1/284086)
3. [5301](http://www.securityfocus.com/bid/5301) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3616
- **State**: PUBLISHED
- **Published Date**: September 16, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:45 UTC
- **Reserved Date**: August 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in the SearchKit API in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via vectors associated with "passing untrusted input" to unspecified API functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31189](http://www.securityfocus.com/bid/31189)
2. [APPLE-SA-2008-09-15](http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html)
3. [macos-searchkitapi-code-execution(45172)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45172)
4. [TA08-260A](http://www.us-cert.gov/cas/techalerts/TA08-260A.html)
5. [1020880](http://securitytracker.com/id?1020880)
6. [ADV-2008-2584](http://www.vupen.com/english/advisories/2008/2584)
7. [31882](http://secunia.com/advisories/31882) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2728
- **State**: PUBLISHED
- **Published Date**: November 22, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:53 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Some Huawei mobile phones Honor 6X Berlin-L22C636B150 and earlier versions have a Bluetooth unlock bypassing vulnerability. If a user has enabled the smart unlock function, an attacker can impersonate the user's Bluetooth device to unlock the user's mobile phone screen.uawei mobile phones have a Bluetooth unlock bypassing vulnerability due to the lack of validation on Bluetooth devices. If a user has enabled the smart unlock function, an attacker can impersonate the user's Bluetooth device to unlock the user's mobile phone screen.
### Affected Products
**Huawei Technologies Co., Ltd. - Honor 6X**
Affected versions:
- Berlin-L22C636B150 and earlier versions (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170323-01-smartphone-en)
2. [97042](http://www.securityfocus.com/bid/97042) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7648
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207427)
2. [94907](http://www.securityfocus.com/bid/94907)
3. [](https://support.apple.com/HT207421)
4. [1037459](http://www.securitytracker.com/id/1037459)
5. [](https://support.apple.com/HT207422)
6. [GLSA-201706-15](https://security.gentoo.org/glsa/201706-15)
7. [](https://support.apple.com/HT207424) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4291
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 22:00 UTC
- **Last Updated**: May 06, 2025 at 02:50 UTC
- **Reserved Date**: May 05, 2025 at 12:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in IdeaCMS up to 1.6. Affected is the function saveUpload. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**n/a - IdeaCMS**
Affected versions:
- 1.0 (Status: affected)
- 1.1 (Status: affected)
- 1.2 (Status: affected)
- 1.3 (Status: affected)
- 1.4 (Status: affected)
- 1.5 (Status: affected)
- 1.6 (Status: affected)
### References
1. [VDB-307398 | IdeaCMS saveUpload unrestricted upload](https://vuldb.com/?id.307398)
2. [VDB-307398 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.307398)
3. [Submit #563522 | IdeaCMS IdeaCMS开源商城系统 v1.6 File Upload Vulnerability](https://vuldb.com/?submit.563522)
4. [](https://gitee.com/ideacms/ideacms/issues/IC32SB)
### Credits
- enenen (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17309
- **State**: PUBLISHED
- **Published Date**: October 07, 2019 at 15:03 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the EmailMan module by an Admin user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-036/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1680
- **State**: PUBLISHED
- **Published Date**: April 02, 2019 at 13:20 UTC
- **Last Updated**: September 16, 2024 at 18:44 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Privileged Identity Manager Virtual Appliance 2.2.1 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 145236.
### Affected Products
**IBM - Security Privileged Identity Manager**
Affected versions:
- 2.1.1 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=ibm10879093)
2. [ibm-sim-cve20181680-info-disc (145236)](https://exchange.xforce.ibmcloud.com/vulnerabilities/145236) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20142
- **State**: PUBLISHED
- **Published Date**: December 09, 2021 at 15:23 UTC
- **Last Updated**: August 03, 2024 at 17:30 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
An unauthenticated command injection vulnerability exists in the parameters of operation 41 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.
### Affected Products
**n/a - Gryphon Tower router**
Affected versions:
- <= 04.0004.12 (Current) (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2021-51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32625
- **State**: PUBLISHED
- **Published Date**: December 05, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 14:52 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326216; Issue ID: ALPS07326216.
### Affected Products
**MediaTek, Inc. - MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8168, MT8365, MT8675, MT8766, MT8781, MT8791**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/December-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28119
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 22:02 UTC
- **Last Updated**: August 21, 2024 at 22:55 UTC
- **Reserved Date**: March 04, 2024 at 14:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. Version 1.7.45 contains a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**getgrav - grav**
Affected versions:
- < 1.7.45 (Status: affected)
### References
1. [https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58](https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58)
2. [https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe](https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe)
3. [https://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99](https://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2904
- **State**: PUBLISHED
- **Published Date**: June 30, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: June 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in shop.php in Conkurent PHPMyCart allows remote attackers to execute arbitrary SQL commands via the cat parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5812](https://www.exploit-db.com/exploits/5812)
2. [phpmycart-shop-sql-injection(43084)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43084)
3. [29726](http://www.securityfocus.com/bid/29726)
4. [30679](http://secunia.com/advisories/30679) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12562
- **State**: REJECTED
- **Last Updated**: December 30, 2022 at 00:00 UTC
- **Reserved Date**: April 30, 2020 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7918
- **State**: PUBLISHED
- **Published Date**: March 27, 2020 at 13:43 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An insecure direct object reference in webmail in totemo totemomail 7.0.0 allows an authenticated remote user to read and modify mail folder names of other users via enumeration.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.totemo.com/en/solutions/email-encryption)
2. [](https://objectif-securite.ch/2020/03/20/IDOR-totemo-mail-folder.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4409
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 02:31 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 02, 2024 at 07:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP-ViperGB plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.1. This is due to missing or incorrect nonce validation when saving plugin settings. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**justin_k - WP-ViperGB**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e86581bd-94c3-4b05-9590-ca3b62073703?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3091230%40wp-vipergb%2Ftrunk&old=2812759%40wp-vipergb%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Benedictus Jovan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0126
- **State**: PUBLISHED
- **Published Date**: January 09, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rxvt-unicode before 6.3, on certain platforms that use openpty and non-Unix pty devices such as Linux and most BSD platforms, does not maintain the intended permissions of tty devices, which allows local users to gain read and write access to the devices.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22223](http://www.osvdb.org/22223)
2. [18301](http://secunia.com/advisories/18301)
3. [](http://dist.schmorp.de/rxvt-unicode/Changes)
4. [ADV-2006-0052](http://www.vupen.com/english/advisories/2006/0052) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1018
- **State**: PUBLISHED
- **Published Date**: June 12, 2019 at 13:49 UTC
- **Last Updated**: May 20, 2025 at 17:49 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses the vulnerability by correcting how DirectX handles objects in memory.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1703**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [DirectX Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1018) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5046
- **State**: PUBLISHED
- **Published Date**: September 24, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:17 UTC
- **Reserved Date**: September 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Webmail interface for IceWarp Merak Mail Server before 9.0.0 allows remote attackers to inject arbitrary JavaScript via a javascript: URI in an attribute of an element in an email message body, as demonstrated by the onload attribute in a BODY element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25708](http://www.securityfocus.com/bid/25708)
2. [26877](http://secunia.com/advisories/26877)
3. [](http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf)
4. [ADV-2007-3225](http://www.vupen.com/english/advisories/2007/3225)
5. [37428](http://osvdb.org/37428) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4178
- **State**: PUBLISHED
- **Published Date**: April 03, 2019 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A permissions issue existed in which execute permission was incorrectly granted. This issue was addressed with improved permission validation. This issue affected versions prior to macOS High Sierra 10.13.4.
### Affected Products
**n/a - macOS**
Affected versions:
- Versions prior to: macOS High Sierra 10.13.4 (Status: affected)
### References
1. [](https://support.apple.com/kb/HT208937) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4967
- **State**: PUBLISHED
- **Published Date**: September 21, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to obtain sensitive information from (1) a backup of the device configuration via script/cfg_show.php or (2) PCAP files via script/system/tcpdump.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92779](http://www.securityfocus.com/bid/92779)
2. [](http://docs.fortinet.com/uploaded/files/3236/fortiwan-v4.2.5-release-notes.pdf)
3. [VU#724487](https://www.kb.cert.org/vuls/id/724487)
4. [](http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29168
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 21:42 UTC
- **Last Updated**: January 06, 2025 at 19:58 UTC
- **Reserved Date**: April 24, 2023 at 23:30 UTC
- **Assigned By**: icscert
### Vulnerability Description
The local Vuforia web application does not support HTTPS, and federated credentials are passed via basic authentication.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**PTC - Vuforia Studio**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13)
### Credits
- Lockheed Martin—Red Team reported these vulnerabilities to PTC. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5925
- **State**: PUBLISHED
- **Published Date**: August 26, 2020 at 15:32 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, undisclosed internally generated UDP traffic may cause the Traffic Management Microkernel (TMM) to restart under some circumstances.
### Affected Products
**n/a - BIG-IP**
Affected versions:
- 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K45421311) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0939
- **State**: PUBLISHED
- **Published Date**: February 25, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in wppa.php in the WP Photo Album (WPPA) before 1.1 plugin for WordPress allow remote attackers to execute arbitrary SQL commands via (1) the photo parameter to index.php, used by the wppa_photo_name function; or (2) the album parameter to index.php, used by the wppa_album_name function. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0586](http://www.vupen.com/english/advisories/2008/0586)
2. [3693](http://securityreason.com/securityalert/3693)
3. [20080216 WordPress album PHOTO SQL Injection](http://www.securityfocus.com/archive/1/488290)
4. [27832](http://www.securityfocus.com/bid/27832)
5. [photoalbum-index-sql-injection(40599)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40599)
6. [5135](https://www.exploit-db.com/exploits/5135)
7. [](http://weblogtoolscollection.com/archives/2008/02/21/photo-album-plugin-vulnerabilities/)
8. [](http://me.mywebsight.ws/web/wppa/)
9. [28988](http://secunia.com/advisories/28988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6434
- **State**: PUBLISHED
- **Published Date**: July 04, 2024 at 08:32 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: July 01, 2024 at 17:56 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Premium Addons for Elementor plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 4.10.35. This is due to processing user-supplied input as a regular expression. This makes it possible for authenticated attackers, with Author-level access and above, to create and query a malicious post title, resulting in slowing server resources.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**leap13 - Premium Addons for Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3c59d95a-b7f1-4a04-bbf4-bab2c42d6d75?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/class-premium-template-tags.php#L1676)
3. [](https://plugins.trac.wordpress.org/changeset/3110991/)
### Credits
- Muhammad Umer Adeem |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2516
- **State**: PUBLISHED
- **Published Date**: February 15, 2019 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 15:44 UTC
- **Reserved Date**: March 08, 2013 at 00:00 UTC
- **Assigned By**: larry_cashdollar
### Vulnerability Description
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.
### Affected Products
**Stefaan Colman - FileUtils**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://www.vapidlabs.com/advisory.php?v=36)
2. [](http://rubygems.org/gems/fileutils) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3025
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 15, 2024 at 18:44 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality RES 3700 component of Oracle Food and Beverage Applications. The supported version that is affected is 5.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality RES 3700. While the vulnerability is in Oracle Hospitality RES 3700, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality RES 3700. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Hospitality RES 3700**
Affected versions:
- 5.7 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
2. [](http://packetstormsecurity.com/files/157746/Oracle-Hospitality-RES-3700-5.7-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3554
- **State**: PUBLISHED
- **Published Date**: April 14, 2025 at 06:31 UTC
- **Last Updated**: April 14, 2025 at 14:11 UTC
- **Reserved Date**: April 13, 2025 at 22:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in phpshe 1.8. It has been rated as problematic. This issue affects some unknown processing of the file api.php?mod=cron&act=buyer. The manipulation of the argument act leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**n/a - phpshe**
Affected versions:
- 1.8 (Status: affected)
### References
1. [VDB-304595 | phpshe api.php cross site scripting](https://vuldb.com/?id.304595)
2. [VDB-304595 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.304595)
3. [Submit #548411 | 灵宝简好网络科技有限公司 phpshe v1.8 Doubled Character XSS Manipulations](https://vuldb.com/?submit.548411)
4. [](https://www.yuque.com/baimatangseng-iyusa/qwwm81/zwhcyq1585ec8g37?singleDoc)
### Credits
- sjdalu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6145
- **State**: PUBLISHED
- **Published Date**: June 27, 2019 at 16:13 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 23, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient data validation in HTML parser in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html)
2. [](https://crbug.com/805924) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.