System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0168
- **State**: PUBLISHED
- **Published Date**: April 01, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: March 27, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Apple QuickTime Player 5.x and 6.0 for Windows allows remote attackers to execute arbitrary code via a long QuickTime URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10561](http://www.osvdb.org/10561)
2. [](http://www.idefense.com/advisory/03.31.03.txt)
3. [20030401 Fwd: QuickTime 6.1 for Windows is available](http://www.securityfocus.com/archive/1/317141/30/25220/threaded)
4. [](http://lists.apple.com/mhonarc/security-announce/msg00027.html)
5. [20030401 iDEFENSE Security Advisory 03.31.03: Buffer Overflow in Windows QuickTime Player](http://www.securityfocus.com/archive/1/317148/30/25220/threaded)
6. [VU#112553](http://www.kb.cert.org/vuls/id/112553)
7. [7247](http://www.securityfocus.com/bid/7247)
8. [APPLE-SA-2003-03-31](http://www.securityfocus.com/archive/1/317141/30/25220/threaded)
9. [20030331 iDEFENSE Security Advisory 03.31.03: Buffer Overflow in Windows QuickTime Player](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0166.html)
10. [quicktime-url-bo(11671)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0565
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:22 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Marketing component in Oracle E-Business Suite 11.5.10.2, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034726](http://www.securitytracker.com/id/1034726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44741, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44741
- **State**: PUBLISHED
- **Published Date**: January 14, 2022 at 19:05 UTC
- **Last Updated**: September 16, 2024 at 17:59 UTC
- **Reserved Date**: December 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6914
- **State**: PUBLISHED
- **Published Date**: December 05, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 17:53 UTC
- **Reserved Date**: November 29, 2013 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in a calendar component in Cybozu Garoon before 3.7.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.cybozu.com/ja-jp/article/7037)
2. [](http://cs.cybozu.co.jp/information/20131202up01.php)
3. [JVNDB-2013-000113](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000113)
4. [JVN#23981867](http://jvn.jp/en/jp/JVN23981867/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2836
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 22, 2024 at 17:44 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Social Share, Social Login and Social Comments Plugin WordPress plugin before 7.13.64 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Social Share, Social Login and Social Comments Plugin **
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20492
- **State**: PUBLISHED
- **Published Date**: March 17, 2020 at 14:23 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: March 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 82.0.18 allows authentication bypass because of misparsing of the format of the password file (SEC-516).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/82+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53816
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 12:59 UTC
- **Last Updated**: December 09, 2024 at 18:37 UTC
- **Reserved Date**: November 22, 2024 at 13:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Themeum Tutor LMS Elementor Addons.This issue affects Tutor LMS Elementor Addons: from n/a through 2.1.5.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Themeum - Tutor LMS Elementor Addons**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/tutor-lms-elementor-addons/vulnerability/wordpress-tutor-lms-elementor-addons-plugin-2-1-5-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32266
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 16:28 UTC
- **Last Updated**: October 16, 2024 at 19:05 UTC
- **Reserved Date**: May 05, 2023 at 14:42 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Untrusted Search Path vulnerability in OpenText™ Application Lifecycle Management (ALM),Quality Center allows Code Inclusion. The vulnerability allows a user to archive a malicious DLLs on the system prior to the installation.
This issue affects Application Lifecycle Management (ALM),Quality Center: 15.00, 15.01, 15.01 P1, 15.01 P2, 15.01 P3, 15.01 P4, 15.01 P5, 15.51, 15.51 P1, 15.51 P2, 15.51 P3, 16.00, 16.01 P1.
### Weakness Classification (CWE)
- CWE-426: Security Weakness
### Affected Products
**OpenText™ - Application Lifecycle Management (ALM),Quality Center**
Affected versions:
- 15.00 (Status: affected)
- 15.01 (Status: affected)
- 15.01 P1 (Status: affected)
- 15.01 P2 (Status: affected)
- 15.01 P3 (Status: affected)
- 15.01 P4 (Status: affected)
- 15.01 P5 (Status: affected)
- 15.51 (Status: affected)
- 15.51 P1 (Status: affected)
- 15.51 P2 (Status: affected)
- 15.51 P3 (Status: affected)
- 16.00 (Status: affected)
- 16.01 P1 (Status: affected)
### References
1. [](https://portal.microfocus.com/s/article/KM000024386?language=en_US)
### Credits
- Vaibhav Srivastava (eSecForte Technologies Pvt. Ltd.) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18568
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 14:54 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: August 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The my-wp-translate plugin before 1.0.4 for WordPress has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/my-wp-translate/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8100
- **State**: PUBLISHED
- **Published Date**: November 10, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 08:13 UTC
- **Reserved Date**: November 09, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The net-snmp package in OpenBSD through 5.8 uses 0644 permissions for snmpd.conf, which allows local users to obtain sensitive community information by reading this file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20151110 CVE request: net-snmp OpenBSD package - insecure file permission vulnerability](http://www.openwall.com/lists/oss-security/2015/11/09/6)
2. [](http://packetstormsecurity.com/files/134323/OpenBSD-net-snmp-Information-Disclosure.html)
3. [1034099](http://www.securitytracker.com/id/1034099) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43084
- **State**: PUBLISHED
- **Published Date**: March 24, 2022 at 17:13 UTC
- **Last Updated**: August 04, 2024 at 03:47 UTC
- **Reserved Date**: November 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An SQL Injection vulnerability exists in Dreamer CMS 4.0.0 via the tableName parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/isoftforce/dreamer_cms/issues/I4F93V) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3382
- **State**: PUBLISHED
- **Published Date**: February 05, 2021 at 15:15 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: February 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/go-gitea/gitea/pull/14390) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15777
- **State**: REJECTED
- **Published Date**: February 25, 2019 at 23:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 23, 2018 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6506
- **State**: PUBLISHED
- **Published Date**: March 23, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 11:34 UTC
- **Reserved Date**: March 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.phpbb.com/community/viewtopic.php?f=14&t=1352565)
2. [33166](http://secunia.com/advisories/33166)
3. [32842](http://www.securityfocus.com/bid/32842)
4. [](http://www.phpbb.com/support/documents.php?mode=changelog&version=3#v303)
5. [[oss-security] 20090206 CVE request: phpbb < 3.0.4](http://www.openwall.com/lists/oss-security/2009/02/06/2)
6. [50806](http://www.osvdb.org/50806)
7. [phpbb-account-activation-security-bypass(47370)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47370) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16960
- **State**: PUBLISHED
- **Published Date**: December 09, 2020 at 23:36 UTC
- **Last Updated**: August 04, 2024 at 13:45 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Backup Engine Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16960) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-125100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-125100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-125100
- **State**: PUBLISHED
- **Published Date**: May 02, 2023 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 14:10 UTC
- **Reserved Date**: April 30, 2023 at 15:31 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in BestWebSoft Job Board Plugin 1.0.0 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is dbb71deee071422ce3e663fbcdce3ad24886f940. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227764.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**BestWebSoft - Job Board Plugin**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.227764)
2. [](https://vuldb.com/?ctiid.227764)
3. [](https://github.com/wp-plugins/job-board/commit/dbb71deee071422ce3e663fbcdce3ad24886f940)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7438
- **State**: PUBLISHED
- **Published Date**: March 02, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 22:45 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
NetIQ Privileged Account Manager before 3.1 Patch Update 3 allowed cross site scripting attacks via javascript DOM modification using the supplied cookie parameter.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NetIQ - Privileged Account Manager**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1001355)
2. [](https://www.netiq.com/documentation/privileged-account-manager-3/npam3103-release-notes/data/npam3103-release-notes.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3466
- **State**: PUBLISHED
- **Published Date**: November 04, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: September 29, 2009 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [shockwave-string-code-execution(54121)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54121)
2. [36905](http://www.securityfocus.com/bid/36905)
3. [](http://www.adobe.com/support/security/bulletins/apsb09-16.html)
4. [oval:org.mitre.oval:def:6395](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395)
5. [ADV-2009-3134](http://www.vupen.com/english/advisories/2009/3134)
6. [1023123](http://securitytracker.com/id?1023123) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2558
- **State**: PUBLISHED
- **Published Date**: April 12, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Escape interface in the Kernel Mode Driver layer in the NVIDIA GPU graphics driver R340 before 341.95 and R352 before 354.74 on Windows allows local users to obtain sensitive information, cause a denial of service (crash), or gain privileges via unspecified vectors related to an untrusted pointer, which trigger uninitialized or out-of-bounds memory access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4061)
2. [](https://support.lenovo.com/us/en/product_security/len_5551) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1849
- **State**: PUBLISHED
- **Published Date**: June 12, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 22, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Untrusted search path vulnerability in Microsoft Lync 2010, 2010 Attendee, and 2010 Attendant allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .ocsmeet file, aka "Lync Insecure Library Loading Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA12-164A](http://www.us-cert.gov/cas/techalerts/TA12-164A.html)
2. [oval:org.mitre.oval:def:14874](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14874)
3. [MS12-039](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33217
- **State**: PUBLISHED
- **Published Date**: April 23, 2024 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:46 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter in ip/goform/addressNat.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://palm-vertebra-fe9.notion.site/fromAddressNat_page-e9c05fb00f89482fa340d21bbda30642) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4929
- **State**: PUBLISHED
- **Published Date**: July 29, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 26, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54371](http://secunia.com/advisories/54371)
2. [openSUSE-SU-2013:1300](http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html)
3. [54425](http://secunia.com/advisories/54425)
4. [](http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html)
5. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=50450)
6. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450&r2=50449&pathrev=50450)
7. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
8. [oval:org.mitre.oval:def:17028](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17028)
9. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911)
10. [openSUSE-SU-2013:1295](http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html)
11. [54296](http://secunia.com/advisories/54296)
12. [](https://www.wireshark.org/security/wnpa-sec-2013-47.html)
13. [](http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52867
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:31 UTC
- **Last Updated**: May 04, 2025 at 07:44 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: possible buffer overflow
Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is
checked after access.
### Affected Products
**Linux - Linux**
Affected versions:
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
- 5cc4e5fc293bfe2634535f544427e8c6061492a5 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.13 (Status: affected)
- 0 (Status: unaffected)
- 4.14.330 (Status: unaffected)
- 4.19.299 (Status: unaffected)
- 5.4.261 (Status: unaffected)
- 5.10.201 (Status: unaffected)
- 5.15.139 (Status: unaffected)
- 6.1.63 (Status: unaffected)
- 6.5.12 (Status: unaffected)
- 6.6.2 (Status: unaffected)
- 6.7 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783)
2. [](https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f)
3. [](https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783)
4. [](https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896)
5. [](https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94)
6. [](https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58)
7. [](https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855)
8. [](https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45)
9. [](https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20593
- **State**: PUBLISHED
- **Published Date**: December 30, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: December 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Mini-XML (aka mxml) v2.12, there is stack-based buffer overflow in the scan_file function in mxmldoc.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ntu-sec/pocs/blob/master/mxml-53c75b0/crashes/so_mxmldoc.c:2987_1.txt.err)
2. [](https://github.com/ntu-sec/pocs/blob/master/mxml-53c75b0/crashes/so_mxmldoc.c:2971_1.txt.err)
3. [](https://github.com/michaelrsweet/mxml/issues/237)
4. [FEDORA-2019-d333d01e08](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N53IJHDYR5HVQLKH4J6B27OEQLGKSGY5/)
5. [FEDORA-2019-f99619e34d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNWF6BAU7S42O4LE4B74KIMHFE2HDNMI/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32367
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 17:20 UTC
- **Last Updated**: August 03, 2024 at 07:39 UTC
- **Reserved Date**: June 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/?page=inquiries/view_inquiry&id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/product-show-room-site/SQLi-12.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20400
- **State**: PUBLISHED
- **Published Date**: December 01, 2021 at 17:05 UTC
- **Last Updated**: September 16, 2024 at 22:36 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar SIEM 7.3 and 7.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196074.
### Affected Products
**IBM - QRadar SIEM**
Affected versions:
- 7.3 (Status: affected)
- 7.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6520488)
2. [ibm-qradar-cve202120400-info-disc (196074)](https://exchange.xforce.ibmcloud.com/vulnerabilities/196074) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5791
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.4.1 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. NOTE: the previous information is from the October 2013 CPU. Oracle has not commented on claims from a third party that the issue is a stack-based buffer overflow in the Microsoft Access 1.x parser in vsacs.dll before 8.4.0.108 and before 8.4.1.52, which allows attackers to execute arbitrary code via a long field (aka column) name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56241](http://secunia.com/advisories/56241)
2. [](http://www.citadelo.com/en/ms13-105-oracle-outside-in-mdb-parsing-vulnerability-cve-2013-5791/)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660640)
4. [VU#953241](http://www.kb.cert.org/vuls/id/953241)
5. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html)
6. [56243](http://secunia.com/advisories/56243)
7. [MS13-105](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-105)
8. [1029190](http://www.securitytracker.com/id/1029190)
9. [31222](http://www.exploit-db.com/exploits/31222)
10. [56237](http://secunia.com/advisories/56237)
11. [63076](http://www.securityfocus.com/bid/63076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9920
- **State**: PUBLISHED
- **Published Date**: March 14, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 14:02 UTC
- **Reserved Date**: February 27, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier allows attackers to create a malformed Windows binary that is considered non-executable and is not protected through the whitelisting protection feature via a specific set of circumstances.
### Affected Products
**Intel - McAfee Application Control (MAC)**
Affected versions:
- 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5109
- **State**: PUBLISHED
- **Published Date**: October 09, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: September 24, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The International Components for Unicode (ICU) functionality in Google Chrome before 22.0.1229.92 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a regular expression.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:15774](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15774)
2. [](http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html)
3. [](https://code.google.com/p/chromium/issues/detail?id=148692) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5504
- **State**: PUBLISHED
- **Published Date**: October 17, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 15:31 UTC
- **Reserved Date**: October 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+ and 10.1.0.5 unknown impact and remote attack vectors, related to (1) Import (DB01) and (2) Advanced Queuing (DB25). NOTE: as of 20071108, Oracle has not disputed reliable researcher claims that DB25 is for a buffer overflow in the DBLINK_INFO procedure in the DBMS_AQADM_SYS package.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html)
2. [ADV-2007-3524](http://www.vupen.com/english/advisories/2007/3524)
3. [ADV-2007-3626](http://www.vupen.com/english/advisories/2007/3626)
4. [TA07-290A](http://www.us-cert.gov/cas/techalerts/TA07-290A.html)
5. [SSRT061201](http://marc.info/?l=bugtraq&m=119332677525918&w=2)
6. [26235](http://www.securityfocus.com/bid/26235)
7. [20071029 Team SHATTER Alert: Oracle Database Buffer overflow vulnerability in procedure DBMS_AQADM_SYS.DBLINK_INFO](http://www.securityfocus.com/archive/1/482923/100/100/threaded)
8. [](http://www.appsecinc.com/resources/alerts/oracle/2007-08.shtml)
9. [HPSBMA02133](http://marc.info/?l=bugtraq&m=119332677525918&w=2)
10. [1018823](http://www.securitytracker.com/id?1018823)
11. [27409](http://secunia.com/advisories/27409)
12. [27251](http://secunia.com/advisories/27251) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50693
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 00:00 UTC
- **Last Updated**: March 04, 2025 at 21:13 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SunGrow iSolarCloud before the October 31, 2024 remediation is vulnerable to insecure direct object references (IDOR) via the userService API model.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://en.sungrowpower.com/security-notice-detail-2/6120) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0069
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 27, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0464
- **State**: PUBLISHED
- **Published Date**: January 27, 2006 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 19:00 UTC
- **Reserved Date**: January 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in index.php in IdeoContent Manager allow remote attackers to execute arbitrary SQL commands via the (1) goto_id or (2) mid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22714](http://www.osvdb.org/22714)
2. [](http://osvdb.org/ref/22/22712-ideocontent.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12020
- **State**: PUBLISHED
- **Published Date**: June 29, 2020 at 13:51 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 21, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13 and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 does not restrict non administrative users from gaining access to the operating system and editing the application startup script. Successful exploitation of this vulnerability may allow an attacker to alter the startup script as the limited-access user.
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**n/a - Baxter ExactaMix EM 2400 & EM 1200**
Affected versions:
- ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5 (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsma-20-170-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6407
- **State**: PUBLISHED
- **Published Date**: January 30, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: January 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to /hy-cgi/devices.cgi?cmd=searchlandevice. The crash completely freezes the device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000828
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 01:57 UTC
- **Reserved Date**: December 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FrostWire version <= frostwire-desktop-6.7.4-build-272 contains a XML External Entity (XXE) vulnerability in Man in the middle on update that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the middle the call to update the software.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://0dd.zone/2018/10/28/frostwire-XXE-MitM/)
2. [](https://github.com/frostwire/frostwire/issues/829) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3016
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 21:00 UTC
- **Last Updated**: March 31, 2025 at 21:19 UTC
- **Reserved Date**: March 31, 2025 at 05:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
- CWE-404: Security Weakness
### Affected Products
**Open Asset Import Library - Assimp**
Affected versions:
- 5.4.3 (Status: affected)
### References
1. [VDB-302068 | Open Asset Import Library Assimp MDL File MDLMaterialLoader.cpp ParseTextureColorData resource consumption](https://vuldb.com/?id.302068)
2. [VDB-302068 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.302068)
3. [Submit #524593 | Open Asset Import Library Assimp >=5.4.3 Uncontrolled Memory Allocation](https://vuldb.com/?submit.524593)
4. [](https://github.com/assimp/assimp/issues/6022)
5. [](https://github.com/assimp/assimp/pull/6046)
6. [](https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1)
### Credits
- d3ng03 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48192
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 14:18 UTC
- **Reserved Date**: December 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site Scripting vulnerability in Softing smartLink SW-HT before 1.30, which allows an attacker to execute a dynamic script (JavaScript, VBScript) in the context of the application.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-11.html)
2. [](https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-11.json) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2054
- **State**: PUBLISHED
- **Published Date**: July 09, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()](https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html)
2. [59837](http://www.securityfocus.com/bid/59837)
3. [](http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3567
- **State**: PUBLISHED
- **Published Date**: June 03, 2019 at 18:22 UTC
- **Last Updated**: August 04, 2024 at 19:12 UTC
- **Reserved Date**: January 02, 2019 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Facebook - osquery**
Affected versions:
- 3.4.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.facebook.com/security/advisories/cve-2019-3567) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2459
- **State**: PUBLISHED
- **Published Date**: May 19, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:51 UTC
- **Reserved Date**: May 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in messages.php in PHP-Fusion 6.00.307 and earlier allows remote authenticated users to execute arbitrary SQL commands via the srch_where parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phpfusion-srchwhere-sql-injection(26491)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26491)
2. [18009](http://www.securityfocus.com/bid/18009)
3. [922](http://securityreason.com/securityalert/922)
4. [20060516 PHP-Fusion <= 6.00.306 "srch_where" SQL injection / admin credentials disclosure](http://www.securityfocus.com/archive/1/434162/100/0/threaded)
5. [25542](http://www.osvdb.org/25542)
6. [20129](http://secunia.com/advisories/20129)
7. [](http://retrogod.altervista.org/phpfusion_600306_sql.html)
8. [1016111](http://securitytracker.com/id?1016111)
9. [ADV-2006-1839](http://www.vupen.com/english/advisories/2006/1839) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6176
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 00:44 UTC
- **Last Updated**: August 01, 2024 at 21:33 UTC
- **Reserved Date**: June 19, 2024 at 23:30 UTC
- **Assigned By**: LGE
### Vulnerability Description
Allocation of Resources Without Limits or Throttling vulnerability in LG Electronics LG SuperSign CMS allows Port Scanning.This issue affects LG SuperSign CMS: from 4.1.3 before < 4.3.1.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**LG Electronics - LG SuperSign CMS**
Affected versions:
- 4.1.3 (Status: affected)
### References
1. [](https://lgsecurity.lge.com/bulletins/idproducts#updateDetails) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1948
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 01:20 UTC
- **Reserved Date**: June 28, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in Gringotts 0.5.9 allows local users to execute arbitrary commands via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5488](http://www.securityfocus.com/bid/5488)
2. [gringotts-multiple-bo(9882)](http://www.iss.net/security_center/static/9882.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5337
- **State**: PUBLISHED
- **Published Date**: June 14, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 01:00 UTC
- **Reserved Date**: June 08, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3047-1](http://www.ubuntu.com/usn/USN-3047-1)
2. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=844864fbae66935951529408831c2f22367a57b6)
3. [91097](http://www.securityfocus.com/bid/91097)
4. [GLSA-201609-01](https://security.gentoo.org/glsa/201609-01)
5. [USN-3047-2](http://www.ubuntu.com/usn/USN-3047-2)
6. [[oss-security] 20160608 Re: CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info](http://www.openwall.com/lists/oss-security/2016/06/08/13)
7. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html)
8. [[qemu-devel] 20160607 [PULL 06/13] scsi: megasas: null terminate bios version buffer](https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01969.html)
9. [[oss-security] 20160608 CVE Request Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info](http://www.openwall.com/lists/oss-security/2016/06/08/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4209
- **State**: PUBLISHED
- **Published Date**: December 04, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: December 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in moziloCMS 1.11.1 allow remote attackers to inject arbitrary web script or HTML via the (1) cat and (2) file parameters in an editsite action, different vectors than CVE-2008-6127 and CVE-2009-1367.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20090603 [InterN0T] moziloCMS 1.11.1 - XSS Vulnerability](http://www.securityfocus.com/archive/1/504091/100/0/threaded)
2. [35212](http://www.securityfocus.com/bid/35212) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1215
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 21:16 UTC
- **Last Updated**: November 12, 2024 at 20:49 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1369
- **State**: PUBLISHED
- **Published Date**: March 18, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A certain incorrect Sun Solaris 10 image on SPARC Enterprise T5120 and T5220 servers has /etc/default/login and /etc/ssh/sshd_config files that configure root logins in a manner unintended by the vendor, which allows remote attackers to gain privileges via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0810](http://www.vupen.com/english/advisories/2008/0810/references)
2. [sparc-configuration-privilege-escalation(41332)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41332)
3. [29529](http://secunia.com/advisories/29529)
4. [231244](http://sunsolve.sun.com/search/document.do?assetkey=1-66-231244-1)
5. [1019708](http://www.securitytracker.com/id?1019708)
6. [28469](http://www.securityfocus.com/bid/28469) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4375
- **State**: PUBLISHED
- **Published Date**: July 28, 2020 at 12:05 UTC
- **Last Updated**: September 16, 2024 at 19:25 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MQ, IBM MQ Appliance, IBM MQ for HPE NonStop 8.0, 9.1 CD, and 9.1 LTS could allow an attacker to cause a denial of service due to a memory leak caused by an error creating a dynamic queue. IBM X-Force ID: 179080.
### Affected Products
**IBM - MQ Appliance**
Affected versions:
- 8.0 (Status: affected)
- 9.1.LTS (Status: affected)
- 9.1.CD (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6252785)
2. [ibm-mq-cve20204375-dos (179080)](https://exchange.xforce.ibmcloud.com/vulnerabilities/179080) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20538
- **State**: PUBLISHED
- **Published Date**: March 24, 2020 at 17:48 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: March 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with P(9.0) software. There is a heap overflow in the knox_kap driver. The Samsung ID is SVE-2019-14857 (November 2019).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34478
- **State**: PUBLISHED
- **Published Date**: May 05, 2024 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:03 UTC
- **Reserved Date**: May 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
btcd before 0.24.0 does not correctly implement the consensus rules outlined in BIP 68 and BIP 112, making it susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455)
2. [](https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/blockchain/chain.go#L383C1-L392C3)
3. [](https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/txscript/opcode.go#L1172C1-L1178C3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41113
- **State**: PUBLISHED
- **Published Date**: October 05, 2021 at 17:20 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the new TYPO3 v11 feature that allows users to create and share deep links in the backend user interface is vulnerable to cross-site-request-forgery. The impact is the same as described in TYPO3-CORE-SA-2020-006 (CVE-2020-11069). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system. To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time. The following Same-Site cookie settings in $GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite] are required for an attack to be successful: SameSite=strict: malicious evil.example.org invoking TYPO3 application at good.example.org and SameSite=lax or none: malicious evil.com invoking TYPO3 application at example.org. Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**TYPO3 - typo3**
Affected versions:
- >= 11.2.0, < 11.5.0 (Status: affected)
### References
1. [](https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw)
2. [](https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f)
3. [](https://typo3.org/security/advisory/typo3-core-sa-2020-006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37434
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 18:08 UTC
- **Last Updated**: October 04, 2024 at 15:56 UTC
- **Reserved Date**: July 05, 2023 at 17:36 UTC
- **Assigned By**: hpe
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Hewlett Packard Enterprise (HPE) - EdgeConnect SD-WAN Orchestrator**
Affected versions:
- Orchestrator 9.3.x (Status: affected)
- Orchestrator 9.2.x (Status: affected)
- Orchestrator 9.1.x (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt)
### Credits
- Daniel Jensen (@dozernz) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31380
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 11:41 UTC
- **Last Updated**: August 26, 2024 at 08:09 UTC
- **Reserved Date**: April 01, 2024 at 06:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Soflyy Oxygen Builder allows Code Injection. Vendor is ignoring report, refuses to patch the issue.This issue affects Oxygen Builder: from n/a through 4.9.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Soflyy - Oxygen Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/oxygen/wordpress-oxygen-plugin-4-8-1-auth-remote-code-execution-rce-vulnerability?_s_id=cve)
2. [](https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1)
### Credits
- Snicco (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4491
- **State**: PUBLISHED
- **Published Date**: October 08, 2008 at 17:02 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apple Mail.app 3.5 on Mac OS X, when "Store draft messages on the server" is enabled, stores draft copies of S/MIME email in plaintext on the email server, which allows server owners and remote man-in-the-middle attackers to read sensitive mail.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [apple-mail-smime-information-disclosure(45688)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45688)
2. [](http://resources.enablesecurity.com/advisories/apple-mailapp-smime.txt)
3. [31598](http://www.securityfocus.com/bid/31598)
4. [20081006 [ENABLESECURITY] Apple's Mail.app stores your S/MIME encrypted emails in clear text](http://www.securityfocus.com/archive/1/497057/100/0/threaded)
5. [](http://enablesecurity.com/2008/10/03/apple-mailapp-security-advisory/)
6. [4363](http://securityreason.com/securityalert/4363)
7. [1021019](http://www.securitytracker.com/id?1021019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25353
- **State**: PUBLISHED
- **Published Date**: August 20, 2021 at 18:10 UTC
- **Last Updated**: August 04, 2024 at 15:33 UTC
- **Reserved Date**: September 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://stark0de.com/2020/08/27/pwning-rconfig-part-one.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16959
- **State**: PUBLISHED
- **Published Date**: December 21, 2020 at 15:13 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SolarWinds Web Help Desk 12.7.0 allows CSV Injection, also known as Formula Injection, via a file attached to a ticket.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.solarwinds.com/SuccessCenter/s/)
2. [](https://www.solarwinds.com/free-tools/free-help-desk-software)
3. [](https://www.esecforte.com/formula-injection-vulnerability-india-in-solarwinds-web-help-desk/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8632
- **State**: PUBLISHED
- **Published Date**: December 11, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 13:26 UTC
- **Reserved Date**: November 06, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
2. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
3. [](http://www.mozilla.org/security/announce/2014/mfsa2014-91.html)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1050340) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4883
- **State**: PUBLISHED
- **Published Date**: July 21, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 21, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in McAfee ePolicy Orchestrator 4.6.6 and earlier, and the ePO Extension for the McAfee Agent (MA) 4.5 through 4.6, allow remote attackers to inject arbitrary web script or HTML via the (1) instanceId parameter core/loadDisplayType.do; (2) instanceId or (3) monitorUrl parameter to console/createDashboardContainer.do; uid parameter to (4) ComputerMgmt/sysDetPanelBoolPie.do or (5) ComputerMgmt/sysDetPanelSummary.do; (6) uid, (7) orion.user.security.token, or (8) ajaxMode parameter to ComputerMgmt/sysDetPanelQry.do; or (9) uid, (10) orion.user.security.token, or (11) ajaxMode parameter to ComputerMgmt/sysDetPanelSummary.do.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95190](http://osvdb.org/95190)
2. [95188](http://osvdb.org/95188)
3. [95187](http://osvdb.org/95187)
4. [95191](http://osvdb.org/95191)
5. [95189](http://osvdb.org/95189)
6. [20130712 Multiple vulnerabilities in McAfee ePO 4.6.6](http://www.securityfocus.com/archive/1/527228)
7. [1028803](http://www.securitytracker.com/id/1028803)
8. [](https://kc.mcafee.com/corporate/index?page=content&id=KB78824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29481
- **State**: PUBLISHED
- **Published Date**: November 09, 2022 at 17:35 UTC
- **Last Updated**: April 15, 2025 at 18:40 UTC
- **Reserved Date**: May 13, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A leftover debug code vulnerability exists in the console nvram functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-489: Security Weakness
### Affected Products
**InHand Networks - InRouter302**
Affected versions:
- V3.5.45 (Status: affected)
### References
1. [](https://inhandnetworks.com/upload/attachment/202210/25/InHand-PSA-2022-02.pdf)
2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7592
- **State**: PUBLISHED
- **Published Date**: April 09, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 16:04 UTC
- **Reserved Date**: April 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3844](http://www.debian.org/security/2017/dsa-3844)
2. [](http://bugzilla.maptools.org/show_bug.cgi?id=2658)
3. [GLSA-201709-27](https://security.gentoo.org/glsa/201709-27)
4. [USN-3602-1](https://usn.ubuntu.com/3602-1/)
5. [97510](http://www.securityfocus.com/bid/97510) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10125
- **State**: PUBLISHED
- **Published Date**: March 16, 2020 at 14:40 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Contao before 4.5.7 has XSS in the system log.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6348
- **State**: PUBLISHED
- **Published Date**: September 09, 2020 at 12:52 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated GIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Viewer**
Affected versions:
- < 9 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2960815)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1165/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3354
- **State**: PUBLISHED
- **Published Date**: July 28, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: July 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in the Newbb Plus (newbb_plus) module 0.93 in RunCMS 1.6.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) bbPath[path] parameter to votepolls.php and the (2) bbPath[root_theme] parameter to config.php, different vectors than CVE-2006-0659. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30331](http://www.securityfocus.com/bid/30331)
2. [runcms-votepolls-file-include(43969)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43969)
3. [](http://www.securityfocus.com/bid/30331/exploit) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36445
- **State**: PUBLISHED
- **Published Date**: August 22, 2024 at 00:00 UTC
- **Last Updated**: August 22, 2024 at 23:03 UTC
- **Reserved Date**: May 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/)
2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-035.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0202
- **State**: PUBLISHED
- **Published Date**: May 30, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The setup script in ovirt-engine-dwh, as used in the Red Hat Enterprise Virtualization Manager data warehouse (rhevm-dwh) package before 3.3.3, stores the history database password in cleartext, which allows local users to obtain sensitive information by reading an unspecified file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2014:0559](http://rhn.redhat.com/errata/RHSA-2014-0559.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4320
- **State**: PUBLISHED
- **Published Date**: December 18, 2023 at 13:43 UTC
- **Last Updated**: April 09, 2025 at 21:12 UTC
- **Reserved Date**: August 14, 2023 at 08:42 UTC
- **Assigned By**: redhat
### Vulnerability Description
An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**Red Hat - Red Hat Satellite 6.15 for RHEL 8**
Affected versions:
- 0:3.9.1.6-1.el8sat (Status: unaffected)
**Red Hat - Red Hat Satellite 6.15 for RHEL 8**
Affected versions:
- 0:3.9.1.6-1.el8sat (Status: unaffected)
**Red Hat - Red Hat Satellite 6.15 for RHEL 8**
Affected versions:
- 0:3.9.1.6-1.el8sat (Status: unaffected)
### References
1. [RHSA-2024:2010](https://access.redhat.com/errata/RHSA-2024:2010)
2. [](https://access.redhat.com/security/cve/CVE-2023-4320)
3. [RHBZ#2231814](https://bugzilla.redhat.com/show_bug.cgi?id=2231814) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27705
- **State**: PUBLISHED
- **Published Date**: March 19, 2025 at 19:15 UTC
- **Last Updated**: March 19, 2025 at 20:06 UTC
- **Reserved Date**: March 05, 2025 at 23:12 UTC
- **Assigned By**: Absolute
### Vulnerability Description
There is a cross-site scripting vulnerability in the Secure
Access administrative console of Absolute Secure Access prior to version 13.53.
Attackers with system administrator permissions can interfere with another
system administrator’s use of the management console when the second
administrator logs in. Attack complexity is high, attack requirements are
present, privileges required are none, user interaction is required. The impact
to confidentiality is low, the impact to availability is none, and the impact
to system integrity is none.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Absolute Security - Secure Access**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1353/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1125
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Oracle Webserver 2.1 and earlier runs setuid root, but the configuration file is owned by the oracle account, which allows any local or remote attacker who obtains access to the oracle account to gain privileges or modify arbitrary files by modifying the configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19970919 Instresting practises of Oracle [Oracle Webserver]](http://marc.info/?l=bugtraq&m=87602880019796&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5362
- **State**: PUBLISHED
- **Published Date**: July 14, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BFD daemon in Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R8, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D85, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R3, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10 allows remote attackers to cause a denial of service (bfdd crash and restart) or execute arbitrary code via a crafted BFD packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10690)
2. [1032844](http://www.securitytracker.com/id/1032844) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1240
- **State**: PUBLISHED
- **Published Date**: April 06, 2022 at 10:15 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: April 05, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**radareorg - radareorg/radare2**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc)
2. [](https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40509
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:11 UTC
- **Last Updated**: September 18, 2024 at 18:29 UTC
- **Reserved Date**: August 14, 2023 at 21:06 UTC
- **Assigned By**: zdi
### Vulnerability Description
LG Simple Editor deleteCanvas Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the deleteCanvas method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM.
. Was ZDI-CAN-20011.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**LG - Simple Editor**
Affected versions:
- LG Simple Editor 3.21.0 (Status: affected)
### References
1. [ZDI-23-1213](https://www.zerodayinitiative.com/advisories/ZDI-23-1213/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18515
- **State**: REJECTED
- **Published Date**: January 09, 2020 at 14:30 UTC
- **Last Updated**: January 09, 2020 at 14:30 UTC
- **Reserved Date**: October 19, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43545
- **State**: PUBLISHED
- **Published Date**: October 08, 2024 at 17:35 UTC
- **Last Updated**: January 29, 2025 at 23:50 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43545) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24881
- **State**: PUBLISHED
- **Published Date**: February 08, 2024 at 11:19 UTC
- **Last Updated**: August 01, 2024 at 23:28 UTC
- **Reserved Date**: February 01, 2024 at 10:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VeronaLabs WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc allows Reflected XSS.This issue affects WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc: from n/a through 6.5.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**VeronaLabs - WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0097
- **State**: PUBLISHED
- **Published Date**: March 22, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: February 02, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS00-006](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006)
2. [950](http://www.securityfocus.com/bid/950)
3. [1210](http://www.osvdb.org/1210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24749
- **State**: PUBLISHED
- **Published Date**: March 14, 2022 at 21:45 UTC
- **Last Updated**: April 22, 2025 at 18:18 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
- CWE-434: Security Weakness
### Affected Products
**Sylius - Sylius**
Affected versions:
- < 1.9.10 (Status: affected)
- >= 1.10.0, < 1.10.11 (Status: affected)
- >= 1.11.0, < 1.11.2 (Status: affected)
### References
1. [](https://github.com/Sylius/Sylius/releases/tag/v1.10.11)
2. [](https://github.com/Sylius/Sylius/releases/tag/v1.11.2)
3. [](https://github.com/Sylius/Sylius/releases/tag/v1.9.10)
4. [](https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26774
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 19:28 UTC
- **Last Updated**: May 30, 2025 at 16:56 UTC
- **Reserved Date**: March 08, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17737
- **State**: PUBLISHED
- **Published Date**: December 18, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has XSS via the REF parameter to /network_diagnostics.html or /storage_info.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cve.html)
2. [43364](https://www.exploit-db.com/exploits/43364/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44280
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 21:07 UTC
- **Last Updated**: November 01, 2024 at 03:55 UTC
- **Reserved Date**: August 20, 2024 at 21:45 UTC
- **Assigned By**: apple
### Vulnerability Description
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to modify protected parts of the file system.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121570)
2. [](https://support.apple.com/en-us/121568) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39878
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:07 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper access control vulnerability in Samsung Checkout prior to version 5.0.55.3 allows attackers to access sensitive information via implicit intent broadcast.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Samsung Mobile - Samsung Checkout**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42534
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 07:49 UTC
- **Last Updated**: September 04, 2024 at 18:51 UTC
- **Reserved Date**: September 11, 2023 at 23:55 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper input validation vulnerability in ChooserActivity prior to SMR Nov-2023 Release 1 allows local attackers to read arbitrary files with system privilege.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Nov-2023 Release in Android 12, 13 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27866
- **State**: PUBLISHED
- **Published Date**: July 29, 2022 at 19:01 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 25, 2022 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
### Affected Products
**n/a - Autodesk Design Review**
Affected versions:
- 2018, 2017, 2013, 2012, 2011 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46216
- **State**: REJECTED
- **Last Updated**: April 23, 2025 at 02:55 UTC
- **Reserved Date**: April 22, 2025 at 07:37 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9975
- **State**: REJECTED
- **Published Date**: March 08, 2018 at 15:00 UTC
- **Last Updated**: March 08, 2018 at 14:57 UTC
- **Reserved Date**: June 26, 2017 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0431
- **State**: PUBLISHED
- **Published Date**: February 15, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 15, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Barracuda Spam Firewall 3.1.10 and earlier does not restrict the domains that white-listed domains can send mail to, which allows members of white-listed domains to use Barracuda as an open mail relay for spam.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14243](http://secunia.com/advisories/14243)
2. [barracuda-open-relay(19283)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19283)
3. [20050210 Barracuda Spam Firewall <= 3.1.10 acts as open relay for whitelisted senders.](http://marc.info/?l=bugtraq&m=110805534732492&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10059
- **State**: PUBLISHED
- **Published Date**: March 23, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 03:07 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95206](http://www.securityfocus.com/bid/95206)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1410469)
3. [openSUSE-SU-2017:0391](http://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html)
4. [](https://github.com/ImageMagick/ImageMagick/commit/58cf5bf4fade82e3b510e8f3463a967278a3e410)
5. [[oss-security] 20161226 Re: CVE requests for various ImageMagick issues](http://www.openwall.com/lists/oss-security/2016/12/26/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36085
- **State**: PUBLISHED
- **Published Date**: February 06, 2025 at 00:00 UTC
- **Last Updated**: February 11, 2025 at 14:35 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored Cross Site Scripting(XSS) vulnerability in Egavilan Media Resumes Management and Job Application Website 1.0 allows remote attackers to inject arbitrary code via First and Last Name in Apply For This Job Form.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/manitorpotterk/CVE/blob/main/Egavilan%20Media%20XSS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2001
- **State**: PUBLISHED
- **Published Date**: May 20, 2010 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: May 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the CiviRegister module before 6.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via the URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/797352)
2. [](http://drupal.org/node/797342)
3. [39806](http://secunia.com/advisories/39806)
4. [40130](http://www.securityfocus.com/bid/40130) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28030
- **State**: PUBLISHED
- **Published Date**: March 05, 2021 at 08:40 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the truetype crate before 0.30.1 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation within Tape::take_bytes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2021-0029.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26817
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 00:00 UTC
- **Last Updated**: May 29, 2025 at 13:28 UTC
- **Reserved Date**: February 14, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netwrix Password Secure 9.2.0.32454 allows OS command injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf)
2. [](https://security.netwrix.com/advisories/adv-2025-009)
3. [](https://www.8com.de/cyber-security-blog/authenticated-remote-code-execution-in-netwrix-password-secure-cve-2025-26817) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9283
- **State**: PUBLISHED
- **Published Date**: September 27, 2024 at 14:00 UTC
- **Last Updated**: September 27, 2024 at 14:12 UTC
- **Reserved Date**: September 27, 2024 at 09:46 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in RelaxedJS ReLaXed up to 0.2.2. Affected is an unknown function of the component Pug to PDF Converter. The manipulation leads to cross site scripting. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**RelaxedJS - ReLaXed**
Affected versions:
- 0.2.0 (Status: affected)
- 0.2.1 (Status: affected)
- 0.2.2 (Status: affected)
### References
1. [VDB-278676 | RelaxedJS ReLaXed Pug to PDF Converter cross site scripting](https://vuldb.com/?id.278676)
2. [VDB-278676 | CTI Indicators (IOB, IOC, TTP)](https://vuldb.com/?ctiid.278676)
3. [Submit #411185 | relaxedjs - Injection](https://vuldb.com/?submit.411185)
4. [](https://drive.google.com/file/d/1Ll1dRwQds8987S-l5o2iJu4MQRG-p4-A/view?usp=sharing)
### Credits
- nilesh (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14818
- **State**: PUBLISHED
- **Published Date**: December 20, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 19:34 UTC
- **Reserved Date**: September 27, 2017 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-4982.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 8.3.1.21155 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-17-862) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2699
- **State**: PUBLISHED
- **Published Date**: May 24, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 11, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1027274](http://www.securitytracker.com/id?1027274)
2. [](https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c)
3. [[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable](http://www.openwall.com/lists/oss-security/2011/07/20/5)
4. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c)
5. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=723429)
7. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2294
- **State**: PUBLISHED
- **Published Date**: August 04, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 00:41 UTC
- **Reserved Date**: August 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Canonicalize-before-filter error in the send_review function in the Reviews module for PHP-Nuke 6.0 to 7.3 allows remote attackers to inject arbitrary web script or HTML via hex-encoded XSS sequences in the text parameter, which is checked for dangerous sequences before it is canonicalized, leading to a cross-site scripting (XSS) vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6999](http://www.osvdb.org/6999)
2. [11852](http://secunia.com/advisories/11852)
3. [20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]](http://www.securityfocus.com/archive/1/365865)
4. [10524](http://www.securityfocus.com/bid/10524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2895
- **State**: PUBLISHED
- **Published Date**: August 31, 2022 at 20:54 UTC
- **Last Updated**: April 16, 2025 at 17:48 UTC
- **Reserved Date**: August 18, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. These controls may allow two stack-based buffer overflow instances while processing a specific project file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Measuresoft - ScadaPro Server**
Affected versions:
- All Versions (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-235-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-43014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-43014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-43014
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:56 UTC
- **Last Updated**: April 17, 2025 at 18:01 UTC
- **Reserved Date**: April 16, 2025 at 13:26 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains Toolbox App before 2.6 the SSH plugin established connections without sufficient user confirmation
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**JetBrains - Toolbox App**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27254
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 12:24 UTC
- **Last Updated**: February 13, 2025 at 17:46 UTC
- **Reserved Date**: February 22, 2024 at 01:26 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 federated server is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 283813.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**IBM - Db2 for Linux, UNIX and Windows**
Affected versions:
- 10.5, 11.1, 11.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7145727)
2. [](https://https://exchange.xforce.ibmcloud.com/vulnerabilities/283813)
3. [](https://security.netapp.com/advisory/ntap-20240517-0004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0753
- **State**: PUBLISHED
- **Published Date**: September 17, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:31 UTC
- **Reserved Date**: July 26, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BMP image processor for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted BMP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FLSA:2005](https://bugzilla.fedora.us/show_bug.cgi?id=2005)
2. [DSA-546](http://www.debian.org/security/2004/dsa-546)
3. [RHSA-2004:466](http://www.redhat.com/support/errata/RHSA-2004-466.html)
4. [MDKSA-2005:214](http://www.mandriva.com/security/advisories?name=MDKSA-2005:214)
5. [FLSA-2005:155510](http://www.securityfocus.com/archive/1/419771/100/0/threaded)
6. [MDKSA-2004:095](http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095)
7. [oval:org.mitre.oval:def:10585](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10585)
8. [11195](http://www.securityfocus.com/bid/11195)
9. [gtk-bmp-dos(17383)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17383)
10. [VU#825374](http://www.kb.cert.org/vuls/id/825374)
11. [RHSA-2004:447](http://www.redhat.com/support/errata/RHSA-2004-447.html)
12. [CLA-2004:875](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875)
13. [17657](http://secunia.com/advisories/17657) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46824
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 09:43 UTC
- **Last Updated**: October 29, 2024 at 19:09 UTC
- **Reserved Date**: October 27, 2023 at 07:48 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Om Ak Solutions Slick Popup: Contact Form 7 Popup Plugin plugin <= 1.7.14 versions.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Om Ak Solutions - Slick Popup: Contact Form 7 Popup Plugin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/slick-popup/wordpress-slick-popup-plugin-1-7-14-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Huynh Tien Si (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9490
- **State**: PUBLISHED
- **Published Date**: April 05, 2019 at 22:46 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 01, 2019 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.
### Affected Products
**Trend Micro - InterScan Web Security Virtual Appliance**
Affected versions:
- 6.5 SP2 (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/1122326)
2. [107848](http://www.securityfocus.com/bid/107848) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.