System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4550 - **State**: PUBLISHED - **Published Date**: May 11, 2025 at 22:31 UTC - **Last Updated**: May 12, 2025 at 15:07 UTC - **Reserved Date**: May 10, 2025 at 15:41 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in PHPGurukul Apartment Visitors Management System 1.0. This issue affects some unknown processing of the file /admin/pass-details.php. The manipulation of the argument pid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Apartment Visitors Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-308297 | PHPGurukul Apartment Visitors Management System pass-details.php sql injection](https://vuldb.com/?id.308297) 2. [VDB-308297 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308297) 3. [Submit #567567 | PHPGurukul Apartment Visitors Management System V1.0 SQL Injection](https://vuldb.com/?submit.567567) 4. [](https://github.com/y77-88/myCVE/issues/7) 5. [](https://phpgurukul.com/) ### Credits - yl525 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20710, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20710 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20710 - **State**: REJECTED - **Published Date**: March 07, 2019 at 22:00 UTC - **Last Updated**: April 15, 2019 at 17:46 UTC - **Reserved Date**: January 14, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3963, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3963 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3963 - **State**: PUBLISHED - **Published Date**: April 08, 2016 at 15:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: April 06, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via traffic to TCP port 443. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-103-02) 2. [](http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-751155.pdf) 3. [44721](https://www.exploit-db.com/exploits/44721/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2921, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2921 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2921 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 27, 2024 at 18:50 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.19 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.19 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 2. [](https://security.netapp.com/advisory/ntap-20200416-0003/) 3. [USN-4350-1](https://usn.ubuntu.com/4350-1/) 4. [FEDORA-2020-20ac7c92a1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/) 5. [FEDORA-2020-136dc82437](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/) 6. [FEDORA-2020-261c9ddd7c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/) 7. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6803 - **State**: PUBLISHED - **Published Date**: March 20, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 15:41 UTC - **Reserved Date**: March 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface in the Scheduler in SolarWinds (formerly Serv-U) FTP Voyager 16.2.0 allow remote attackers to hijack the authentication of users for requests that (1) change the admin password, (2) terminate the scheduler, or (3) possibly execute arbitrary commands via crafted requests to Admin/XML/Result.xml. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/141567/FTP-Voyager-Scheduler-16.2.0-CSRF-Denial-Of-Service.html) 2. [96814](http://www.securityfocus.com/bid/96814) 3. [](http://hyp3rlinx.altervista.org/advisories/FTP-VOYAGER-SCHEDULER-CSRF-REMOTE-CMD-EXECUTION.txt) 4. [41574](https://www.exploit-db.com/exploits/41574/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51461 - **State**: PUBLISHED - **Published Date**: December 20, 2023 at 14:02 UTC - **Last Updated**: October 07, 2024 at 13:54 UTC - **Reserved Date**: December 19, 2023 at 17:03 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7122 - **State**: PUBLISHED - **Published Date**: March 06, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 20:50 UTC - **Reserved Date**: March 05, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the IP Address Lookup functionality in BSQ Sitestats (component for Joomla) 1.8.0, and possibly other versions before 2.2.1, allows remote attackers to inject arbitrary web script and HTML via the ip parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [bsq-sitestats-ip-xss(29266)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29266) 2. [20267](http://www.securityfocus.com/bid/20267) 3. [2360](http://securityreason.com/securityalert/2360) 4. [20060929 Secunia Research: Joomla BSQ Sitestats Component MultipleVulnerabilities](http://www.securityfocus.com/archive/1/447356/100/0/threaded) 5. [](http://secunia.com/secunia_research/2006-63/advisory/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2042 - **State**: PUBLISHED - **Published Date**: April 16, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 16, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in the Avant-Garde Solutions MOSMedia Lite 1.0.6 and earlier module for Mambo allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) support.html.php or (2) info.html.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37431](http://osvdb.org/37431) 2. [ADV-2007-1357](http://www.vupen.com/english/advisories/2007/1357) 3. [37430](http://osvdb.org/37430)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0860 - **State**: PUBLISHED - **Published Date**: March 10, 2009 at 14:00 UTC - **Last Updated**: August 07, 2024 at 04:48 UTC - **Reserved Date**: March 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the web user interface in the login application in NetMRI 3.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to error pages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33824](http://www.securityfocus.com/bid/33824) 2. [33963](http://secunia.com/advisories/33963) 3. [20090218 DDIVRT-2009-20 NetMRI Login Application Cross-site Scripting Vulnerability](http://www.securityfocus.com/archive/1/501033/100/0/threaded) 4. [](http://connection.netcordia.com/forums/t/731.aspx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15566 - **State**: PUBLISHED - **Published Date**: July 07, 2020 at 12:23 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 06, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://xenbits.xen.org/xsa/advisory-317.html) 2. [[oss-security] 20200707 Xen Security Advisory 317 v3 (CVE-2020-15566) - Incorrect error handling in event channel port allocation](http://www.openwall.com/lists/oss-security/2020/07/07/2) 3. [DSA-4723](https://www.debian.org/security/2020/dsa-4723) 4. [openSUSE-SU-2020:0965](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html) 5. [FEDORA-2020-fbc13516af](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB3QJJZV23Z2IDYEMIHELWYSQBUEW6JP/) 6. [openSUSE-SU-2020:0985](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html) 7. [FEDORA-2020-76cf2b0f0a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXESCOVI7AVRNC7HEAMFM7PMEO6D3AUH/) 8. [GLSA-202007-02](https://security.gentoo.org/glsa/202007-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5900, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5900 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5900 - **State**: PUBLISHED - **Published Date**: January 12, 2009 at 19:27 UTC - **Last Updated**: August 07, 2024 at 11:13 UTC - **Reserved Date**: January 12, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CodeAvalanche Articles stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CAArticles.mdb. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33100](http://secunia.com/advisories/33100) 2. [4909](http://securityreason.com/securityalert/4909) 3. [7471](https://www.exploit-db.com/exploits/7471) 4. [articles-caarticles-info-disclosure(47351)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47351)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35621, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35621 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35621 - **State**: PUBLISHED - **Published Date**: September 21, 2022 at 18:14 UTC - **Last Updated**: May 28, 2025 at 13:56 UTC - **Reserved Date**: July 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash code fa2084d5abca91a62ed1d2f1cad3ec318e6a9a2d7f1510a00d898737b05f48ae allows remote attackers to execute fraudulent NFT transfers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MacherCS/CVE_Evoh_Contract)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3295, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3295 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3295 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 05:23 UTC - **Last Updated**: April 17, 2025 at 19:12 UTC - **Reserved Date**: April 04, 2025 at 17:16 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Editor plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to read arbitrary files on the affected site's server which may reveal sensitive information. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **benjaminprojas - WP Editor** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4618c1f4-c0aa-47f5-8c0b-2cb4a021f2e0?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3269832%40wp-editor%2Ftrunk&old=3151053%40wp-editor%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Quang Huynh Ngoc
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48311 - **State**: PUBLISHED - **Published Date**: February 06, 2023 at 00:00 UTC - **Last Updated**: March 26, 2025 at 13:37 UTC - **Reserved Date**: February 03, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description **UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/swzhouu/CVE-2022-48311)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27146 - **State**: PUBLISHED - **Published Date**: February 10, 2021 at 18:40 UTC - **Last Updated**: August 03, 2024 at 20:40 UTC - **Reserved Date**: February 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / CUadmin credentials for an ISP. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#httpd-hardcoded-credentials)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29961, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29961 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29961 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 16:59 UTC - **Last Updated**: May 29, 2025 at 22:21 UTC - **Reserved Date**: March 12, 2025 at 17:54 UTC - **Assigned By**: microsoft ### Vulnerability Description Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19044.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows Server 2025 (Server Core installation)** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows Server 2025** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39158 - **State**: PUBLISHED - **Published Date**: August 23, 2021 at 20:15 UTC - **Last Updated**: August 04, 2024 at 01:58 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description NVCaffe's python required dependencies list used to contain `gfortran`version prior to 0.17.4, entry which does not exist in the repository pypi.org. An attacker could potentially have posted malicious files to pypi.org causing a user to install it within NVCaffe. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-345: Security Weakness ### Affected Products **NVIDIA - caffe** Affected versions: - <= 0.17.4 (Status: affected) ### References 1. [](https://github.com/NVIDIA/caffe/security/advisories/GHSA-fmpp-8pwg-vwh9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4612, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4612 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4612 - **State**: PUBLISHED - **Published Date**: October 20, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 20, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in PortalApp 4.0 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter to (1) forums.asp and (2) content.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100629 XSS vulnerability in PortalApp](http://www.securityfocus.com/archive/1/512073/100/0/threaded) 2. [](http://www.aspapp.com/content.asp?CatId=197&ContentType=Downloads) 3. [4848](https://www.exploit-db.com/exploits/4848) 4. [27170](http://www.securityfocus.com/bid/27170) 5. [portalapp-forums-content-xss(39455)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39455) 6. [](http://www.htbridge.ch/advisory/xss_vulnerability_in_portalapp_1.html) 7. [4439](http://securityreason.com/securityalert/4439) 8. [ADV-2010-1630](http://www.vupen.com/english/advisories/2010/1630) 9. [28337](http://secunia.com/advisories/28337)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0241 - **State**: PUBLISHED - **Published Date**: May 30, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: May 01, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FrontRange GoldMine mail agent 5.70 and 6.00 before 30503 directly sends HTML to the default browser without setting its security zone or otherwise labeling it untrusted, which allows remote attackers to execute arbitrary code via a message that is rendered in IE using a less secure zone. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030528 SECNAP Security Advisory: Invalid HTML processing in GoldMine(tm)](http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0091.html) 2. [](http://www.secnap.net/security/gm001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1772 - **State**: PUBLISHED - **Published Date**: May 22, 2009 at 18:00 UTC - **Last Updated**: September 16, 2024 at 18:28 UTC - **Reserved Date**: May 22, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in activeCollab 2.1 Corporate allows remote attackers to inject arbitrary web script or HTML via the re_route parameter to the login script. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35079](http://secunia.com/advisories/35079) 2. [](http://pridels-team.blogspot.com/2009/05/activecollab-xss-and-full-path.html) 3. [35022](http://www.securityfocus.com/bid/35022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31103, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31103 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31103 - **State**: PUBLISHED - **Published Date**: March 31, 2024 at 19:10 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 28, 2024 at 06:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kanban for WordPress Kanban Boards for WordPress allows Reflected XSS.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Kanban for WordPress - Kanban Boards for WordPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Yudistira Arya (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25043 - **State**: PUBLISHED - **Published Date**: May 06, 2021 at 16:32 UTC - **Last Updated**: August 05, 2024 at 03:00 UTC - **Reserved Date**: May 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/SpiderLabs/ModSecurity/issues/2566)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41390 - **State**: PUBLISHED - **Published Date**: September 17, 2021 at 20:55 UTC - **Last Updated**: August 04, 2024 at 03:08 UTC - **Reserved Date**: September 17, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Ericsson ECM before 18.0, it was observed that Security Provider Endpoint in the User Profile Management Section is vulnerable to CSV Injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content_17.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7996, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7996 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7996 - **State**: PUBLISHED - **Published Date**: March 09, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 23:36 UTC - **Reserved Date**: March 09, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Eramba e1.0.6.033 has Stored XSS on the tooltip box via the /programScopes description parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/stolabs/security-issues-on-eramba-cf887bc0a069)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1096 - **State**: PUBLISHED - **Published Date**: July 22, 2021 at 04:25 UTC - **Last Updated**: August 03, 2024 at 15:55 UTC - **Reserved Date**: November 12, 2020 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA Windows GPU Display Driver for Windows contains a vulnerability in the NVIDIA kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where dereferencing a NULL pointer may lead to a system crash. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **NVIDIA - NVIDIA GPU Display Driver** Affected versions: - All GPU Driver versions (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5211)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-20628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-20628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-20628 - **State**: PUBLISHED - **Published Date**: August 31, 2020 at 16:07 UTC - **Last Updated**: August 04, 2024 at 14:22 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description controller/controller-comments.php in WP GDPR plugin through 2.1.1 has unauthenticated stored XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.nintechnet.com/unauthenticated-stored-xss-and-content-spoofing-vulnerabilities-in-wordpress-wp-gdpr-plugin-unpatched/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17463 - **State**: PUBLISHED - **Published Date**: November 14, 2018 at 15:00 UTC - **Last Updated**: January 29, 2025 at 17:17 UTC - **Reserved Date**: September 25, 2018 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [DSA-4330](https://www.debian.org/security/2018/dsa-4330) 2. [](https://crbug.com/888923) 3. [RHSA-2018:3004](https://access.redhat.com/errata/RHSA-2018:3004) 4. [GLSA-201811-10](https://security.gentoo.org/glsa/201811-10) 5. [](https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html) 6. [105666](http://www.securityfocus.com/bid/105666) 7. [](http://packetstormsecurity.com/files/156640/Google-Chrome-67-68-69-Object.create-Type-Confusion.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18641, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18641 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18641 - **State**: PUBLISHED - **Published Date**: February 10, 2020 at 00:30 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: February 10, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In LXC 2.0, many template scripts download code over cleartext HTTP, and omit a digital-signature check, before running it to bootstrap containers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1661447)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4895 - **State**: PUBLISHED - **Published Date**: September 14, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 15:08 UTC - **Reserved Date**: September 14, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in dwoprn.php in Sisfo Kampus 2006 (Semarang 3) allows remote attackers to read arbitrary files via the f parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [sisfokampus-dwoprn-directory-traversal(36534)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36534) 2. [4386](https://www.exploit-db.com/exploits/4386)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8229, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8229 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8229 - **State**: PUBLISHED - **Published Date**: November 24, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 08:13 UTC - **Reserved Date**: November 17, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Huawei eSpace U2980 unified gateway with software before V100R001C10 and U2990 with software before V200R001C10 allow remote authenticated users to cause a denial of service via crafted signaling packets from a registered device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-461219.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30172 - **State**: PUBLISHED - **Published Date**: May 11, 2023 at 00:00 UTC - **Last Updated**: January 27, 2025 at 16:51 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mlflow/mlflow/issues/7166) 2. [](https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7189 - **State**: PUBLISHED - **Published Date**: October 14, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 01:50 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Remote Code Execution Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS16-119](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-119) 2. [1036993](http://www.securitytracker.com/id/1036993) 3. [93427](http://www.securityfocus.com/bid/93427)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3633, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3633 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3633 - **State**: PUBLISHED - **Published Date**: June 02, 2020 at 15:05 UTC - **Last Updated**: August 04, 2024 at 07:37 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Array out of bound may occur while playing mp3 file as no check is there on offset if it is greater than the buffer allocated or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCS405, QCS605, QM215, Rennell, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130 ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables** Affected versions: - APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCS405, QCS605, QM215, Rennell, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2671, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2671 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2671 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46455 - **State**: PUBLISHED - **Published Date**: February 04, 2022 at 01:33 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: January 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-Link device D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetStationSettings. This vulnerability allows attackers to execute arbitrary commands via the station_access_enable parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin/) 2. [](https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_22/22.md) 3. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10285)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29602 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 22:48 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The gridelements (aka Grid Elements) extension through 7.6.1, 8.x through 8.7.0, 9.x through 9.7.0, and 10.x through 10.2.0 extension for TYPO3 allows XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://typo3.org/help/security-advisories) 2. [](https://typo3.org/security/advisory/typo3-ext-sa-2022-009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21991 - **State**: PUBLISHED - **Published Date**: September 22, 2021 at 18:59 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash). ### Affected Products **n/a - VMware vCenter Server, VMware Cloud Foundation** Affected versions: - VMware vCenter Server(7.x before 7.0 U2c, 6.7 before 6.7 U3o and 6.5 before 6.5 U3q) and VMware Cloud Foundation (4.x before 4.3 and 3.x before 3.10.2.2) (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2021-0020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0619 - **State**: PUBLISHED - **Published Date**: February 12, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Memory leak in the embedded web server in the WebVPN subsystem in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to cause a denial of service (memory consumption and SSL outage) via multiple crafted HTTP requests, aka Bug ID CSCue05458. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [72579](http://www.securityfocus.com/bid/72579) 2. [1031745](http://www.securitytracker.com/id/1031745) 3. [20150211 Cisco Adaptive Security Appliance WebVPN Embedded Web Server Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0619) 4. [cisco-asa-cve20150619-dos(100864)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100864)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0214, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0214 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0214 - **State**: PUBLISHED - **Published Date**: March 22, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: March 22, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FTP Explorer uses weak encryption for storing the username, password, and profile of FTP sites. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1003](http://www.securityfocus.com/bid/1003) 2. [20000224 How the password could be recover using FTP Explorer's registry!](http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10002242035500.30645-100000%40unreal.sekure.org)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5779, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5779 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5779 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:55 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Jack'd - Gay Chat & Dating (aka mobi.jackd.android) application 1.9.0a for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#481913](http://www.kb.cert.org/vuls/id/481913) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10271 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 14:21 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - WebLogic Server** Affected versions: - 10.3.6.0.0 (Status: affected) - 12.1.3.0.0 (Status: affected) - 12.2.1.1.0 (Status: affected) - 12.2.1.2.0 (Status: affected) ### References 1. [43458](https://www.exploit-db.com/exploits/43458/) 2. [1039608](http://www.securitytracker.com/id/1039608) 3. [101304](http://www.securityfocus.com/bid/101304) 4. [](https://github.com/c0mmand3rOpSec/CVE-2017-10271) 5. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 6. [43924](https://www.exploit-db.com/exploits/43924/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45072 - **State**: PUBLISHED - **Published Date**: October 18, 2023 at 12:43 UTC - **Last Updated**: September 12, 2024 at 18:23 UTC - **Reserved Date**: October 03, 2023 at 13:31 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kardi Order auto complete for WooCommerce plugin <= 1.2.0 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Kardi - Order auto complete for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/order-auto-complete-for-woocommerce/wordpress-order-auto-complete-for-woocommerce-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Emili Castells (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33555 - **State**: PUBLISHED - **Published Date**: August 31, 2021 at 10:32 UTC - **Last Updated**: September 17, 2024 at 01:36 UTC - **Reserved Date**: May 24, 2021 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Phoenix Contact - WHA-GW-F2D2-0-AS- Z2-ETH** Affected versions: - 3.0.7 (Status: affected) **Phoenix Contact - WHA-GW-F2D2-0-AS- Z2-ETH.EIP** Affected versions: - 3.0.7 (Status: affected) ### References 1. [](https://cert.vde.com/en-us/advisories/vde-2021-027) ### Credits - Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18796 - **State**: PUBLISHED - **Published Date**: November 16, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 11:23 UTC - **Reserved Date**: October 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Library Management System 1.0 has SQL Injection via the "Search for Books" screen. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/149987/Library-Management-System-1.0-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0081, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0081 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0081 - **State**: PUBLISHED - **Published Date**: February 20, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 09:05 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2014:0215](http://rhn.redhat.com/errata/RHSA-2014-0215.html) 2. [RHSA-2014:0306](http://rhn.redhat.com/errata/RHSA-2014-0306.html) 3. [65647](http://www.securityfocus.com/bid/65647) 4. [1029782](http://www.securitytracker.com/id/1029782) 5. [[oss-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)](http://openwall.com/lists/oss-security/2014/02/18/8) 6. [openSUSE-SU-2014:0295](http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html) 7. [57376](http://secunia.com/advisories/57376) 8. [[rubyonrails-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)](https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15589 - **State**: PUBLISHED - **Published Date**: October 18, 2017 at 08:00 UTC - **Last Updated**: August 05, 2024 at 19:57 UTC - **Reserved Date**: October 18, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20171120 [SECURITY] [DLA 1181-1] xen security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html) 2. [101496](http://www.securityfocus.com/bid/101496) 3. [](https://xenbits.xen.org/xsa/advisory-239.html) 4. [DSA-4050](https://www.debian.org/security/2017/dsa-4050) 5. [](https://support.citrix.com/article/CTX228867) 6. [[debian-lts-announce] 20181018 [SECURITY] [DLA 1549-1] xen security update](https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html) 7. [GLSA-201801-14](https://security.gentoo.org/glsa/201801-14) 8. [1039568](http://www.securitytracker.com/id/1039568)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44003 - **State**: PUBLISHED - **Published Date**: September 17, 2024 at 23:10 UTC - **Last Updated**: September 18, 2024 at 14:38 UTC - **Reserved Date**: August 18, 2024 at 21:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in spicethemes Spice Starter Sites allows Reflected XSS.This issue affects Spice Starter Sites: from n/a through 1.2.5. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **spicethemes - Spice Starter Sites** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/spice-starter-sites/wordpress-spice-starter-sites-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12663, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12663 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12663 - **State**: PUBLISHED - **Published Date**: December 16, 2024 at 19:00 UTC - **Last Updated**: December 16, 2024 at 19:19 UTC - **Reserved Date**: December 16, 2024 at 08:41 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in funnyzpc Mee-Admin up to 1.6. This vulnerability affects unknown code of the file /mee/login of the component Login. The manipulation of the argument username leads to observable response discrepancy. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-204: Improper Input Validation - CWE-203: Improper Input Validation ### Affected Products **funnyzpc - Mee-Admin** Affected versions: - 1.0 (Status: affected) - 1.1 (Status: affected) - 1.2 (Status: affected) - 1.3 (Status: affected) - 1.4 (Status: affected) - 1.5 (Status: affected) - 1.6 (Status: affected) ### References 1. [VDB-288532 | funnyzpc Mee-Admin Login login observable response discrepancy](https://vuldb.com/?id.288532) 2. [VDB-288532 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.288532) 3. [Submit #458371 | funnyzpc mee-admin 1.6 Information Exposure Through Discrepancy](https://vuldb.com/?submit.458371) 4. [](https://github.com/funnyzpc/mee-admin/issues/9) ### Credits - vastzero (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39533 - **State**: PUBLISHED - **Published Date**: July 11, 2024 at 16:08 UTC - **Last Updated**: August 02, 2024 at 04:26 UTC - **Reserved Date**: June 25, 2024 at 15:12 UTC - **Assigned By**: juniper ### Vulnerability Description An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions ip-source-address ip-destination-address arp-type which are not supported for this type of filter, are used in an ethernet switching filter, and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect. This issue affects Junos OS on QFX5000 Series and EX4600 Series: * All version before 21.2R3-S7,  * 21.4 versions before 21.4R3-S6, * 22.1 versions before 22.1R3-S5, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S2,  * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. Please note that the implemented fix ensures these unsupported match conditions cannot be committed anymore. ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-447: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 0 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) - 22.4 (Status: affected) - 23.2 (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA82993)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41833 - **State**: PUBLISHED - **Published Date**: October 19, 2022 at 21:24 UTC - **Last Updated**: May 07, 2025 at 20:52 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description In all BIG-IP 13.1.x versions, when an iRule containing the HTTP::collect command is configured on a virtual server, undisclosed requests can cause Traffic Management Microkernel (TMM) to terminate. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **F5 - BIG-IP** Affected versions: - 17.0.0 (Status: unaffected) - 16.1.x (Status: unaffected) - 15.1.0 (Status: unaffected) - 14.1.0 (Status: unaffected) - 13.1.0 (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K69940053) ### Credits - This issue was discovered internally by F5.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2624 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7744, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7744 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7744 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Musulmanin.com (aka com.wSalyafiyailimurdjiya) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#789913](http://www.kb.cert.org/vuls/id/789913) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28218 - **State**: PUBLISHED - **Published Date**: December 11, 2020 at 00:51 UTC - **Last Updated**: August 04, 2024 at 16:33 UTC - **Reserved Date**: November 05, 2020 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists in Easergy T300 (firmware 2.7 and older), that would allow an attacker to trick a user into initiating an unintended action. ### Weakness Classification (CWE) - CWE-1021: Security Weakness ### Affected Products **n/a - Easergy T300 (firmware 2.7 and older)** Affected versions: - Easergy T300 (firmware 2.7 and older) (Status: affected) ### References 1. [](https://www.se.com/ww/en/download/document/SEVD-2020-315-06/) 2. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36206, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36206 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36206 - **State**: PUBLISHED - **Published Date**: January 22, 2021 at 09:06 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: January 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and Sync bounds, a data race and memory corruption can occur. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2020-0098.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24561 - **State**: PUBLISHED - **Published Date**: February 14, 2023 at 10:36 UTC - **Last Updated**: March 20, 2025 at 19:49 UTC - **Reserved Date**: January 26, 2023 at 14:06 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-824: Security Weakness ### Affected Products **Siemens - Solid Edge SE2022** Affected versions: - All versions < V222.0MP12 (Status: affected) **Siemens - Solid Edge SE2023** Affected versions: - All versions < V223.0Update2 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21299 - **State**: PUBLISHED - **Published Date**: October 30, 2023 at 16:56 UTC - **Last Updated**: October 11, 2024 at 18:08 UTC - **Reserved Date**: November 03, 2022 at 22:37 UTC - **Assigned By**: google_android ### Vulnerability Description In Package Manager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 14 (Status: affected) ### References 1. [](https://source.android.com/docs/security/bulletin/android-14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0427 - **State**: PUBLISHED - **Published Date**: January 19, 2011 at 11:00 UTC - **Last Updated**: August 06, 2024 at 21:51 UTC - **Reserved Date**: January 12, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)](http://archives.seul.org/or/announce/Jan-2011/msg00000.html) 2. [ADV-2011-0131](http://www.vupen.com/english/advisories/2011/0131) 3. [](https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog) 4. [42907](http://secunia.com/advisories/42907) 5. [](http://blog.torproject.org/blog/tor-02129-released-security-patches) 6. [1024980](http://www.securitytracker.com/id?1024980) 7. [tor-unspec-bo(64748)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64748) 8. [ADV-2011-0132](http://www.vupen.com/english/advisories/2011/0132) 9. [DSA-2148](http://www.debian.org/security/2011/dsa-2148) 10. [42905](http://secunia.com/advisories/42905) 11. [45832](http://www.securityfocus.com/bid/45832)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2974 - **State**: PUBLISHED - **Published Date**: July 04, 2023 at 13:24 UTC - **Last Updated**: August 02, 2024 at 06:41 UTC - **Reserved Date**: May 30, 2023 at 10:06 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in quarkus-core. This vulnerability occurs because the TLS protocol configured with quarkus.http.ssl.protocols is not enforced, and the client can force the selection of the weaker supported TLS protocol. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-757: Security Weakness ### Affected Products **Red Hat - Red Hat build of Quarkus 2.13.8.Final** Affected versions: - 2.13.8.Final-redhat-00004 (Status: unaffected) **Red Hat - Red Hat build of Quarkus 2.13.8.Final** Affected versions: - 2.13.8.Final-redhat-00004 (Status: unaffected) ### References 1. [RHSA-2023:3809](https://access.redhat.com/errata/RHSA-2023:3809) 2. [](https://access.redhat.com/security/cve/CVE-2023-2974) 3. [RHBZ#2211026](https://bugzilla.redhat.com/show_bug.cgi?id=2211026) ### Credits - This issue was discovered by Alexander Schwartz (Red Hat).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6856 - **State**: PUBLISHED - **Published Date**: October 02, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The AHRAH (aka com.vet2pet.aid219426) application 219426 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#777769](http://www.kb.cert.org/vuls/id/777769) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1000022, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1000022 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1000022 - **State**: PUBLISHED - **Published Date**: February 04, 2019 at 21:00 UTC - **Last Updated**: August 05, 2024 at 03:00 UTC - **Reserved Date**: January 19, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Taoensso Sente version Prior to version 1.14.0 contains a Cross Site Request Forgery (CSRF) vulnerability in WebSocket handshake endpoint that can result in CSRF attack, possible leak of anti-CSRF token. This attack appears to be exploitable via malicious request against WebSocket handshake endpoint. This vulnerability appears to have been fixed in 1.14.0 and later. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ptaoussanis/sente/issues/137)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40721 - **State**: PUBLISHED - **Published Date**: October 03, 2022 at 14:53 UTC - **Last Updated**: August 03, 2024 at 12:21 UTC - **Reserved Date**: September 14, 2022 at 00:00 UTC - **Assigned By**: larry_cashdollar ### Vulnerability Description Arbitrary file upload vulnerability in php uploader ### Affected Products **n/a - CreativeDream file uploader** Affected versions: - v0.3 (Status: affected) ### References 1. [](https://github.com/CreativeDream/php-uploader/issues/23%2C) 2. [](http://www.vapidlabs.com/advisory.php?v=216) 3. [[oss-security] 20221003 CreativeDream software arbitrary file upload](http://www.openwall.com/lists/oss-security/2022/10/03/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25510, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25510 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25510 - **State**: PUBLISHED - **Published Date**: May 07, 2024 at 00:00 UTC - **Last Updated**: August 01, 2024 at 23:44 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /AddressBook/address_public_show.aspx. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2017 - **State**: PUBLISHED - **Published Date**: May 10, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Turbo Traffic Trader C (TTT-C) 1.0 allow remote attackers to inject arbitrary HTML or web script, as demonstrated via (1) the link parameter to ttt-out, (2) the X-Forwarded-For header in a GET request to ttt-in, (3) the Referer header in a GET request to ttt-in, or the (4) site name or (5) site URL fields in the main control panel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10359](http://www.securityfocus.com/bid/10359) 2. [11623](http://secunia.com/advisories/11623) 3. [20040517 Multiple TTT-C XSS vulnerabilities](http://marc.info/?l=bugtraq&m=108481571131866&w=2) 4. [6340](http://www.osvdb.org/6340) 5. [6341](http://www.osvdb.org/6341) 6. [6342](http://www.osvdb.org/6342) 7. [turbotraffictraderc-multiple-xss(16164)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16164) 8. [6344](http://www.osvdb.org/6344) 9. [6339](http://www.osvdb.org/6339) 10. [](http://www.icefire.org/security/ttt-bugreport.txt) 11. [6343](http://www.osvdb.org/6343)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39598, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39598 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39598 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 12:44 UTC - **Last Updated**: April 16, 2025 at 14:32 UTC - **Reserved Date**: April 16, 2025 at 06:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Path Traversal vulnerability in Quý Lê 91 Administrator Z allows Path Traversal. This issue affects Administrator Z: from n/a through 2025.03.28. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-35: Security Weakness ### Affected Products **Quý Lê 91 - Administrator Z** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-2025-03-28-directory-traversal-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58020 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 02:18 UTC - **Last Updated**: May 04, 2025 at 13:01 UTC - **Reserved Date**: February 27, 2025 at 02:10 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Add NULL check in mt_input_configured devm_kasprintf() can return a NULL pointer on failure,but this returned value in mt_input_configured() is not checked. Add NULL check in mt_input_configured(), to handle kernel NULL pointer dereference error. ### Affected Products **Linux - Linux** Affected versions: - df7ca43fe090e1a56c216c8ebc106ef5fd49afc6 (Status: affected) - 15ec7cb55e7d88755aa01d44a7a1015a42bfce86 (Status: affected) - dde88ab4e45beb60b217026207aa9c14c88d71ab (Status: affected) - 2763732ec1e68910719c75b6b896e11b6d3d622b (Status: affected) - 4794394635293a3e74591351fff469cea7ad15a2 (Status: affected) - 4794394635293a3e74591351fff469cea7ad15a2 (Status: affected) - 4794394635293a3e74591351fff469cea7ad15a2 (Status: affected) - 4794394635293a3e74591351fff469cea7ad15a2 (Status: affected) - ac0d389402a6ff9ad92cea02c2d8c711483b91ab (Status: affected) - 39c70c19456e50dcb3abfe53539220dff0490f1d (Status: affected) - 1d7833db9fd118415dace2ca157bfa603dec9c8c (Status: affected) - b70ac7849248ec8128fa12f86e3655ba38838f29 (Status: affected) **Linux - Linux** Affected versions: - 6.6 (Status: affected) - 0 (Status: unaffected) - 5.4.291 (Status: unaffected) - 5.10.235 (Status: unaffected) - 5.15.179 (Status: unaffected) - 6.1.129 (Status: unaffected) - 6.6.79 (Status: unaffected) - 6.12.16 (Status: unaffected) - 6.13.4 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a04d96ef67a42165f93194eef22a270acba4b74c) 2. [](https://git.kernel.org/stable/c/a6bfd3856e9f3da083f177753c623d58ba935e0a) 3. [](https://git.kernel.org/stable/c/2052b44cd0a62b6fdbe3371e5ba6029c56c400ca) 4. [](https://git.kernel.org/stable/c/4e7113f591163d99adc7cbcd7295030c8c5d3fc7) 5. [](https://git.kernel.org/stable/c/62f8bf06262b6fc55c58f4c5256140f1382f3b01) 6. [](https://git.kernel.org/stable/c/aa879ef6d3acf96fa2c7122d0632061d4ea58d48) 7. [](https://git.kernel.org/stable/c/97c09cc2e72769edb6994b531edcfa313b96bade) 8. [](https://git.kernel.org/stable/c/9b8e2220d3a052a690b1d1b23019673e612494c5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0949, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0949 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0949 - **State**: PUBLISHED - **Published Date**: February 22, 2023 at 00:00 UTC - **Last Updated**: March 12, 2025 at 14:56 UTC - **Reserved Date**: February 22, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.5. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **modoboa - modoboa/modoboa** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19) 2. [](https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9571 - **State**: PUBLISHED - **Published Date**: December 07, 2018 at 23:00 UTC - **Last Updated**: August 05, 2024 at 07:24 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In impd_parse_loud_eq_instructions of impd_drc_dynamic_payload.c there is a possible out-of-bound write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116020594. ### Affected Products **Google Inc. - Android** Affected versions: - Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-11-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9000 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:09 UTC - **Last Updated**: March 20, 2025 at 18:55 UTC - **Reserved Date**: September 19, 2024 at 14:18 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additionally, the endpoint does not validate the uniqueness of the slug field when creating a new checklist, allowing an attacker to spoof existing checklists by reusing the slug of an already-existing checklist. This can lead to significant data integrity issues, as legitimate checklists can be replaced with malicious or altered data. ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **lunary-ai - lunary-ai/lunary** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/f5fca549-0a4a-4f64-8ccf-d4e108856da4) 2. [](https://github.com/lunary-ai/lunary/commit/a02861ef9bb6ce860a35f7b8f178d58859cd85f0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2282, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2282 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2282 - **State**: PUBLISHED - **Published Date**: June 14, 2010 at 19:00 UTC - **Last Updated**: September 16, 2024 at 20:43 UTC - **Reserved Date**: June 14, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in TomatoCMS 2.0.6 allows remote attackers to hijack the authentication of administrators for requests that change the administrative password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39680](http://secunia.com/advisories/39680) 2. [](http://holisticinfosec.org/content/view/148/45/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41898 - **State**: PUBLISHED - **Published Date**: October 19, 2023 at 22:08 UTC - **Last Updated**: September 12, 2024 at 15:12 UTC - **Reserved Date**: September 04, 2023 at 16:31 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Home assistant is an open source home automation. The Home Assistant Companion for Android app up to version 2023.8.2 is vulnerable to arbitrary URL loading in a WebView. This enables all sorts of attacks, including arbitrary JavaScript execution, limited native code execution, and credential theft. This issue has been patched in version 2023.9.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-142`. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-345: Security Weakness - CWE-94: Code Injection ### Affected Products **home-assistant - core** Affected versions: - < 2023.9.2 (Status: affected) ### References 1. [https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg](https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9473 - **State**: PUBLISHED - **Published Date**: January 08, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 13:47 UTC - **Reserved Date**: January 03, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unrestricted file upload vulnerability in lib_nonajax.php in the CformsII plugin 14.7 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the cf_uploadfile2[] parameter, then accessing the file via a direct request to the file in the default upload directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/cforms2/changelog/) 2. [20141229 Remote Code Execution via Unauthorised File upload in Cforms 14.7](http://www.securityfocus.com/archive/1/534349/30/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34648, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34648 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34648 - **State**: PUBLISHED - **Published Date**: June 29, 2023 at 00:00 UTC - **Last Updated**: November 26, 2024 at 17:14 UTC - **Reserved Date**: June 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross Site Scripting vulnerability in PHPgurukl User Registration Login and User Management System with admin panel v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the signup.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34648)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47497 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 08:19 UTC - **Last Updated**: May 04, 2025 at 07:12 UTC - **Reserved Date**: May 22, 2024 at 06:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells If a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic *p &= GENMASK((cell->nbits%BITS_PER_BYTE) - 1, 0); will become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we subtract one from that making a large number that is then shifted more than the number of bits that fit into an unsigned long. UBSAN reports this problem: UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8 shift exponent 64 is too large for 64-bit type 'unsigned long' CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9 Hardware name: Google Lazor (rev3+) with KB Backlight (DT) Workqueue: events_unbound deferred_probe_work_func Call trace: dump_backtrace+0x0/0x170 show_stack+0x24/0x30 dump_stack_lvl+0x64/0x7c dump_stack+0x18/0x38 ubsan_epilogue+0x10/0x54 __ubsan_handle_shift_out_of_bounds+0x180/0x194 __nvmem_cell_read+0x1ec/0x21c nvmem_cell_read+0x58/0x94 nvmem_cell_read_variable_common+0x4c/0xb0 nvmem_cell_read_variable_le_u32+0x40/0x100 a6xx_gpu_init+0x170/0x2f4 adreno_bind+0x174/0x284 component_bind_all+0xf0/0x264 msm_drm_bind+0x1d8/0x7a0 try_to_bring_up_master+0x164/0x1ac __component_add+0xbc/0x13c component_add+0x20/0x2c dp_display_probe+0x340/0x384 platform_probe+0xc0/0x100 really_probe+0x110/0x304 __driver_probe_device+0xb8/0x120 driver_probe_device+0x4c/0xfc __device_attach_driver+0xb0/0x128 bus_for_each_drv+0x90/0xdc __device_attach+0xc8/0x174 device_initial_probe+0x20/0x2c bus_probe_device+0x40/0xa4 deferred_probe_work_func+0x7c/0xb8 process_one_work+0x128/0x21c process_scheduled_works+0x40/0x54 worker_thread+0x1ec/0x2a8 kthread+0x138/0x158 ret_from_fork+0x10/0x20 Fix it by making sure there are any bits to mask out. ### Affected Products **Linux - Linux** Affected versions: - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) - 69aba7948cbe53f2f1827e84e9dd0ae470a5072e (Status: affected) **Linux - Linux** Affected versions: - 4.3 (Status: affected) - 0 (Status: unaffected) - 4.4.290 (Status: unaffected) - 4.9.288 (Status: unaffected) - 4.14.252 (Status: unaffected) - 4.19.213 (Status: unaffected) - 5.4.155 (Status: unaffected) - 5.10.75 (Status: unaffected) - 5.14.14 (Status: unaffected) - 5.15 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97) 2. [](https://git.kernel.org/stable/c/60df06bbdf497e37ed25ad40572c362e5b0998df) 3. [](https://git.kernel.org/stable/c/2df6c023050205c4d04ffc121bc549f65cb8d1df) 4. [](https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca) 5. [](https://git.kernel.org/stable/c/0594f1d048d8dc338eb9a240021b1d00ae1eb082) 6. [](https://git.kernel.org/stable/c/57e48886401b14cd351423fabfec2cfd18df4f66) 7. [](https://git.kernel.org/stable/c/0e822e5413da1af28cca350cb1cb42b6133bdcae) 8. [](https://git.kernel.org/stable/c/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28908, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28908 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28908 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 17:00 UTC - **Last Updated**: May 03, 2025 at 00:39 UTC - **Reserved Date**: March 13, 2024 at 01:26 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Microsoft SQL Server 2019 (CU 25)** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2022 for (CU 12)** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2019 (GDR)** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2022 (GDR)** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft OLE DB Driver 19 for SQL Server** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft OLE DB Driver 18 for SQL Server** Affected versions: - 18.0.0 (Status: affected) ### References 1. [Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28908)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49378 - **State**: PUBLISHED - **Published Date**: December 05, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 21:53 UTC - **Reserved Date**: November 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/form/save. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11364 - **State**: PUBLISHED - **Published Date**: May 22, 2018 at 04:00 UTC - **Last Updated**: August 05, 2024 at 08:10 UTC - **Reserved Date**: May 21, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description sav_parse_machine_integer_info_record in spss/readstat_sav_read.c in libreadstat.a in ReadStat 0.1.1 has a memory leak related to an iconv_open call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ChijinZ/security_advisories/tree/master/ReadStat-7bced5b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2115, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2115 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2115 - **State**: PUBLISHED - **Published Date**: May 08, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 08:49 UTC - **Reserved Date**: May 08, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in editor.php in ScriptsEZ.net Power Editor 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) te and (2) dir parameters in a tempedit action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29063](http://www.securityfocus.com/bid/29063) 2. [5549](https://www.exploit-db.com/exploits/5549) 3. [20080506 Power Editor LOCAL FILE INCLUSION Vulnerbility](http://www.securityfocus.com/archive/1/491702/100/0/threaded) 4. [3864](http://securityreason.com/securityalert/3864) 5. [powereditor-editor-xss(42223)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42223)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7109 - **State**: PUBLISHED - **Published Date**: January 22, 2020 at 16:08 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 16, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Elementor Page Builder plugin before 2.8.4 for WordPress does not sanitize data during creation of a new template. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/elementor/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2069, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2069 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2069 - **State**: PUBLISHED - **Published Date**: January 20, 2021 at 14:50 UTC - **Last Updated**: September 26, 2024 at 18:21 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). Supported versions that are affected are 8.5.4 and 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L). ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L` ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.4 (Status: affected) - 8.5.5 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5857 - **State**: PUBLISHED - **Published Date**: December 19, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 15:47 UTC - **Reserved Date**: November 06, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Quick Look in Apple Mac OS X 10.5.1 does not prevent a movie from accessing URLs when the movie file is previewed or if an icon is created, which might allow remote attackers to obtain sensitive information via HREFTrack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-4238](http://www.vupen.com/english/advisories/2007/4238) 2. [TA07-352A](http://www.us-cert.gov/cas/techalerts/TA07-352A.html) 3. [28136](http://secunia.com/advisories/28136) 4. [26910](http://www.securityfocus.com/bid/26910) 5. [1019106](http://securitytracker.com/id?1019106) 6. [APPLE-SA-2007-12-17](http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html) 7. [](http://docs.info.apple.com/article.html?artnum=307179) 8. [macos-quicklook-unauthorized-access(39106)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39106)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4969 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 05:18 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **n/a - Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-09.html) 2. [1040920](http://www.securitytracker.com/id/1040920) 3. [104175](http://www.securityfocus.com/bid/104175)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0937 - **State**: PUBLISHED - **Published Date**: February 28, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:56 UTC - **Reserved Date**: February 28, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description U.N.U. Mailgust 1.9 allows remote attackers to obtain sensitive information via a direct request to index.php with method=showfullcsv, which reveals the POP3 server configuration, including account name and password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://nsag.ru/vuln/890.html) 2. [18998](http://secunia.com/advisories/18998) 3. [mailgust-index-info-disclosure(24890)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24890)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1809 - **State**: PUBLISHED - **Published Date**: May 15, 2019 at 22:15 UTC - **Last Updated**: November 20, 2024 at 17:19 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image. ### Weakness Classification (CWE) - CWE-347: Security Weakness ### Affected Products **Cisco - Cisco NX-OS Software** Affected versions: - unspecified (Status: affected) ### References 1. [20190515 Cisco NX-OS Software Patch Signature Verification Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-psvb) 2. [108375](http://www.securityfocus.com/bid/108375)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1016 - **State**: REJECTED - **Last Updated**: February 22, 2023 at 00:00 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5134 - **State**: PUBLISHED - **Published Date**: October 12, 2020 at 10:40 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: December 31, 2019 at 00:00 UTC - **Assigned By**: sonicwall ### Vulnerability Description A vulnerability in SonicOS allows an authenticated attacker to cause out-of-bound invalid file reference leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **SonicWall - SonicOS** Affected versions: - SonicOS 6.5.1.11-4n and earlier (Status: affected) - SonicOS 6.0.5.3-93o and earlier (Status: affected) - SonicOSv 6.5.4.4-44v-21-794 and earlier (Status: affected) - SonicOS 7.0.0.0-1 (Status: affected) ### References 1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0128 - **State**: PUBLISHED - **Published Date**: January 23, 2008 at 01:00 UTC - **Last Updated**: August 07, 2024 at 07:32 UTC - **Reserved Date**: January 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2008:0630](http://rhn.redhat.com/errata/RHSA-2008-0630.html) 2. [27365](http://www.securityfocus.com/bid/27365) 3. [](http://security-tracker.debian.net/tracker/CVE-2008-0128) 4. [31493](http://secunia.com/advisories/31493) 5. [29242](http://secunia.com/advisories/29242) 6. [20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)](http://www.securityfocus.com/archive/1/500412/100/0/threaded) 7. [SUSE-SR:2008:005](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html) 8. [](http://issues.apache.org/bugzilla/show_bug.cgi?id=41217) 9. [33668](http://secunia.com/advisories/33668) 10. [20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500396/100/0/threaded) 11. [28549](http://secunia.com/advisories/28549) 12. [apache-singlesignon-information-disclosure(39804)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39804) 13. [ADV-2008-0192](http://www.vupen.com/english/advisories/2008/0192) 14. [ADV-2009-0233](http://www.vupen.com/english/advisories/2009/0233) 15. [DSA-1468](http://www.debian.org/security/2008/dsa-1468) 16. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html) 17. [28552](http://secunia.com/advisories/28552) 18. [](http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx) 19. [](http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540) 20. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E) 21. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E) 22. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4176 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:17 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4177. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2016:1826](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html) 2. [openSUSE-SU-2016:1802](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html) 3. [](https://helpx.adobe.com/security/products/flash-player/apsb16-25.html) 4. [RHSA-2016:1423](https://access.redhat.com/errata/RHSA-2016:1423) 5. [40105](https://www.exploit-db.com/exploits/40105/) 6. [91721](http://www.securityfocus.com/bid/91721) 7. [MS16-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093) 8. [1036280](http://www.securitytracker.com/id/1036280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0054 - **State**: PUBLISHED - **Published Date**: June 09, 2021 at 19:07 UTC - **Last Updated**: August 03, 2024 at 15:25 UTC - **Reserved Date**: October 22, 2020 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. ### Affected Products **n/a - Intel(R) NUCs** Affected versions: - See references (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-5048, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-5048 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-5048 - **State**: PUBLISHED - **Published Date**: November 06, 2019 at 18:35 UTC - **Last Updated**: August 07, 2024 at 07:24 UTC - **Reserved Date**: January 14, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cookie Dump Servlet stored XSS vulnerability in jetty though 6.1.20. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt) 2. [](https://security-tracker.debian.org/tracker/CVE-2009-5048) 3. [[oss-security] 20110114 Re: CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3](https://www.openwall.com/lists/oss-security/2011/01/14/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35639 - **State**: PUBLISHED - **Published Date**: June 03, 2024 at 08:22 UTC - **Last Updated**: August 02, 2024 at 03:14 UTC - **Reserved Date**: May 17, 2024 at 10:07 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webliberty Simple Spoiler allows Stored XSS.This issue affects Simple Spoiler: from n/a through 1.2. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Webliberty - Simple Spoiler** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/simple-spoiler/wordpress-simple-spoiler-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Cronus (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40352 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 12:20 UTC - **Last Updated**: August 04, 2024 at 02:44 UTC - **Reserved Date**: August 31, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.open-emr.org/wiki/index.php/Securing_OpenEMR) 2. [](https://github.com/allenenosh/CVE-2021-40352) 3. [](http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6954 - **State**: PUBLISHED - **Published Date**: February 13, 2018 at 20:00 UTC - **Last Updated**: June 09, 2025 at 15:54 UTC - **Reserved Date**: February 13, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3816-2](https://usn.ubuntu.com/3816-2/) 2. [](https://github.com/systemd/systemd/issues/7986) 3. [USN-3816-1](https://usn.ubuntu.com/3816-1/) 4. [openSUSE-SU-2019:1450](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html) 5. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E) 6. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3834 - **State**: PUBLISHED - **Published Date**: October 03, 2019 at 13:31 UTC - **Last Updated**: August 04, 2024 at 19:19 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description It was found that the fix for CVE-2014-0114 had been reverted in JBoss Operations Network 3 (JON). This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. Exploits that have been published rely on ClassLoader properties that are exposed such as those in JON 3. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/869353. Note that while multiple products released patches for the original CVE-2014-0114 flaw, the reversion described by this CVE-2019-3834 flaw only occurred in JON 3. ### Weakness Classification (CWE) - CWE-470: Security Weakness ### Affected Products **RedHat - struts** Affected versions: - all versions under 1.3.10_1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3834)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36675 - **State**: PUBLISHED - **Published Date**: June 26, 2023 at 00:00 UTC - **Last Updated**: December 05, 2024 at 15:25 UTC - **Reserved Date**: June 26, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, and 1.39.x before 1.39.4. BlockLogFormatter.php in BlockLogFormatter allows XSS in the partial blocks feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://phabricator.wikimedia.org/T332889) 2. [](https://www.mediawiki.org/wiki/Release_notes/1.40#Other_changes_in_1.40) 3. [DSA-5447](https://www.debian.org/security/2023/dsa-5447) 4. [FEDORA-2023-1fcaba0998](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOAXEGYBOEM4JWB4J3BDH73NK2LCYC3O/) 5. [FEDORA-2023-d8ae3c122e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UIVGYECQGTUC2LLPVCZBPDLCTOHL2F6/) 6. [FEDORA-2023-7e9d6015f6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CHRX6DSLAMVXCV2YMJEWOLTBEYSESE5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1283, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1283 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1283 - **State**: PUBLISHED - **Published Date**: November 16, 2005 at 07:37 UTC - **Last Updated**: September 17, 2024 at 00:46 UTC - **Reserved Date**: November 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description KaZaA Media Desktop (KMD) 2.0 launches advertisements in the Internet Explorer (IE) local security zone, which could allow remote attackers to view local files and possibly execute arbitrary code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [kazaa-ad-local-zone(11031)](http://www.iss.net/security_center/static/11031.php) 2. [20030107 KaZaA - Bad Zone](http://archives.neohapsis.com/archives/bugtraq/2003-01/0056.html) 3. [6543](http://www.securityfocus.com/bid/6543)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13359 - **State**: PUBLISHED - **Published Date**: November 27, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 09:00 UTC - **Reserved Date**: July 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting in usertable.php in TerraMaster TOS version 3.1.03 allows attackers to execute JavaScript via the "modgroup" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3215, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3215 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3215 - **State**: PUBLISHED - **Published Date**: January 29, 2020 at 17:21 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 20, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description vtiger CRM 5.4.0 and earlier contain an Authentication Bypass Vulnerability due to improper authentication validation in the validateSession function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [61559](http://www.securityfocus.com/bid/61559) 2. [86163](https://exchange.xforce.ibmcloud.com/vulnerabilities/86163)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2726, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2726 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2726 - **State**: PUBLISHED - **Published Date**: May 24, 2019 at 16:24 UTC - **Last Updated**: October 01, 2024 at 16:47 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Services Integration). The supported version that is affected is 12.3.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Enterprise Manager Ops Center. While the vulnerability is in Enterprise Manager Ops Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Enterprise Manager Ops Center. CVSS 3.0 Base Score 6.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - Enterprise Manager Ops Center** Affected versions: - 12.3.3 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7337 - **State**: PUBLISHED - **Published Date**: August 01, 2024 at 03:00 UTC - **Last Updated**: August 01, 2024 at 20:39 UTC - **Reserved Date**: July 31, 2024 at 12:30 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. Affected by this issue is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273260. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **TOTOLINK - EX1200L** Affected versions: - 9.3.5u.6146_B20201023 (Status: affected) ### References 1. [VDB-273260 | TOTOLINK EX1200L cstecgi.cgi loginauth buffer overflow](https://vuldb.com/?id.273260) 2. [VDB-273260 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.273260) 3. [Submit #379315 | TOTOLINK EX1200L_Firmware V9.3.5u.6146_B20201023 buffer overflow](https://vuldb.com/?submit.379315) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX1200/loginauth.md) ### Credits - yhryhryhr_tu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3618 - **State**: PUBLISHED - **Published Date**: July 14, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 18:39 UTC - **Reserved Date**: July 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in pblguestbook.php in Pixelated By Lev (PBL) Guestbook 1.32 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) name, (2) email, (3) website, (4) comments, (5) rate, and (6) private parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [pblguestbook-pblguestbook-sql-injection(27624)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27624) 2. [20060707 PBL Guestbook <= 1.32 XSS & SQL Querys Vulnerabilities](http://www.securityfocus.com/archive/1/439486/100/0/threaded) 3. [](http://www.neosecurityteam.net/index.php?action=advisories&id=23)